Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 114
- Po 80
- Biografa 70
- Literatura cristiana oriental 54
- Patrística oriental 49
- Colecciones 45
- Història 42
- History 36
- Informática 32
- Catecismos 27
- Església Catòlica 26
- Procedimiento penal 22
- Development 21
- Filosofía 21
- Humanidades 21
- Application software 18
- Crtica e interpretaciðn 17
- Espiritualidad 17
- Política y gobierno 17
- Politics and government 16
- Obres anteriors al 1800 14
- Electronic data processing 13
- Meditaciones 13
- Python (Computer program language) 13
- Culto 12
- Design 12
- Lengua rusa 12
- Política 12
- Blockchains (Databases) 11
- Computer networks 11
-
3221Publicado 2017Tabla de Contenidos: “…Fitzek, On Goodput and Energy Measurements of Network Coding Schemes in the Raspberry Pi, Reprinted from: Electronics 2016, 5(4), 66; doi: 10.3390/electronics5040066 -- Wajdi Hajji and Fung Po Tso, Understanding the Performance of Low Power Raspberry Pi Cloud for Big Data, Reprinted from: Electronics 2016, 5(2), 29; doi: 10.3390/electronics5020029 -- Jochen Schlobohm, Andreas Pösch and Eduard Reithmeier, A Raspberry Pi Based Portable Endoscopic 3D Measurement System, Reprinted from: Electronics 2016, 5(3), 43; doi: 10.3390/electronics5030043 -- Vittorio Pasquali, Riccardo Gualtieri, Giuseppe D'Alessandro, Maria Granberg, David Hazlerigg, Marco Cagnetti and Fabio Leccese, Monitoring and Analyzing of Circadian and Ultradian Locomotor Activity, Based on Raspberry-Pi, Reprinted from: Electronics 2016, 5(3), 58; doi: 10.3390/electronics5030058 -- Fabio Leccese, Marco Cagnetti, Stefano Di Pasquale, Sabino Giarnetti and Maurizio Caciotta, A New Power Quality Instrument Based on Raspberry-Pi, Reprinted from: Electronics 2016, 5(4), 64; doi: 10.3390/electronics5040064 -- Ulf Jennehag, Stefan Forsstrom and Federico V. …”
Libro electrónico -
3222Publicado 2016Tabla de Contenidos: “…-- Logical Limits -- The speed of light -- Granularity and extra vSwitch or network transitions -- Standardization above the network layer -- The capabilities of old stuff-The "brownfield" of dreams -- Common sense -- NFV Without SFC -- Conclusion -- End Notes -- 3 ETSI NFV ISG -- Introduction -- Getting Chartered -- European Telecommunications Institute -- NFV at ETSI -- Organization -- Impact on 3GPP -- Digesting ETSI Output -- Output -- Terminology -- Architecture-General -- Architecture-Big Blocks and Reference Points -- Use Cases -- Virtualization Requirements -- Gap Analysis -- PoC Observations -- A Look Back-White Paper 3 -- Future Directions -- Open Platform for NFV…”
Libro electrónico -
3223por Liu, ChangTabla de Contenidos: “…Missbrauchsabwehr in der StPO durch Ablehnungsgründe -- a) Gründe für die Ablehnung eines Beweisantrags -- b) Missbrauchsbekämpfung durch die gesetzlichen Ablehnungsgründe -- 2. …”
Publicado 2021
Libro electrónico -
3224Publicado 2022Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico
-
3225
-
3226
-
3227Publicado 2018Libro electrónico
-
3228por Morgan, George A. 1936-“…Understanding and Evaluating Research in Applied and Clinical Settings features:*short, independent, chapters that do not have to be read in order;*a guide to understanding why a particular statistic was selected;*an emphasis on effects sizes including measures of risk po…”
Publicado 2006
Libro electrónico -
3229Publicado 2017Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro
-
3230
-
3231
-
3232por Feuerbach, Ludwig 1804-1872“…Más que la negación de la religión, lo que pretende es su purificación de repre-sentaciones en contradicción con el hombre y con las po-sibilidades del género humano en cuanto tal. …”
Publicado 1975
Red de bibliotecas Iglesia Navarra (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Seminario Metropolitano de Oviedo, Biblioteca Universidad Eclesiástica San Dámaso, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca de la Universidad de Navarra, Red de Bibliotecas de la Diócesis de Córdoba, Universidad Loyola - Universidad Loyola Granada, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Central de Capuchinos de España, Biblioteca Universidad de Deusto, Biblioteca Diocesana de Salamanca, Biblioteca Diocesana Bilbao, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Seminario Diocesano de Jaén)Libro -
3233por Ivereigh, Austen
Publicado 2015Red de bibliotecas Iglesia Navarra (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Seminario Diocesano de Jaén)Libro -
3234Publicado 2019Tabla de Contenidos: “…Access to Google Scholar since PoP (Publish or Perish) -- 5.2.3. The Web of Science (WoS) -- 5.2.4. …”
Libro electrónico -
3235Publicado 2023Tabla de Contenidos: “…Getting started with Responsible AI in your organization -- Regulatory compliance in Azure Policy for Azure Machine Learning -- Azure Security Benchmark -- Federal Risk and Authorization Management Program -- New Zealand Information Security Manual (restricted) -- NIST SP 800-53 Rev. 5 -- Reserve Bank of India IT Framework for Banks v2016 -- Compliance auditing and reporting -- Azure portal -- Azure Resource Graph Explorer -- Compliance automation in Azure -- Azure Blueprints -- IaC -- Summary -- Part 2: Securing Your Data -- Chapter 4: Data Protection and Governance -- Working with data governance in Azure -- Identifying challenges -- Exploring benefits -- Getting started using cloud data best practices -- Exploring Azure tools and resources -- Storing and retrieving data in Azure Machine Learning -- Connecting datastores -- Adding data assets -- Encrypting and securing data -- Encryption at rest -- Encryption in transit -- Exploring backup and recovery -- Reviewing backup options for your datastores -- Recovering your workspace -- Summary -- Chapter 5: Data Privacy and Responsible AI Best Practices -- Technical requirements -- Working with Python -- Running a notebook in Azure Machine Learning -- Installing the SmartNoise SDK -- Installing Fairlearn -- Discovering and protecting sensitive data -- Identifying sensitive data -- Exploring data anonymization -- Introducing differential privacy -- Mitigating fairness -- Fairlearn -- Working with model interpretability -- Exploring the Responsible AI dashboard -- Exploring FL and secure multi-party computation -- FL with Azure Machine Learning -- Summary -- Further reading -- Part 3: Securing and Monitoring Your AI Environment -- Chapter 6: Managing and Securing Access -- Working with the PoLP -- Authenticating with Microsoft Entra ID -- Implementing RBAC -- Working with built-in roles…”
Libro electrónico -
3236Publicado 2009Tabla de Contenidos: “…9.9 Predefined Schema Simple Types -- 9.10 EMF Extensions -- Part III: Using the EMF Generator -- Chapter 10 EMF Generator Patterns -- 10.1 Modeled Classes -- 10.2 Attributes -- 10.3 References -- 10.4 Feature Maps -- 10.5 Operations -- 10.6 Class Inheritance -- 10.7 Reflective Methods -- 10.8 Factories and Packages -- 10.9 Switch Classes and Adapter Factories -- 10.10 Alternative Generator Patterns -- 10.11 Customizing Generated Code -- Chapter 11 EMF.Edit Generator Patterns -- 11.1 Item Providers -- 11.2 Item Provider Adapter Factories -- 11.3 Editor -- 11.4 Action Bar Contributor -- 11.5 Wizard -- 11.6 Plug-Ins -- Chapter 12 Running the Generators -- 12.1 EMF Code Generation -- 12.2 The Generator UI -- 12.3 Generator Model Properties -- 12.4 The Command-Line Generator Tools -- 12.5 The Generator Ant Tasks -- 12.6 The Template Format -- Chapter 13 Example-Implementing a Model and Editor -- 13.1 Getting Started -- 13.2 Generating the Model -- 13.3 Implementing Volatile Features -- 13.4 Implementing Data Types -- 13.5 Running the ExtendedPO2 Editor -- 13.6 Restricting Reference Targets -- 13.7 Splitting the Model into Multiple Packages -- 13.8 Editing Multiple Resources Concurrently -- Part IV: Programming with EMF -- Chapter 14 Exploiting Metadata -- 14.1 Packages -- 14.2 Reflection -- 14.3 Dynamic EMF -- 14.4 Extended Metadata -- Chapter 15 Persistence -- 15.1 Overview of the Persistence Framework -- 15.2 The EMF Persistence API -- 15.3 XML Resources -- 15.4 EMF Resource and Resource Factory Implementations -- 15.5 Performance Considerations -- 15.6 Custom Storage for Active Objects -- Chapter 16 Client Programming Toolbox -- 16.1 Tree Iterators and Switches -- 16.2 Adapters -- 16.3 Cross-Referencers -- 16.4 Copying Objects -- 16.5 Comparing Objects -- Chapter 17 The Change Model -- 17.1 Describing a Change -- 17.2 Change Recording…”
Libro electrónico -
3237Publicado 2022Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico
-
3238
-
3239
-
3240