Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Philosophy 424
- Engineering & Applied Sciences 307
- History 299
- Development 292
- Management 275
- Application software 234
- Religion 233
- Web sites 230
- Design 227
- Computer networks 219
- Data processing 206
- Social sciences 194
- Economics 187
- Research 184
- Computer programs 178
- Web site development 174
- Computer Science 167
- Education 158
- Electrical & Computer Engineering 152
- Mathematics 147
- Social aspects 138
- Telecommunications 138
- Ethics 135
- Historia 135
- Business & Economics 124
- Security measures 123
- Economic aspects 118
- Social Sciences 115
- Operating systems (Computers) 110
- Religion and sociology 110
-
5161por Suresh, A.Tabla de Contenidos: “…5.2.1.3 The Broadband Mobile Wireless Networks -- 5.2.2 BWN Network Structure -- 5.2.3 Wireless Broadband Applications -- 5.2.3.1 Digital Telephone -- 5.2.3.2 Broadband Data Connections -- 5.2.3.3 Digital Television -- 5.2.4 Promising Approaches Beyond BWN -- 5.3 Routing Mechanisms -- 5.3.1 Distance Vector (DV) -- 5.3.2 Link State (LS) -- 5.4 Security Issues and Mechanisms in BWN -- 5.4.1 DoS Attack -- 5.4.2 Distributed Flooding DoS -- 5.4.3 Rogue and Selfish Backbone Devices -- 5.4.4 Authorization Flooding on Backbone Devices -- 5.4.5 Node Deprivation Attack -- 5.5 Conclusion -- References -- Chapter 6 Routing Mechanism in Broadband Wireless Network -- 6.1 Classification of BWN Routing Protocols -- 6.1.1 Routing -- 6.1.2 Routing-Protocols -- 6.1.2.1 Types of Routing Protocols for Broadband Wireless Network -- 6.2 Routing Mechanism in WiMAX Mesh Network -- 6.2.1 Routing Protocols - IEEE 802.16 Mesh Network -- 6.2.2 Architecture of WiMAX Protocol -- 6.3 Routing Mechanism in Mobile Networks -- 6.3.1 4G Mobile Network -- 6.3.2 5G Mobile Network -- 6.3.3 Convergence Communication Issue -- 6.3.4 Multi-Hop Dynamic Routing Issue -- 6.4 Service Specific Routing Protocols -- 6.4.1 Protocols Based on Topology and Position -- 6.4.2 Protocols Based on Proactive and Reactive Nature -- 6.4.3 Protocols Based on Distance Vector and Link State Routing -- 6.4.4 Protocols Based on Hop-by-Hop Routing and Source Routing -- 6.4.5 Protocols Based on Flat and Hierarchical Infrastructure -- 6.4.6 Protocols Based on Single-Path and Multipath -- 6.5 Novel Approaches and Algorithms on Broadband Routing -- 6.5.1 Approaches for efficient Performance in Broadband Routing -- 6.5.2 Algorithms for Broadband Routing -- 6.6 Conclusion -- References -- Chapter 7 Interference Problem in 5G with Radio Access Network -- 7.1 Introduction -- 7.1.1 Interface Management…”
Publicado 2023
Libro electrónico -
5162Publicado 2025Tabla de Contenidos: “…5.6.5.7 Comparison with human performance -- 5.6.5.8 Test of statistical significance -- 5.6.5.9 Execution times -- 5.6.5.10 Keyframe visualization -- 5.7 Summary -- References -- 6 Egocentric video cosummarization -- 6.1 Motivation -- 6.2 Chapter organization -- 6.3 Related work -- 6.4 Proposed methods -- 6.4.1 Shot segmentation -- 6.4.2 Center-surround model -- 6.4.3 Method I: Egocentric video cosummarization with bipartite graph matching and game theory -- 6.4.3.1 A game-theoretic model of visual similarity -- 6.4.3.2 Shot correspondence using bipartite graph matching -- 6.4.4 Method II: Egocentric video cosummarization with random walks on a constrained graph and transfer learning -- 6.4.4.1 Feature extraction using transfer learning -- 6.4.4.2 A video representation graph -- 6.4.4.3 Must-link and cannot-link constraints -- 6.4.4.4 Must-link constrained modified graph -- 6.4.4.5 Shot clustering by random walk with label refinement -- 6.5 Time-complexity analysis -- 6.5.1 Method-I: Time-complexity analysis -- 6.5.2 Method-II: Time-complexity analysis -- 6.6 Experimental results -- 6.6.1 Datasets -- 6.6.2 Performance measures -- 6.6.3 Tuning of the parameters -- 6.6.4 Method-I: Experimental results and analysis -- 6.6.4.1 Ablation study -- 6.6.4.2 Comparisons with other approaches -- 6.6.4.3 Test of statistical significance -- 6.6.4.4 Execution times -- 6.6.5 Method-II: Experimental results and analysis -- 6.6.5.1 Implementation details -- 6.6.5.2 Ablation studies -- 6.6.5.3 Results on short duration videos -- 6.6.5.4 Results on long duration videos -- 6.6.5.5 Comparison with human performance -- 6.6.5.6 Test of statistical significance -- 6.6.5.7 Execution times -- 6.7 Summary -- References -- 7 Action recognition in egocentric video -- 7.1 Motivation -- 7.2 Chapter organization -- 7.3 Related work -- 7.4 Proposed method…”
Libro electrónico -
5163Publicado 2015Tabla de Contenidos: “…Adiós a Google Reader; 7. En los 10 años de LinkedIn; 8. YouTube lanza canales de pago; 9. Yahoo! …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5164por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Biological, behavioural and emotional factors mediate the relationship between alcohol use and education -- 5.1.2. Bullying is linked to alcohol use -- 5.1.3. Life satisfaction is negatively associated with alcohol use -- 5.2. …”
Publicado 2021
Libro electrónico -
5165Publicado 2016“…As human fatigue has been directly linked to several major disasters, the book explores the API RP 755 guidelines that were released to reduce these types of incidents. …”
Libro electrónico -
5166Publicado 2017Tabla de Contenidos: “…. -- Auto resolution of child incidents -- Auto reactivation of child incidents -- Status of child incidents when linked with a parent -- Configuring the priority and urgency for your SLA targets -- Getting ready -- How it works... -- See also -- Creating Management Packs to save your SCSM personalization -- Getting ready -- How to do it... -- How it works... -- See also -- Creating a configuration item group -- How to do it... -- How it works... -- There's more... -- Creating other groups containing other CI types -- Creating a basic queue -- Getting ready -- How to do it... -- How it works... -- See also -- Creating SCSM console tasks -- Getting ready -- How to do it... -- How it works... -- Configuring global e-mail notification infrastructure settings -- Getting ready -- How to do it... -- How it works... -- Creating formatted e-mail notification templates -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 3: Configuring Service Level Agreements (SLAs) -- Introduction -- Creating priority queues -- Getting ready -- How to do it... -- How it works... -- There's more... -- Service Request queues -- Further queue types -- See also -- Configuring business hours and non-working days -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding holidays in bulk -- Creating SLA metrics -- How to do it... -- How it works... -- Creating SLOs -- Getting ready -- How to do it... -- How it works... -- See also -- Creating Incident Management SLAs -- Getting ready -- How to do it... -- Resolution Time SLA -- First Response Time SLA -- How it works... -- Creating Service Request SLAs -- Getting ready -- How to do it...…”
Libro electrónico -
5167Publicado 2023Tabla de Contenidos: “…Log out when you're finished -- Use your own computer or phone -- Lock your computer -- Use a separate, dedicated computer for sensitive tasks -- Use a separate, dedicated browser for sensitive web-based tasks -- Secure your access devices -- Keep your devices up to date -- Don't perform sensitive tasks over public Wi-Fi -- Never use public Wi-Fi in high-risk places -- Access your accounts only in safe locations -- Use appropriate devices -- Set appropriate limits -- Use alerts -- Periodically check access device lists -- Check last login info -- Respond appropriately to any fraud alerts -- Never send sensitive information over an unencrypted connection -- Beware of social engineering attacks -- Establish voice login passwords -- Protect your cellphone number -- Don't click on links in emails or text messages -- Securing Data with Parties You've Interacted With -- Securing Data at Parties You Haven't Interacted With -- Securing Data by Not Connecting Hardware with Unknown Pedigrees -- Chapter 5 Passwords -- Passwords: The Primary Form of Authentication -- Avoiding Simplistic Passwords -- Password Considerations -- Easily guessable personal passwords -- Complicated passwords aren't always better -- Different levels of sensitivity -- Your most sensitive passwords may not be the ones you think -- You can reuse passwords - sometimes -- Consider using a password manager -- Creating Memorable, Strong Passwords -- Knowing When to Change Passwords -- Changing Passwords after a Breach -- Providing Passwords to Humans -- Storing Passwords -- Storing passwords for your heirs -- Storing general passwords -- Transmitting Passwords -- Discovering Alternatives to Passwords -- Biometric authentication -- SMS-based authentication -- App-based one-time passwords -- Hardware token authentication -- USB-based authentication…”
Libro electrónico -
5168Publicado 2023Tabla de Contenidos: “…Collect, Combine, and Transform Data Using Power Query in Excel and Power BI by Gil Raviv -- Master Your Data with Power Query in Excel and Power BI by Ken Puls and Miguel Escobar -- Super Charge Power BI by Matt Allington -- Star Schema by Chris Adamson -- Paid Training -- Mastering DAX with Marco Russo and Alberto Ferrari -- Power Query Editor and M with Ben Gribaudo -- Video Training Courses by SQLBI -- User Groups -- Conferences -- Social Media -- Twitter -- Reddit -- LinkedIn -- External Tools -- DAX Studio -- Bravo -- Tabular Editor -- Other Tools -- Conclusion -- Index…”
Libro electrónico -
5169por Hollander, Myles“…Also organized all of the R programs used in this third edition into a documented collection that is formally registered as an R package specifically linked to this third edition. "--…”
Publicado 2014
Libro electrónico -
5170Publicado 2024Tabla de Contenidos: “…Part 2: Using the Web Effectively -- Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web -- Accessing and Moving Around the Web -- Web Browsers -- Objective 3.8 Explain what web browsers are and describe their common features -- URLs, Protocols, and Domain Names -- Objective 3.9 Explain what a URL is and discuss its main parts -- Navigating the Web -- Objective 3.10 Describe tools used to navigate the web -- Searching the Web Effectively -- Using Search Engines -- Objective 3.11 Describe the types of tools used to search the web and summarize strategies used to refine search results -- Bits& -- Bytes: Maintain Your Privacy While Searching the Web -- Sound Byte: Finding Information on the Web -- Evaluating Websites -- Objective 3.12 Describe how to evaluate a website to ensure it is appropriate to use for research purposes -- Helpdesk: Evaluating Websites -- Trends In It: Linked Data and the Semantic Web -- Using the Web Ethically -- Ethical Issues on the Internet -- Objective 3.13 Demonstrate an understanding of Internet-related ethical issues -- Bits& -- Bytes: Did He Really Say That? …”
Libro electrónico -
5171Publicado 1998Tabla de Contenidos: “…Preparing the Parallel Port -- Installing an Interrupt Handler -- The /proc Interface -- Autodetecting the IRQ Number -- Kernel-assisted probing -- Do-it-yourself probing -- Fast and Slow Handlers -- The internals of interrupt handling on the x86 -- Implementing a Handler -- Handler Arguments and Return Value -- Enabling and Disabling Interrupts -- Disabling a single interrupt -- Disabling all interrupts -- Top and Bottom Halves -- Tasklets -- Workqueues -- Interrupt Sharing -- Installing a Shared Handler -- Running the Handler -- The /proc Interface and Shared Interrupts -- Interrupt-Driven I/O -- A Write-Buffering Example -- Quick Reference -- Data Types in the Kernel -- Use of Standard C Types -- Assigning an Explicit Size to Data Items -- Interface-Specific Types -- Other Portability Issues -- Time Intervals -- Page Size -- Byte Order -- Data Alignment -- Pointers and Error Values -- Linked Lists -- Quick Reference -- PCI Drivers -- The PCI Interface -- PCI Addressing -- Boot Time -- Configuration Registers and Initialization -- MODULE_DEVICE_TABLE -- Registering a PCI Driver -- Old-Style PCI Probing -- Enabling the PCI Device -- Accessing the Configuration Space -- Accessing the I/O and Memory Spaces -- PCI Interrupts -- Hardware Abstractions -- A Look Back: ISA -- Hardware Resources -- ISA Programming -- The Plug-and-Play Specification -- PC/104 and PC/104+ -- Other PC Buses -- MCA -- EISA -- VLB -- SBus -- NuBus -- External Buses -- Quick Reference -- USB Drivers -- USB Device Basics -- Endpoints -- Interfaces -- Configurations -- USB and Sysfs -- USB Urbs -- struct urb -- Creating and Destroying Urbs -- Interrupt urbs -- Bulk urbs -- Control urbs -- Isochronous urbs -- Submitting Urbs -- Completing Urbs: The Completion Callback Handler -- Canceling Urbs -- Writing a USB Driver -- What Devices Does the Driver Support?…”
Tesis -
5172por Guthrie, ForbesTabla de Contenidos: “…-- Separation of Duties -- Risk Scenario -- Risk Mitigation -- vCenter Server Permissions -- Risk Scenario -- Risk Mitigation -- Security in vCenter Linked Mode -- Risk Scenario -- Risk Mitigation -- Command-Line Access to ESXi Hosts -- Risk Scenario -- Risk Mitigation -- Managing Network Access -- Risk Scenario -- Risk Mitigation -- The DMZ -- Risk Scenario -- Risk Mitigation -- Firewalls in the Virtual Infrastructure -- The Problem -- The Solution -- Change Management -- Risk Scenario -- Risk Mitigation -- Protecting the VMs -- Risk Scenario -- Risk Mitigation -- Protecting the Data -- Risk Scenario -- Risk Mitigation -- Cloud Computing -- Risk Scenario -- Risk Mitigation -- Auditing and Compliance -- The Problem -- The Solution -- Summary -- Chapter 10 Monitoring and Capacity Planning -- Nothing Is Static -- Building Monitoring into the Design -- Determining the Tools to Use -- Selecting the Items to Monitor -- Selecting Thresholds -- Taking Action on Thresholds -- Alerting the Operators -- Incorporating Capacity Planning in the Design -- Planning before Virtualization -- Planning during Virtualization -- Summary -- Chapter 11 Bringing a vSphere Design Together -- Sample Design -- Business Overview for XYZ Widgets -- Hypervisor Design -- vSphere Management Layer -- Server Hardware -- Networking Configuration -- Shared Storage Configuration -- VM Design -- VMware Datacenter Design -- Security Architecture -- Monitoring and Capacity Planning -- Examining the Design -- Hypervisor Design -- vSphere Management Layer -- Server Hardware -- Networking Configuration…”
Publicado 2013
Libro electrónico -
5173CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…USB-based authentication -- Chapter 9 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- Part 4 Cybersecurity for Businesses, Organizations, and Government -- Chapter 10 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network…”
Libro electrónico -
5174Publicado 2023Tabla de Contenidos:Libro electrónico
-
5175Publicado 2024Tabla de Contenidos: “…Chapter 5 Applying the Contiguity Principle: Align Words to Corresponding Graphics -- Spatial Contiguity Principle: Place Printed Words near Corresponding Graphics -- Violations of Spatial Contiguity -- Placing Text Caption Below Corresponding Graphic -- Placing a Legend Under or to the Side of Corresponding Chart -- Separating Text and Graphic on Scrolling Screens -- Displaying Feedback on a Separate Screen from Questions or Responses -- Displaying Linked Windows on Top of Corresponding Content -- Displaying Exercise Directions Separate from the Exercise -- Displaying Text in a Separate Window with Animations or Video -- Psychological Reasons for the Spatial Contiguity Principle -- Evidence for the Spatial Contiguity Principle -- Meta-Analytic Evidence -- Eye Tracking Evidence -- Boundary Conditions for Spatial Contiguity -- Spatial Contiguity and Visual Cues -- Promoting Spatial Contiguity with Augmented Reality -- Temporal Contiguity Principle: Synchronize Spoken Words with Corresponding Graphics -- Separating Graphics and Narration Through Icons -- Separating Graphics and Narration in a Continuous Presentation -- Psychological Reasons for the Temporal Contiguity Principle -- Evidence for the Temporal Contiguity Principle -- Core Evidence -- Boundary Conditions for Temporal Contiguity -- Exceptions to Temporal Contiguity -- What We Don't Know About Contiguity -- Chapter Reflection -- Coming Next -- Suggested Readings -- Chapter 6 Applying the Signaling Principle: Use Verbal and Visual Cues to Direct Attention -- What Is Signaling? …”
Libro electrónico -
5176por Eggins, Brian R.Tabla de Contenidos: “…3.5.3 Tissue Materials3.5.4 Micro-Organisms; 3.5.5 Mitochondria; 3.5.6 Antibodies; 3.5.7 Nucleic Acids; 3.5.8 Receptors; 3.6 Immobilization of Biological Components; 3.6.1 Introduction; 3.6.2 Adsorption; 3.6.3 Microencapsulation; 3.6.4 Entrapment; 3.6.5 Cross-Linking; 3.6.6 Covalent Bonding; Further Reading; 4 Performance Factors; 4.1 Introduction; 4.2 Selectivity; 4.2.1 Ion-Selective Electrodes; 4.2.2 Enzymes; 4.2.3 Antibodies; 4.2.4 Receptors; 4.2.5 Others; 4.3 Sensitivity; 4.3.1 Range, Linear Range and Detection Limits; 4.4 Time Factors; 4.4.1 Response Times; 4.4.2 Recovery Times…”
Publicado 2002
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5177por Bouchet, OlivierTabla de Contenidos: “…The signal-to-noise ratio; 4.3. Diffuse propagation link budget in a confined environment; 4.3.1. Intersymbol interference; 4.3.2. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5178por Herzog & de Meuron.Tabla de Contenidos: “…Conté: Editor's preface, by Nobuyuki Yoshida, p. 4-5; [Essay] The Pritzker Architecture Prize 2001, by Jacques Herzog and Pierre de Meuron, p. 6-11; [Projects] Prada Tokyo, Aoyama, Tokyo, Japan 2000-2003, p. 12-21; Walker Art Centre, expansion of the museum and cultural centre, Minneapolis, Minnesota, USA 1999-2005, p. 22-31; New de Young Museum, Golden Gate Park, San Francisco, California, USA 1999-2004, p. 32-41; Schaulager for the Emanuel Hoffmann Foundation, Basel, Munchenstein, Switzerland 1998-2002, p. 42-49; Cottbus University Library, Cottbus, Germany 1998-2003, p. 50-57; Centro Cultural - museum and cultural centre, Santa Cruz de Tenerife, Canary Islands, Spain 1999-2003, p. 58-65; The new link quai in Santa Cruz de Tenerife, Plaza de Espana, Santa Cruz de Tenerife, Canary Islands, Spain, 1998, p. 66-77; Kramlich residence and media collection, Oakville, Napa Valley, California, USA 1997-2003, p. 78-91; The virtual house, New York, New York, USA 1996-1997, p. 92-97; St Jakob Park, Basel, football stadium, commercial centre and residence for elderly people, p. 98-101; Wood house, Stuttgart, Germany 1995, p. 102-105; Greek Orthodox Church, Zurich, Switzerland 1989, p. 106-110; [Essay] Firmitas, by Herzog & de Meuron, p. 118-123; [Completed works] Blue house [Hofstetter residence], Oberwil, Switzerland 1979-1980, p. 124-127; Stone house [Meid residence] Tavole, Liguria, Italy 1982-1988, p. 128-135; Apartment and commercial building, Schutzenmattstrasse, Basel, Switzerland 1984-1993, p. 136-143; Apartment building along a party wall, Hebelstrasse, Basel, Switzerland, p. 144-149; E D E N Pavilion, Eden Hotel, Rheinfelden, Switzerland 1986-1987, p. 150-151; Ricola storage building, Baselstrasse, Laufen, Switzerland 1986-1987, p. 152-157; Railway engine depot, Auf dem Wolf, Basel, Switzerland 1989-1995, p. 158-161; Signal box, Auf dem Wolf, Basel, Switzerland 1989-1994, p. 162-167; Gallery for a private collection of modern art, Goetz Collection, Munich, Germany 1989-1992, p. 168-175; Ricola-Europa SA production and storage building, Mulhouse-Brunstatt, France 1992-1993, p. 176-183; Roche Pharma-Research Building, Basel, Switzerland 1993-2000, p. 184-193; Library of the Eberswalde Technical School, Eberswalde, Germany 1994-1999, p. 194-201; Central signal tower, Basel, Switzerland 1994-1999, p. 202-207; Tate Modern, London Bankside, UK 1994-2000, p. 208-235; House in Leymen, Haute Rhin, France 1996-1997, p. 236-243; Caricature and Cartoon Museum, conversion and new building, Basel, Switzerland 1994-1996, p. 244-249; Institute for hospital pharmaceuticals, Rossetti grounds [Rossetti Spitalapotheke at the Kantonsspital], Basel, Switzerland 1995-1998, p. 250-261; Studio Remy Zaugg, Mulhouse, France 1995-1996, p. 262-267; Dominus Winery, Yountville, Napa Valley, California, USA 1995-1998, p. 268-277; Apartment buildings, rue des Suisses, Paris 14eme, France 1996-2000, p. 278-289; Kuppersmuhle Museum - Grothe Collection, Duisburg, Germany 1997-1999, p. 290-301; Ricola marketing building, Laufen, Switzerland 1997-1998, p. 302-313; [Essay] Beyond the new materiality, by Toyo Ito, p. 318-319; Four partners [biographical notes], p. 320; Firm profile, p. 321-323; Postscript, by Erwin J S Viray, p. 324.…”
Publicado 2002
Libro -
5179por Ette, Andreas DrTabla de Contenidos: “…the increasing diversity of refugee and migration policies in Europe -- Research questions : multiple mechanisms of europeanisation -- Constructing a systematic empirical research strategy : comparative case studies in a crucial member state -- Chapter outline -- Stocktaking the europeanisation of refugee and migration policies -- Institutional and substantive developments in Europe's refugee and migration policies -- Pre-Amsterdam institutional configurations and its policy outcomes -- Post-Amsterdam institutional developments -- Post-Amsterdam substantive policy developments -- Theoretical frameworks approaching the europeanisation of refugee and migration policies -- Neo-functionalism : the weakness of supranational organisations -- Intergovernmentalism : executive preferences at the centre -- Constructivism : the power of policy ideas -- Europeanisation : the legacy of historical institutionalism -- Approaching the increasing diversity of Europe's refugee and migration policies -- Political sociology of European refugee and migration policies -- Outcomes of europeanisation : approaching the 'dependent variable problem' -- Outcome and output indicators -- Quantitative and qualitative indicators -- Direction of europeanisation -- Extent of europeanisation -- Mechanisms of europeanisation : theoretical links between Europe and its member states -- Separating two dimensions of europeanisation -- Typology of mechanisms of europeanisation -- Analysing europeanisation : process tracing in comparative case studies -- Turn the tables : analysing europeanisation from the bottom-up -- Process tracing : constructing causal inferences -- Disaggregation : comparative case studies in a crucial member state -- Conclusion -- Opposing Europe through the backdoor? …”
Publicado 2017
Tesis -
5180por Landscape Archaeology ConferenceTabla de Contenidos: “…The medieval territory of Brussels: A dynamic landscape of urbanisation / THEME III. LINKING LANDSCAPES OF LOWLANDS TO MOUNTAINOUS AREAS -- 3.1. …”
Publicado 2012
Libro electrónico