Mostrando 22,821 - 22,840 Resultados de 27,497 Para Buscar '"The Act"', tiempo de consulta: 0.23s Limitar resultados
  1. 22821
    por Schrader-Kniffki, Martina
    Publicado 2005
    Tabla de Contenidos: “…3.3.3 Die Höflichkeitskonzeption von BROWN/ LEVINSON -- 3.3.3.1 Face und face-threatening-act und ihre Rolle in Bitthandlungen -- 3.3.3.2 Höflichkeitsstrategien -- 3.3.3.3 Probleme der Höflichkeitstheorie von BROWN/LEVINSON -- 3.3.4 Höflichkeit, Ritual und sprachliche Routine -- 3.3.5 Höflichkeit und Indirektheit -- 3.3.6 Sprachliche Höflichkeit in der Interaktion -- 3.4 Kulturspezifische Konzepte von Höflichkeit -- 3.4.1 Bestimmungen aus der einzelsprachlichen Begriffsgeschichte -- 3.4.1.1 Höflichkeitsbegriffe im Spanischen Mexikos -- 3.4.1.2 Höflichkeitsbegriffe im Zapotekischen -- 3.4.2 Zapotekische Höflichkeit aus Sprecherperspektive -- 3.4.3 Höflichkeit interkulturell: ein Beispiel -- 3.4.4 Höflichkeit im hispanophonen Oaxaca -- 3.5 Zusammenfassung -- 4 Bitthandlungen: Eingrenzungen und Systematisierung des Objektbereichs -- 4.1 Bitthandlungen in der Sprechakttheorie -- 4.2 Bitthandlungen und indirekte Sprechakte -- 4.3 Bitthandlungen aus kommunikationstheoretischer Perspektive -- 4.4 Bitthandlungen im Rahmen von Höflichkeit -- 4.5 Höflichkeit, Aufforderungen und Bitthandlungen -- 4.6 Bitthandlungen aus Sprecherperspektive -- 4.6.1 Problemstellung -- 4.6.2 Probleme einer Handlungsbeschreibung für Bitthandlungen -- 4.7 Die Bitthandlung und deren diskursive Repräsentation als komplexe Austauschhandlung -- 4.7.1 Bitthandlungen als komplexe Austauschhandlungen -- 4.7.2 Die Gabe: Opfer, Geschenk, Kredit und Prestige -- 4.7.3 Die Gabe als komplexes soziales Austauschsystem -- 5 Die Verben zur Bezeichnung direktiver Sprechhandlungen im Zapotekischen und im Spanischen -- 5.1 Das Wortfeld und seine Analyse -- 5.2 Die Aufforderungsverben des Zapotekischen und des Spanischen -- 5.2.1 Aufforderungsverben des Zapotekischen -- 5.2.1.1 Die höflichkeitsmarkierten zapotekischen Aufforderungsverben…”
    Libro electrónico
  2. 22822
    Publicado 2013
    Tabla de Contenidos: “…Cover -- Copyright -- Contents -- Authors' List -- Preface -- Chapter 1: Editorial -- Part I: The advantages of source separation and decentralization -- Chapter 2: The energy issue in urban water management -- 2.1 Introduction - Think Globally and Act Locally -- 2.2 Global Energy Goal -- 2.3 Renewable Energy Sources -- 2.4 Photosynthesis, Biomass, and BOD -- 2.5 Microbial Energy Conversion -- 2.6 Nutrient Recovery -- 2.7 New Biomass from Photosynthetic Microorganisms -- 2.8 Lower Energy Use -- 2.9 The Impact of Source Separation and Decentralization -- References -- Chapter 3: Peak phosphorus and the role of P recovery in achieving food security -- 3.1 Introduction -- 3.2 Phosphorus and Global Food Security -- 3.3 Global Phosphorus Scarcity and Pollution -- 3.4 Five Dimensions of Phosphorus Scarcity -- 3.5 Phosphorus Use in the Global Food System -- 3.6 Achieving Phosphorus Security -- 3.6.1 An integrated approach is required -- 3.6.2 The role of decentralized sanitation systems -- 3.6.3 Key challenges and opportunities -- 3.7 Conclusions -- References -- Chapter 4: Nitrogen economy of the 21st Century -- 4.1 Introduction -- 4.2 Nitrogen Sources -- 4.3 Release of Nitrogen to the Environment -- 4.4 Environmental Consequences -- 4.5 The Future and Possible Interventions -- 4.6 Conclusions -- References -- Chapter 5: Urban water supply under expanding water scarcity -- 5.1 Introduction -- 5.2 Water Supply of Urban Areas -- 5.2.1 On the verge of a new water scarcity -- 5.3 Implications of Increasing Competition? …”
    Libro electrónico
  3. 22823
    Publicado 2018
    Tabla de Contenidos: “…-- Arguments against TDD -- Testing takes time -- Testing is expensive -- Testing is difficult -- We don't know how -- Arguments in favor of TDD -- Reduces the effort of manual testing -- Reduces bug count -- Ensures some level of correctness -- Removes the fear of refactoring -- A better architecture -- Faster development -- Different types of test -- Unit tests -- Acceptance tests -- Integration tests -- End to end tests -- Quantity of each test type -- Parts of a unit test -- Arrange -- Act -- Assert -- Requirements -- Why are they important? …”
    Libro electrónico
  4. 22824
    Publicado 2021
    Libro electrónico
  5. 22825
    por OCDE, OECD /.
    Publicado 2016
    Libro electrónico
  6. 22826
    Publicado 2008
    Tabla de Contenidos: “…Configuration Examples: Frame Relay -- Part X: Network Security -- Chapter 28 IP Access Control List Security -- Access List Numbers -- Using Wildcard Masks -- ACL Keywords -- Creating Standard ACLs -- Applying Standard ACLs to an Interface -- Verifying ACLs -- Removing ACLs -- Creating Extended ACLs -- Applying Extended ACLs to an Interface -- The established Keyword (Optional) -- Creating Named ACLs -- Using Sequence Numbers in Named ACLs -- Removing Specific Lines in Named ACLs Using Sequence Numbers -- Sequence Number Tips -- Including Comments About Entries in ACLs -- Restricting Virtual Terminal Access -- Configuration Examples: ACLs -- Chapter 29 Security Device Manager -- Security Device Manager: Connecting with CLI -- Security Device Manager: Connecting with GUI -- SDM Express Wizard with No CLI Preconfiguration -- Resetting the Router to Factory Defaults Using SDM -- SDM User Interfaces -- SDM Monitor Mode -- Using SDM to Configure a Router to Act as a DHCP Server -- Using SDM to Configure an Interface as a DHCP Client -- Using SDM to Configure NAT/PAT -- What to Do If You Lose SDM Connectivity Because of an erase startup-config Command -- Part XI: Appendixes -- Appendix A: Binary/Hex/Decimal Conversion Chart -- Appendix B: Create Your Own Journal Here…”
    Libro electrónico
  7. 22827
    por Grenander, Ulf
    Publicado 2007
    Tabla de Contenidos: “…4.9 Markov Chains Have a Unique Gibbs Distribution -- 4.10 Entropy of Stationary Gibbs Fields -- 5 Gaussian Random Fields on Undirected Graphs -- 5.1 Gaussian Random Fields -- 5.2 Difference Operators and Adjoints -- 5.3 Gaussian Fields Induced via Difference Operators -- 5.4 Stationary Gaussian Processes on Z[sup(d)] and their Spectrum -- 5.5 Cyclo-Stationary Gaussian Processes and their Spectrum -- 5.6 The log-Determinant Covariance and the Asymptotic Normalizer -- 5.6.1 Asymptotics of the Gaussian processes and their Covariance -- 5.6.2 The Asymptotic Covariance and log-Normalizer -- 5.7 The Entropy Rates of the Stationary Process -- 5.7.1 Burg's Maximum Entropy Auto-regressive Processes on Z[sup(d)] -- 5.8 Generalized Auto-Regressive Image Modelling via Maximum-Likelihood Estimation -- 5.8.1 Anisotropic Textures -- 6 The Canonical Representations of General Pattern Theory -- 6.1 The Generators, Configurations, and Regularity of Patterns -- 6.2 The Generators of Formal Languages and Grammars -- 6.3 Graph Transformations -- 6.4 The Canonical Representation of Patterns: DAGs, MRFs, Gaussian Random Fields -- 6.4.1 Directed Acyclic Graphs -- 6.4.2 Markov Random Fields -- 6.4.3 Gaussian Random Fields: Generators induced via difference operators -- 7 Matrix Group Actions Transforming Patterns -- 7.1 Groups Transforming Configurations -- 7.1.1 Similarity Groups -- 7.1.2 Group Actions Defining Equivalence -- 7.1.3 Groups Actions on Generators and Deformable Templates -- 7.2 The Matrix Groups -- 7.2.1 Linear Matrix and Affine Groups of Transformation -- 7.2.2 Matrix groups acting on R[sup(d)] -- 7.3 Transformations Constructed from Products of Groups -- 7.4 Random Regularity on the Similarities -- 7.5 Curves as Submanifolds and the Frenet Frame -- 7.6 2D Surfaces in R[sup(3)] and the Shape Operator -- 7.6.1 The Shape Operator…”
    Libro electrónico
  8. 22828
    Publicado 2024
    Tabla de Contenidos: “…Sense -- 7.3.3. Learn -- 7.3.4. Act -- 7.4. System Architecture: Cloud Traffic Management -- 7.4.1. …”
    Libro electrónico
  9. 22829
    Publicado 2023
    Tabla de Contenidos: “…7.5 Artificial Intelligence in Distributed Operating Systems -- 7.6 Current Progress -- 7.7 Quantum Artificial Intelligence -- 7.8 Conclusion -- References -- 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act -- 8.1 Introduction -- 8.2 Conclusion -- Acknowledgement -- References -- 9 Quantum Computing Based on Cybersecurity -- 9.1 Introduction -- 9.2 Preliminaries -- 9.3 Threat Landscape -- 9.4 Defensive Measurements, Countermeasures, and Best Practises -- 9.5 Conclusion -- References -- 10 Quantum Cryptography for the Future Internet and the Security Analysis -- 10.1 Introduction -- 10.2 Related Works -- 10.3 Preliminaries -- 10.4 Quantum Cryptography for Future Internet -- 10.5 Conclusion -- References -- 11 Security Aspects of Quantum Cryptography -- 11.1 Introduction -- 11.2 Literature Survey -- 11.3 Quantum Key Distribution -- 11.4 Cryptography -- 11.5 Quantum Cryptography with Faint Laser Pulses -- 11.6 Eavesdropping -- 11.7 Conclusion -- References -- 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses -- 12.1 Introduction -- 12.2 Quantum Computing Basics -- 12.3 Security Applications -- 12.4 Quantum Machine Learning -- 12.5 Conclusion -- References -- 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future -- 13.1 Introduction -- 13.2 Background -- 13.3 Scope of this Work -- 13.4 Methodology and Analysis of Simulation Results -- 13.5 Quantum-Based Cybersecurity and Forensics -- 13.6 Conclusion and Future Works -- References -- 14 Quantum Computing: A Software Engineering Approach -- 14.1 Introduction -- 14.2 Background of Research Area -- 14.3 Why Cryptography? …”
    Libro electrónico
  10. 22830
    Publicado 2024
    Tabla de Contenidos: “…-- 6.2.7 Professional cyber operations -- 6.2.8 Cyber operations and the situation at the Polish-Belarusian border in 2021 -- 6.2.9 The case of Taiwan: Outreach and the man from nowhere -- 6.2.10 Attacks elsewhere -- 6.3 Electronic voting as a systemic vulnerability of a State -- 6.3.1 Transparency issues -- 6.3.2 Tread carefully with digitization -- 6.4 A general scenario - cyber-enabled information operation -- 6.5 How countries protect or defend themselves -- 6.5.1 EU GDPR, NIS - when it is worthwhile or necessary to act -- 6.5.2 CERTs and other institutions -- 6.6 Is it possible to secure the State? …”
    Libro electrónico
  11. 22831
    Tabla de Contenidos: “…In diebus illis Stephanus plenus gratia et fortitudine faciebat (Act . 6, 7-10 y 7, 54-59) (h . 16 r.-v.) . [Glosa] . …”
    Manuscrito
  12. 22832
    Publicado 2012
    Tabla de Contenidos: “…240 -- 11.7 Putting Strategic Communication into Practice 242 -- 11.8 Further Research 243 -- 11.9 Conclusion 243 -- References 243 -- PRACTICAL INSIGHTS FROM THE DUTCH EMPLOYERS' ASSOCIATION 247 -- Acting as an Information Resource 248 -- Focusing on the Added Value of Information 248 -- Co-Creating Added Value in Interaction with Companies 249 -- A Final Observation 250 -- References 250 -- 12 BLINDFOLDED THROUGH THE INFORMATION HURRICANE? …”
    Libro electrónico
  13. 22833
    Publicado 2010
    Tabla de Contenidos: “…-- TITLES -- DESCRIPTIONS -- TAGS -- CONTENT DISTRIBUTION -- LINKS -- LIKING: MICRO ACTS OF APPRECIATION YIELD MACRO IMPACTS -- NOTES -- Chapter 11: The New Media University 801 -- ESTABLISHING A SYNDICATION NETWORK -- SYNDICATING SOCIAL OBJECTS: AN ILLUSTRATION -- CHANNELING ILLUSTRATION: AN ACTIVITY STREAM -- AGGREGATION: ASSEMBLING THE PIECES -- EXAMPLE OF ACTIVITY STREAM -- IN-NETWORK AGGREGATION -- SYNDICATION: WEBCASTING SOCIAL OBJECTS -- AUTOPOSTS AND SYNDICATION -- DON'T CROSS THE STREAMS -- DESTINATION UNKNOWN: DEFINING THE JOURNEY THROUGH YOUR EXPERIENCE -- NOTES -- Chapter 12: The New Media University 901 -- ESTABLISHING AN ONLINE PRESENCE AND DEFINING THE BRAND PERSONA -- ONLINE PROFILES SPEAK VOLUMES ABOUT YOU AND YOUR BRAND -- MULTIPLE PERSONALITY DISORDER -- MULTIPLE PERSONALITY ORDER -- DISCOVERY AND ACTUALIZATION -- SHAPING THE BRAND PERSONA -- THE CENTER OF GRAVITY: CORE VALUES -- BRAND PILLARS -- BRAND CHARACTERISTICS -- PROMISE -- BRAND ASPIRATIONS -- OPPORTUNITIES -- CULTURE -- PERSONALITY -- NOTES -- Chapter 13: The New Media University 1001 -- FROM INTROVERSION TO EXTROVERSION -- THE NOW WEB -- THE RISE OF THE STATUSPHERE -- NEWS NO LONGER BREAKS, IT TWEETS -- THE ATTENTION RUBICON -- CHANNELING OUR FOCUS: THE ATTENTION DASHBOARD -- THE SOCIAL EFFECT: THE FUTURE OF BRANDING AND WORD OF MOUTH MARKETING -- NOTES -- Chapter 14: The New Media University 1101 -- IMPROVING THE SIGNAL-TO-NOISE RATIO -- Chapter 15: Fusing the Me in Social Media and the We in the Social Web -- CASTING A DIGITAL SHADOW: YOUR REPUTATION PRECEDES YOU -- DEFINING YOUR ONLINE PERSONA -- YOUR BRAND VERSUS THE BRANDS YOU REPRESENT…”
    Libro electrónico
  14. 22834
    por Lindley, Cody, 1976-
    Publicado 2013
    Tabla de Contenidos: “…Simple) Values -- The Primitive Values null, undefined, "string", 10, true, and false Are Not Objects -- How Primitive Values Are Stored/Copied in JavaScript -- Primitive Values Are Equal by Value -- The String, Number, and Boolean Primitive Values Act Like Objects When Used Like Objects -- Complex (a.k.a. …”
    Libro electrónico
  15. 22835
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- From Categories to Categorization: Studies in Sociology, Organizations and Strategy at The Crossroads -- Copyright Page -- Contents -- List of Contributors -- Editorial Advisory Board -- From Categories to Categorization: A Social Perspective on Market Categorization -- Introduction -- Two Facets of the Research on Market Categorization -- Categorization as the Activation of Cognitive Processes -- Categorization as a Social Process -- Actors Have Goals and Interests -- The Entity to Be Categorized May Not Be Fixed -- Acts of Categorization Remain Unmapped -- Context Characteristics Shape Outcomes -- Temporality Matters -- Volume Contributions -- Conclusion -- Acknowledgments -- References -- The Categorical Imperative Revisited: Implications of Categorization as a Theoretical Tool -- Introduction -- What Is the Categorical Imperative and Why Might We Care? …”
    Libro electrónico
  16. 22836
    por Holland, Margaret B.
    Publicado 2022
    Tabla de Contenidos: “…-- Formalization for Conservation and Climate Mitigation -- Seeking Formal Recognition as a Form of Resistance to Land and Resource Development -- Formalization as Legal Recognition of the Rights of Nature -- Aligning Top-Down and Bottom-Up for Strengthening Tenure Security -- References -- 12: Securing Communal Tenure Complemented by Collaborative Platforms for Improved Participatory Landscape Management and Sustainable Development: Lessons from Northern Tanzania and the Maasai Mara in Kenya -- The Relationships between Tenure, Sustainable Development, and Conservation -- The Mara-Serengeti-Tarangire Ecosystem Chain: Two Case Studies across One Border -- The Last Vestige of the Hadzabe: Tanzania's Last Hunter-Gatherers -- Conversion to Agriculture and Land Grabs: The Loss of Hadzabe Lands and Resources -- Certificate of Customary Right of Occupancy: Retrofitting Communality to the Village Acts -- Fragmenting the Manyatta: How Privatization and the Subdivision of Lands Blocked Collective Action on the Mara -- Collaborative Civil Society: Maasai Mara Wildlife Conservancies Association Busting down a Siloed Landscape and Breaking Tragedy of the Commons Mythology -- Conclusions and Recommendations: Communal Tenure, Collaborative Platforms, Conservation Incentives, and Explicit Management Agreements -- References -- 13: Beyond the Traditional: Voluntary Market-Based Initiatives to Promote Land Tenure Security -- The Causes of Forest Land Tenure Insecurities in Developing Countries -- FSC Certification as a Way to Address Forest Land Tenure Insecurity and Promote Forest Conservation…”
    Libro electrónico
  17. 22837
    Publicado 2007
    Tabla de Contenidos: “…-- Anecdotes of "changing places in fancy'' -- Consolation behaviour -- Russian doll model -- Acting like others -- Note -- References -- Mirror neurons and origins of neurosocial support of (pre)verbal intersubjectivity and altercentricity -- Mirror neurons and intersubjectivity -- Introduction -- Mirror neurons: Monkey data -- The mirror neuron system for actions in humans -- Mirror neurons and primary intersubjectivity: Behavioural studies on synchrony and infant imitation in human and nonhuman primates…”
    Libro electrónico
  18. 22838
    Publicado 2024
    Tabla de Contenidos: “…-- Choosing Go -- Concurrency and goroutines -- Concurrency -- Goroutines -- CSP-inspired model -- Share by communication -- Interacting with the OS -- Tooling -- go build -- go test -- go run -- go vet -- go fmt -- Cross-platform development with Go -- Summary -- Chapter 2: Refreshing Concurrency and Parallelism -- Technical requirements -- Understanding goroutines -- WaitGroup -- Changing shared state -- Managing data races -- Atomic operations -- Mutexes -- Making sense of channels -- How to use channels -- An unbuffered channel -- Buffered channels -- The guarantee of delivery -- Latency -- State and signaling -- State -- Signaling -- Choosing your synchronization mechanism -- Summary -- Part 2: Interation with the OS -- Chapter 3: Understanding System Calls -- Technical requirements -- Introduction to system calls -- The catalog of services and identification -- Information exchange -- The syscall package -- A closer look at the os and x/sys packages -- x/sys package - low-level system calls -- Operating system functionality -- Portability -- Everyday system calls -- Tracing system calls -- Tracing specific system calls -- Developing and testing a CLI program -- Standard streams -- File descriptors -- Creating a CLI application -- Redirections and standard streams -- Making it testable -- Summary -- Chapter 4: File and Directory Operations -- Technical requirements -- Identifying unsafe file and directory permissions -- Files and permissions -- Scanning directories in Go -- Understanding file paths -- Using the path/filepath package -- Traversing directories -- Symbolic links and unlinking files -- Symbolic links - the shortcut of the file world -- Unlinking files - the great escape act…”
    Libro electrónico
  19. 22839
    Publicado 2024
    Tabla de Contenidos: “…-- Summary -- Questions -- Chapter 9: Sound and Lip-Syncing -- Technical requirements -- Using sound in Blender -- Importing audio files into the Video Sequencer -- Using sound strips -- Timeline settings for working with sound -- Acting without speaking -- Key facial expressions -- Automatic keyframing and keying sets -- The science of lip-syncing -- Phonetics for animators…”
    Libro electrónico
  20. 22840
    Publicado 2017
    Tabla de Contenidos: “…2.1.3 The Importance of Fuel Switching in Natural Gas Demand Growth -- 2.2 Primary Factors Motivating Switching from Other Fuels to Natural Gas -- 2.2.1 Various Approaches to Natural Gas Replacement -- 2.2.2 Analysis of Driving Factors in OECD Member Countries Switching to Natural Gas -- 2.2.3 Further Analysis of Motivating Factors for a Country to Switch to Natural Gas -- 2.2.4 Summary -- 2.3 The Influence of Natural Gas Price on Demand -- 2.3.1 The Relationship Between Natural Gas Price Changes and Changes in Demand in OECD Countries Is not Pronounced -- 2.3.2 Limited Effect on Demand of Difference in Price Between Natural Gas and Other Energy Sources -- 2.4 Current State of Natural Gas Use in China and Future Trends -- 2.4.1 Sector Distribution and Total Gas Consumption in China Since 2000 -- 2.4.2 Mid- to Long-Term Energy and Natural Gas Development Plans in China -- 2.4.3 Mid- to Long-Term Natural Gas Development Trends for China Based on International Experiences -- 3 Potential for Natural Gas to Act as a Substitute Fuel in China -- 3.1 Power Generation: Cost Comparison of Gas as a &amp -- !…”
    Libro electrónico