Mostrando 321 - 340 Resultados de 778 Para Buscar '"Justified"', tiempo de consulta: 0.11s Limitar resultados
  1. 321
    Tabla de Contenidos: “…Émissions de CO2 : évolution passée et objectifs -- Instruments économiques -- Encadré 4. La compétitivité justifie-t-elle une fiscalité écologique suboptimale ? …”
    Libro electrónico
  2. 322
    Publicado 2023
    Tabla de Contenidos: “…4.3 VALUE‌‌-Klausel -- 4.4 USAGE‌‌-Klausel -- 4.4.1 DISPLAY‌ -- 4.4.2 PACKED-DECIMAL‌‌‌ (manchmal auch COMP-3) -- 4.4.3 COMP‌‌‌ oder BINARY‌‌‌ -- 4.4.4 BINARY-CHAR, BINARY-SHORT, BINARY-LONG und BINARY-DOUBLE -- 4.4.5 FLOAT-SHORT‌‌‌ -- 4.4.6 FLOAT-LONG‌‌‌ -- 4.4.7 FLOAT-EXTENDED‌‌‌ -- 4.4.8 INDEX‌‌‌ -- 4.4.9 NATIONAL‌‌‌ -- 4.4.10 OBJECT REFERENCE‌‌‌ -- 4.4.11 POINTER‌‌‌ -- 4.4.12 PROGRAM POINTER‌‌‌ -- 4.5 BLANK WHEN ZERO‌‌-Klausel -- 4.6 JUSTIFIED‌‌ -- 4.7 SYNCHRONIZED‌‌-Klausel -- 4.8 SIGN‌‌-Klausel -- Kapitel 5: Definitionen von Datenstrukturen und Datensätzen -- 5.1 Stufennummern 01 bis 49‌‌ -- 5.2 REDEFINES‌‌-Klausel -- 5.3 Stufennummer 88‌‌ -- 5.4 Stufennummer 66‌‌ -- 5.5 Datengruppen mit BIT‌‌-Feldern -- 5.6 Konstante‌‌ -- Kapitel 6: Feldzuweisungen im Hauptspeicher -- 6.1 MOVE‌‌-Anweisung -- 6.1.1 MOVE CORRESPONDING‌‌-Anweisung -- 6.2 INITIALIZE‌‌-Anweisung -- 6.2.1 TO VALUE-Angabe -- 6.2.2 Ohne den Zusatz REPLACING -- 6.2.3 Mit dem Zusatz REPLACING -- 6.2.4 INITIALIZE für Tabellen -- 6.3 SET‌‌-Anweisung -- 6.4 Referenz-Modifikation‌ -- Kapitel 7: Die Anweisungen ACCEPT, DISPLAY und STOP -- 7.1 DISPLAY‌‌-Anweisung -- 7.1.1 Erweiterte Eigenschaften der DISPLAY-Anweisung -- 7.1.2 Löschen des Bildschirms‌ -- 7.1.3 Vorpositionierung des Cursors‌ -- 7.2 ACCEPT‌‌-Anweisung -- 7.2.1 Gleichzeitige Eingabe in mehrere Felder -- 7.2.2 Eingabe in numerische Felder‌‌ -- 7.2.3 ACCEPT-Anweisung und CURSOR‌‌-Klausel -- 7.2.4 ACCEPT-Anweisung und CRT STATUS‌‌-Klausel -- 7.2.5 Spezielle Dialogtechniken mit DISPLAY und ACCEPT -- 7.3 ACCEPT-Anweisung Format 2‌‌ -- 7.4 STOP‌‌-Anweisung -- Kapitel 8: Arithmetische Operationen -- 8.1 COMPUTE‌‌-Anweisung -- 8.1.1 Der ROUNDED‌-Zusatz -- 8.1.2 Der ON SIZE ERROR‌‌-Zusatz -- 8.1.3 Der NOT ON SIZE ERROR‌‌-Zusatz -- 8.1.4 Überlauf‌ bei mehreren Ergebnisfeldern -- 8.2 ADD‌‌-Anweisung -- 8.3 SUBTRACT‌‌-Anweisung…”
    Libro electrónico
  3. 323
    Tabla de Contenidos: “…Orientations pour le développement d'un système de permis transférables -- Orientations stratégiques pour déterminer le contenu du dispositif de permis transférables -- Assurer la sécurité juridique et économique des permis en même temps que l'adaptabilité du programme -- Limiter les coûts de transaction, éviter les obstacles non justifiés aux transferts…”
    Libro electrónico
  4. 324
    Publicado 2017
    Tabla de Contenidos: “…-- When to Use Portfolio Rationalization -- How to Rationalize the Portfolio -- Step 1: Understand Portfolio Complexity -- Step 2: Manage the Trade-offs -- Step 3: Take Out Associated Costs -- Chapter 6: Zero-Basing: Justify What to Keep, Not What to Kill -- What Is Zero-Basing?…”
    Libro electrónico
  5. 325
    Publicado 2016
    Tabla de Contenidos: “…Outsourcing Human Resources -- Summary: Effective Human Resource Practice -- References -- Chapter 23 Compensation: Total Rewards Programs in Nonprofit Organizations -- Total Rewards: Integral to Organizational Strategy -- Traditional Base Compensation Principles -- Incentive Pay in Nonprofits -- Executive Pay in Nonprofits -- Benefits -- Justifying Reward Costs to Directors -- Conclusion -- References -- Chapter 24 Designing and Managing Volunteer Programs -- Establishing the Rationale for Volunteer Involvement -- Involving Paid Staff in Volunteer Program Design -- Integrating the Volunteer Program into the Organization -- Creating Positions of Program Leadership -- Preparing Job Descriptions for Volunteer Positions -- Meeting the Needs of Volunteers -- Recruiting and Retaining Volunteers -- Managing Volunteers -- Evaluating and Recognizing Volunteer Effort -- Summary and Conclusion -- References -- Conclusion: The Future of Nonprofit Leadership and Management -- Name Index -- Subject Index -- EULA…”
    Libro electrónico
  6. 326
    Publicado 2018
    Tabla de Contenidos: “…-- Litmus testing to justify the application of blockchain technology -- Integrating a blockchain infrastructure for the whole enterprise -- Enterprise design principles -- Business drivers and evolution -- Ensuring sustainability -- The principles that drive blockchain adoption -- Business considerations for choosing a blockchain framework -- Technology considerations for choosing a blockchain framework -- Identity management -- Scalability -- Enterprise security -- Development tooling -- Crypto-economic models -- Decentralization with systemic governance -- Enterprise support -- Use case-driven pluggability choices -- Shared ledger technology -- Consensus -- Crypto algorithms and encryption technology -- Use case-driven pluggable choices -- Enterprise integration and designing for extensibility -- Other considerations -- Consensus, ACID property, and CAP -- CAP -- ACID -- Attestation - SSCs are signed and encrypted -- Use of HSMs -- Summary -- Chapter 2: Exploring Hyperledger Fabric -- Building on the foundations of open computing -- Fundamentals of the Hyperledger project -- The Linux Foundation -- Hyperledger…”
    Libro electrónico
  7. 327
    por Höppner, Thomas
    Publicado 2024
    Tabla de Contenidos: “…Constraints to achieve equal opportunities justify no self-preferencing -- d. Objective justification arguments raised in Google Search (Shopping) -- aa) Google's arguments regarding technical constraints -- bb) Rejection of objective justification by Commission and General Court -- d) No objective justification criterion in Article 6(5) DMA -- V. …”
    Libro electrónico
  8. 328
    Publicado 2023
    Tabla de Contenidos: “…Validating the value of the solution -- Taking your audience into consideration -- Setting Your Solution Up For Success: Getting Clear Objectives -- Eliciting and articulating clear objectives -- Getting clear with SMART objectives -- Part 3 Selling the Plan and Keeping It on Track -- Chapter 9 Making the (Business) Case -- Before You Dive In: Breaking Down Business Case Basics -- Looking at the benefits of writing a business case -- Playing to the crowd: Knowing your audience -- Following basic business case structure -- Defining and Presenting the Opportunity -- Executive summary -- Mission statement -- Setting SMART objectives -- Using key performance indicators -- Description of the approach used -- Justifying the Recommendation -- Identifying and prioritizing alternative solutions -- Including a cost/benefit analysis -- Understanding financial terminology and metrics -- Estimating techniques -- Quantifying ongoing/operating costs and benefits -- Quantifying implementation costs -- The Devil Is in the Details: Providing Supporting Materials -- Addressing supporting documentation -- Noting your assumptions -- Documenting risk -- Presenting the Business Case -- Chapter 10 Creating and Maintaining Scope -- Making Sure You're Scoping the Right Solution -- Recognizing Relevant Stakeholders -- Uncovering stakeholders by asking project-specific questions -- Discovering key stakeholders in different parts of the organization -- Ensuring that the Scope Aligns with Key Business Drivers -- Identifying Interfaces that Are Part of the Project -- User interfaces -- System interfaces -- Hardware interfaces -- Defining Scope with a Data Flow Diagram -- Identifying parties and systems that will be impacted by the project -- Identifying information (data) flows among the parties or systems -- Gaining consensus on the scope for the project…”
    Libro electrónico
  9. 329
    por Lie, Håkon Wium
    Publicado 2005
    Tabla de Contenidos: “…-- The font-family property -- Design tips using font families -- Font metrics -- Length units -- Absolute units -- Relative units -- The pixel unit -- Percentages as values -- Keywords as values -- The font-size property -- The "length" value -- The "percentage" value -- The "absolute-size" value -- The "relative-size" value -- The font-style property -- The font-variant property -- The font-weight property -- The font property -- The text-decoration property -- The text-transform property -- The direction and unicode-bidi properties -- More information about fonts -- Chapter 6 The fundamental objects -- The box model -- The display property -- The "block" value -- The "inline" value -- The "list-item" value -- The "none" value -- The "run-in" value -- The "inline-block" value -- Using the display property -- More about lists - the list-style properties -- The list-style-type property -- The list-style-image property -- The list-style-position property -- The list-style property -- Generated text, counters, and quotes -- The :before and :after pseudo-elements and the content property -- Generating quote marks -- Counters -- Styles for counters -- Self-nesting counters -- The white-space property -- Chapter 7 Space inside boxes -- Space inside block-level elements -- The text-align property -- Right aligning text -- Justifying text -- The text-indent property -- Using the text-indent property -- The line-height property -- Using the line-height property -- The word-spacing property -- Using the word-spacing property -- The letter-spacing property…”
    Libro electrónico
  10. 330
    Publicado 2013
    Tabla de Contenidos: “…Cover -- About the Author -- About the Contributors and Technical Reviewers -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Foundations -- Chapter 1: Information Security Overview -- The Importance of Information Protection -- The Evolution of Information Security -- Justifying Security Investment -- Business Agility -- Cost Reduction -- Portability -- Security Methodology -- How to Build a Security Program -- Authority -- Framework -- Assessment -- Planning -- Action -- Maintenance -- The Impossible Job -- The Weakest Link -- Strategy and Tactics -- Business Processes vs. …”
    Libro electrónico
  11. 331
    Publicado 2019
    Tabla de Contenidos: “…Computer Algebra Systems and Exponential Shift -- B. Justifying the Method of Undetermined Coefficients -- C. …”
    Libro electrónico
  12. 332
    Publicado 2015
    Tabla de Contenidos: “…Manipulating Strings -- Working with Strings -- String Literals -- Double Quotes -- Escape Characters -- Raw Strings -- Multiline Strings with Triple Quotes -- Multiline Comments -- Indexing and Slicing Strings -- The in and not in Operators with Strings -- Useful String Methods -- The upper(), lower(), isupper(), and islower() String Methods -- The isX String Methods -- The startswith() and endswith() String Methods -- The join() and split() String Methods -- Justifying Text with rjust(), ljust(), and center() -- Removing Whitespace with strip(), rstrip(), and lstrip() -- Copying and Pasting Strings with the pyperclip Module -- Project: Password Locker -- Step 1: Program Design and Data Structures -- Step 2: Handle Command Line Arguments -- Step 3: Copy the Right Password -- Project: Adding Bullets to Wiki Markup -- Step 1: Copy and Paste from the Clipboard -- Step 2: Separate the Lines of Text and Add the Star -- Step 3: Join the Modified Lines -- Summary -- Practice Questions -- Practice Project -- Table Printer -- II. …”
    Libro electrónico
  13. 333
    Publicado 2022
    Tabla de Contenidos: “…Purposes of cost allocation -- Justifying cost allocation decisions -- Implementing Cost Allocation -- Using cost hierarchy to allocate costs -- Allocating tricky corporate costs…”
    Libro electrónico
  14. 334
    Publicado 2017
    Tabla de Contenidos: “…-- Evaluating Your Performance Independent of the Group's Results -- Colluding with the Group -- Dealing with Collusion -- Summary -- Chapter Three: How You Think Is How You Facilitate: How Unilateral Control Undermines Your Ability to Help Groups -- How You Think: Your Mindset as an Operating System -- Two Mindsets: Unilateral Control and Mutual Learning -- How You Think Is Not How You Think You Think -- The CIO Team Survey Feedback Case -- Barbara's Contribution to the Team's Problems -- The Unilateral Control Approach -- Values of the Unilateral Control Mindset -- Win, Don't Lose -- Be Right -- Minimize Expression of Negative Feelings -- Act Rational -- Assumptions of the Unilateral Control Mindset -- I Understand the Situation -- Those Who Disagree Don't -- I Am Right -- Those Who Disagree Are Wrong -- My Motives Are Pure -- Those Who Disagree Have Questionable Motives -- My Feelings and Behaviors Are Justified -- I Am Not Contributing to the Problem -- Unilateral Control Behaviors -- Results of Unilateral Control -- Lackluster Performance -- Strained Working Relationships -- Less Individual Well-Being -- Give-Up-Control Approach -- How Unilateral Control Reinforces Itself -- How Did We Learn Unilateral Control? …”
    Libro electrónico
  15. 335
    Publicado 2005
    Tabla de Contenidos: “…Uses of first-person singular expressions -- 3.1. Justifying one's entering into a controversy -- 3.2. …”
    Libro electrónico
  16. 336
    Publicado 2024
    Tabla de Contenidos: “…-- Snapshot events -- Implementing complex event processing (CEP) logic -- Decision tables -- Missing events -- Leveraging machine learning (ML) for control flow -- Models -- Predictions -- Summary -- Chapter 9: Running in Multiple Regions -- Justifying multi-regional deployment -- Regional disruptions -- Nominal cost -- Higher user satisfaction -- Choosing a regional topology -- Primary/hot-secondary -- Active/active -- Balanced users -- Balanced data processing -- Preparing for regional failover -- Offline-first -- Protracted eventual consistency -- Checking regional health -- Traditional health checks -- Regional health checks -- Metrics -- Regional health check service -- Configuring regional routing -- Content Delivery Network (CDN) -- API Gateway -- Regional endpoints -- Global endpoints -- CDN plus API Gateway -- Global bus -- Replicating across regions -- Change event vs domain event replication -- Multi-master replication -- Round-robin replication -- Dissecting regional failover -- Query failover -- Command failover -- Trigger failure points -- Listener failure points -- Addressing intersystem differences -- External global endpoints -- Legacy regional endpoints…”
    Libro electrónico
  17. 337
    Publicado 2018
    Tabla de Contenidos: “…Coaching Model -- Ten-Minute Coaching Moments -- The Cost of Not Coaching -- You Can't Always be Coaching-Or Can You? -- Justifying Your Role as the Super Salesperson -- Enter the Fan -- How to Prevent it From Hitting the Fan -- Let The Fan Blow Your Problems Away -- Coaching versus Training: What's the Difference? …”
    Libro electrónico
  18. 338
    Publicado 2016
    Tabla de Contenidos: “…How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit This Protocol -- Chapter 30 Writing Discussion -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit This Protocol -- Chapter 31 Quick Writes -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit This Protocol -- Chapter 32 Cocktail Party -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit This Protocol -- Chapter 33 Bohmian Dialogue -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit This Protocol -- Chapter 34 Methodological Belief -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit This Protocol -- Chapter 35 Justifiable Pressure -- Purposes -- How It Works -- Where and When It's Worked Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit These Protocols -- Chapter 36 Hatful of Quotes -- Purposes -- How It Works -- When and Where It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions Suited to This Technique -- Chapter 37 Quotes to Affirm and Challenge -- Purposes -- How It Works -- When and Where It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions Suited to This Technique -- Chapter 38 Jigsaw -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit This Protocol -- Chapter 39 Titling the Text -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For…”
    Libro electrónico
  19. 339
    Publicado 2015
    Tabla de Contenidos: “…239 8.4 Bayesian Model Selection 274 8.5 SMC Samplers Estimators of Model Evidence 276 8.6 Multiple Risk Dependence Structure Model Selection: Copula Choice 277 9 Flexible Parametric Severity Models: Basics 289 9.1 Motivation for Flexible Parametric Severity Loss Models 289 9.2 Context of Flexible Heavy Tailed Loss Models in OpRisk and Insurance LDA Models 290 9.3 Empirical Analysis Justifying Heavy Tailed Loss Models in OpRisk 292 9.4 Flexible Distributions for Severity Models in OpRisk 294 9.5 Quantile Function Heavy Tailed Severity Models 294 9.6 Generalized Beta Family of Heavy Tailed Severity Models 321 9.7 Generalized Hyperbolic Families of Heavy Tailed Severity Models 328 9.8 Halphen Family of Flexible Severity Models: GIG and Hyperbolic 338 10 Modelling Dependence 353 10.1 Dependence Modelling Within and Between LDA Model Structures 353 10.2 General Notions of Dependence 358 10.3 Dependence Measures and Tail Dependence 364 10.4 Introduction to Parametric Dependence Modeling Through a Copula 380 10.5 Copula Model Families for OpRisk 387 10.6 Copula Parameter Estimation in Two Stages: Inference For the Margins 416 10.7 Multiple Risk LDA Compound Poisson Processes and Levy Copula 420 10.8 Multiple Risk LDA: Dependence Between Frequencies via Copula 425 10.9 Multiple Risk LDA: Dependence Between the k-th Event Times/Losses 425 10.10 Multiple Risk LDA: Dependence Between Aggregated Losses via Copula 430 10.11 Multiple Risk LDA: Structural Model with Common Factors 432 10.12 Multiple Risk LDA: Stochastic and Dependent Risk Profiles 434 10.13 Multiple Risk LDA: Dependence and Combining Different Data Sources 437 10.14 A Note on Negative Diversification and Dependence Modelling 445 11 Loss Aggregation 447 11.1 Introduction 447 11.2 Analytic Solution 448 11.3 Monte Carlo Method 454 11.4 Panjer Recursion 457 11.5 Panjer Extensions 462 11.6 Fast Fourier Transform 463 11.7 Closed-Form Approximation 466 11.8 Capital Charge Under Parameter Uncertainty 471 12 Scenario Analysis 477 12.1 Introduction 477 12.2 Examples of Expert Judgements 480 12.3 Pure Bayesian Approach (Estimating Prior) 482 12.4 Expert Distribution and Scenario Elicitation: learning from Bayesian methods 484 12.5 Building Models for Elicited Opinions: Heirarchical Dirichlet Models 487 12.6 Worst Case Scenario Framework 489 12.7 Stress Test Scenario Analysis 492 12.8 Bow-Tie Diagram 495 12.9 Bayesian Networks 497 12.10 Discussion 504 13 Combining Different Data Sources 507 13.1 Minimum variance principle 508 13.2 Bayesian Method to Combine Two Data Sources 510 13.3 Estimation of the Prior Using Data 528 13.4 Combining Expert Opinions with External and Internal Data 530 13.5 Combining Data Sources Using Credibility Theory 546 13.6 Nonparametric Bayesian approach via Dirichlet process 556 13.7 Combining using Dempster-Shafer structures and p-boxes 558 13.8 General Remarks 567 14 Multifactor Modelling and Regression for Loss Processes 571 14.1 Generalized Linear Model Regressions and the Exponential Family 571 14.2 Maximum Likelihood Estimation for Generalized Linear Models 573 14.3 Bayesian Generalized Linear Model Regressions and Regularization Priors 576 14.4 Bayesian Estimation and Model Selection via SMC Samplers 583 14.5 Illustrations of SMC Samplers Model Estimation and Selection for Bayesian GLM Regressions 585 14.6 Introduction to Quantile Regression Methods for OpRisk 590 14.7 Factor Modelling for Industry Data 597 14.8 Multifactor Modelling under EVT Approach 599 15 Insurance and Risk Transfer: Products and Modelling 601 15.1 Motivation for Insurance and Risk Transfer in OpRisk 602 15.2 Fundamentals on Insurance Product Structures for OpRisk 604 15.3 Single Peril Policy Products for OpRisk 609 15.4 Generic Insurance Product Structures for OpRisk 611 15.5 Closed Form LDA Models with Insurance Mitigations 621 16 Insurance and Risk Transfer: Pricing 663 16.1 Insurance Linked Securities and Catastrophe Bonds for OpRisk 664 16.2 Basics of Valuation of Insurance Linked Securities and Catastrophe Bonds for OpRisk 679 16.3 Applications of Pricing Insurance Linked Securities and Catastrophe Bonds 709 16.4 Sidecars, Multiple Peril Baskets and Umbrellas for OpRisk 726 16.5 Optimal Insurance Purchase Strategies for OpRisk Insurance via Multiple Optimal Stopping Times 733 A. …”
    Libro electrónico
  20. 340
    Publicado 2023
    Tabla de Contenidos: “…5.1 Becoming Aware of Tensions Between Situational and Contractual Norms -- 5.2 Developing a More Precise Formulation of a Situational Norm: The Diagrammatic Register -- 5.3 After Detecting Breaches of Norms: Justifying Actions and the Professional Obligations -- 6 Theorizing by Connecting Practical Rationality Constructs to Those from Other Theories -- 6.1 Connecting Mathematical Knowledge for Teaching to Practical Rationality -- 6.2 Connecting Teachers' Beliefs to Practical Rationality -- 6.3 The Uses of Practical Rationality -- 7 Conclusion: Addressing the Questions Posed -- References -- Chapter 8: Theory for Teaching and Teaching for Theory: Artifacts as Tangible Entities for Storing and Improving Professional Knowledge for Teaching -- 1 What Is a Theory (of Teaching)? …”
    Libro electrónico