Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Mecánica 618
- Engineering & Applied Sciences 343
- Materiales 308
- Technology: general issues 259
- History of engineering & technology 239
- Medicine 216
- Mechanical Engineering 212
- Research & information: general 199
- Law and legislation 196
- Taxation 185
- Propiedades mecánicas 183
- mechanical properties 183
- Mechanical engineering 177
- Development 176
- Física 165
- Engineering and Technology 146
- Physical Sciences 143
- Application software 141
- Management 134
- Computer networks 131
- Engineering 127
- Data processing 124
- History 122
- Security measures 121
- Computer security 113
- microstructure 113
- Economics 112
- Artificial intelligence 107
- Research 104
- Mechanical Engineering - General 103
-
10041Publicado 2017“…On the contrary DGK upregulation emerges as a non-oncogenic addition of certain tumors and represents one of the main mechanism by which cancer evades the immune attack. …”
Libro electrónico -
10042Publicado 2008“…One approach is based on formal or global kinetic mechanisms together with the computational fluid dynamics (CFD) tool. …”
Libro electrónico -
10043Publicado 2016“…Thus an entirely new paradigm in immunology, and more specifically in immune tolerance, is the coevolution of three systems, namely, the IDO1 mechanism, AhR-driven gene transcription, and T-cell regulatory activity, that originating from the initial need of protecting the fetus in mammals, have later turned into a pivotal mechanism of peripheral tolerance in autoimmunity, transplantation, and neoplasia…”
Libro electrónico -
10044Publicado 2017“…Lastly, you will also learn how to create and manage users access in an ConfigMgr environment By the end of this book, you will have learned to use the built-in mechanism to back up and restore data and also design maintenance plan. …”
Libro electrónico -
10045Publicado 2023“…The book begins by helping you get to grips with basic functions and algebraic datatypes, and gradually adds abstraction mechanisms and other powerful language features. Next, you'll explore recursion, formulate higher-order functions as reusable templates, and get the job done with laziness. …”
Libro electrónico -
10046Publicado 2023“…Through interactive examples and sample code, you will grasp approaches to filter malicious user input, sanitize model outputs, and implement robust validation mechanisms. The workshop specially focuses on skill-building around prompt engineering as a powerful mechanism to keep generative models restricted within secure guardrails. …”
Video -
10047Publicado 2019“…You'll then progress from creating basic shooting mechanics to more complex systems, such as user interface elements and intelligent enemy behavior. …”
Libro electrónico -
10048Publicado 2017“…With that strong foundation, Bill then teaches the language mechanics behind Go's concurrency primitives and covers all the things you need to know to design concurrent software. …”
-
10049Publicado 2020“…Current research on immunomodulation is focused on understanding the fundamental mechanisms that control the activation and regulation of innate immune cell function. …”
Libro electrónico -
10050Publicado 2013Tabla de Contenidos: “…-- Foreword xiii -- Preface xv -- List of Symbols xvii -- Acronyms and Abbreviations xix -- 1 Radio Wave Fundamentals 1 -- 1.1 Maxwell's Equations 1 -- 1.2 Free Space Propagation 3 -- 1.3 Uniform Plane Wave Propagation 3 -- 1.4 Propagation of Electromagnetic Waves in Isotropic and Homogeneous Media 5 -- 1.5 Wave Polarization 8 -- 1.6 Propagation Mechanisms 11 -- 1.6.1 Reflection by an Isotropic Material 12 -- 1.6.2 Reflection/Refraction by an Anisotropic Material 18 -- 1.6.3 Diffuse Reflection/Scattering 19 -- 1.6.4 Diffraction 20 -- 1.7 Propagation in the Earth's Atmosphere 21 -- 1.7.1 Properties of the Earth's Atmosphere 21 -- 1.7.2 Radio Waves in the Ionosphere 25 -- 1.8 Frequency Dispersion of Radio Waves 29 -- 1.8.1 Phase Velocity versus Group Velocity 30 -- 1.8.2 Group Path versus Phase Path 31 -- 1.8.3 Phase Path Stability: Doppler Shift/Dispersion 32 -- References 33 -- 2 Radio Wave Transmission 35 -- 2.1 Free Space Transmission 35 -- 2.1.1 Path Loss 35 -- 2.1.2 Relating Power to the Electric Field 37 -- 2.2 Transmission Loss of Radio Waves in the Earth's Atmosphere 38 -- 2.2.1 Attenuation due to Gases in the Lower Atmosphere and Rain: Troposphere 38 -- 2.2.2 Attenuation of Radio Waves in an Ionized Medium: Ionosphere 41 -- 2.3 Attenuation Due to Propagation into Buildings 43 -- 2.4 Transmission Loss due to Penetration into Vehicles 46 -- 2.5 Diffraction Loss 49 -- 2.5.1 Fundamentals of Diffraction Loss: Huygen's Principle 49 -- 2.5.2 Diffraction Loss Due to a Single Knife Edge: Fresnel Integral Approach 50 -- 2.6 Diffraction Loss Models 54 -- 2.6.1 Single Knife Edge Diffraction Loss 54 -- 2.6.2 Multiple Edge Diffraction Loss 55 -- 2.7 Path Loss Due to Scattering 57 -- 2.8 Multipath Propagation: Two-Ray Model 57 -- 2.8.1 Two-Ray Model in a Nondispersive Medium 58 -- 2.8.2 Two-Ray Model due to LOS and Ground Reflected Wave: Plane Earth Model 59 -- 2.8.3 Two-Ray Propagation via the Ionosphere 63 -- 2.9 General Multipath Propagation 66 -- 2.9.1 Time Dispersion due to Multipath Propagation 66.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10051Publicado 2020Tabla de Contenidos: “…The local content management framework -- 3.1 Overview of local content requirements in Uganda's oil industry -- 3.2 Evaluation of local content requirements -- 3.2.1 Clarity of scope and provisions for measurement -- 3.2.2 Presence of monitoring mechanisms -- 3.2.3 Feasibility of implementation -- 4. …”
Libro electrónico -
10052Publicado 2018Tabla de Contenidos: “…10.6.1 Commissions and Considerations 217 -- 10.6.2 Selected Standards 217 -- 10.7 Summary 219 -- 11 Security Schemes for AMI Private Networks 221 -- 11.1 Preliminaries 221 -- 11.1.1 Security Services 221 -- 11.1.2 Security Mechanisms 222 -- 11.1.3 Notations of the Keys Used inThis Chapter 223 -- 11.2 Initial Authentication 223 -- 11.2.1 An Overview of the Proposed Authentication Process 223 -- 11.2.1.1 DAP Authentication Process 224 -- 11.2.1.2 Smart Meter Authentication Process 225 -- 11.2.2 The Authentication Handshake Protocol 226 -- 11.2.3 Security Analysis 229 -- 11.3 Proposed Security Protocol in Uplink Transmissions 230 -- 11.3.1 Single-Traffic Uplink Encryption 231 -- 11.3.2 Multiple-Traffic Uplink Encryption 232 -- 11.3.3 Decryption Process in Uplink Transmissions 233 -- 11.3.4 Security Analysis 235 -- 11.4 Proposed Security Protocol in Downlink Transmissions 235 -- 11.4.1 Broadcast Control Message Encryption 236 -- 11.4.2 One-to-One Control Message Encryption 236 -- 11.4.3 Security Analysis 237 -- 11.5 Domain Secrets Update 238 -- 11.5.1 AS Public/Private Keys Update 238 -- 11.5.2 Active Secret Key Update 238 -- 11.5.3 Preshared Secret Key Update 239 -- 11.6 Summary 239 -- 12 Security Schemes for Smart Grid Communications over Public Networks 241 -- 12.1 Overview of the Proposed Security Schemes 241 -- 12.1.1 Background and Motivation 241 -- 12.1.2 Applications of the Proposed Security Schemes in the Smart Grid 242 -- 12.2 Proposed ID-Based Scheme 244 -- 12.2.1 Preliminaries 244 -- 12.2.2 Identity-Based Signcryption 245 -- 12.2.2.1 Setup 245 -- 12.2.2.2 Keygen 245 -- 12.2.2.3 Signcryption 246 -- 12.2.2.4 Decryption 246 -- 12.2.2.5 Verification 246 -- 12.2.3 Consistency of the Proposed IBSC Scheme 247 -- 12.2.4 Identity-Based Signature 247 -- 12.2.4.1 Signature 248 -- 12.2.4.2 Verification 248 -- 12.2.5 Key Distribution and Symmetrical Cryptography 248 -- 12.3 Single Proxy Signing Rights Delegation 249 -- 12.3.1 Certificate Distribution by the Local Control Center 249.…”
Libro electrónico -
10053Publicado 2018Tabla de Contenidos: “…6.3.3.4 Partitioning in Graph Processing 166 -- 6.3.3.5 Dynamic Repartitioning in Graph Processing 167 -- 6.3.4 State of the Art: Priorities and Deadlines in Batch Processing Systems 167 -- 6.3.4.1 OS Mechanisms 167 -- 6.3.4.2 Preemption 167 -- 6.3.4.3 Real-Time Scheduling 168 -- 6.3.4.4 Fairness 168 -- 6.3.4.5 Cluster Management with SLOs 168 -- 6.4 Reconfigurations in NoSQL and Key-Value Storage/Databases 169 -- 6.4.1 Motivation 169 -- 6.4.2 Morphus: Reconfigurations in Sharded Databases/Storage 170 -- 6.4.2.1 Assumptions 170 -- 6.4.2.2 MongoDB System Model 170 -- 6.4.2.3 Reconfiguration Phases in Morphus 171 -- 6.4.2.4 Algorithms for Efficient Shard Key Reconfigurations 172 -- 6.4.2.5 Network Awareness 175 -- 6.4.2.6 Evaluation 175 -- 6.4.3 Parqua: Reconfigurations in Distributed Key-Value Stores 179 -- 6.4.3.1 System Model 180 -- 6.4.3.2 System Design and Implementation 181 -- 6.4.3.3 Experimental Evaluation 183 -- 6.5 Scale-Out and Scale-In Operations 185 -- 6.5.1 Stela: Scale-Out/Scale-In in Distributed Stream Processing Systems 186 -- 6.5.1.1 Motivation 186 -- 6.5.1.2 Data Stream Processing Model and Assumptions 187 -- 6.5.1.3 Stela: Scale-Out Overview 187 -- 6.5.1.4 Effective Throughput Percentage (ETP) 188 -- 6.5.1.5 Iterative Assignment and Intuition 190 -- 6.5.1.6 Stela: Scale-In 191 -- 6.5.1.7 Core Architecture 191 -- 6.5.1.8 Evaluation 193 -- 6.5.1.9 Experimental Setup 193 -- 6.5.1.10 Yahoo! …”
Libro electrónico -
10054Publicado 2009Tabla de Contenidos: “…10.4.2 Test for the EDGE System 443 -- 10.4.3 Test for the UMTS System 445 -- 10.4.4 Tests for the EDGE-to-UMTS System 445 -- 10.5 Conclusions 452 -- References 453 -- 11 Context-based Visual Media Content Adaptation 455 -- 11.1 Introduction 455 -- 11.2 Overview of the State of the Art in Context-aware Content Adaptation 457 -- 11.2.1 Recent Developments in Context-aware Systems 457 -- 11.2.2 Standardization Efforts on Contextual Information for Content Adaptation 467 -- 11.3 Other Standardization Efforts by the IETF and W3C 476 -- 11.4 Summary of Standardization Activities 479 -- 11.4.1 Integrating Digital Rights Management (DRM) with Adaptation 480 -- 11.4.2 Existing DRM Initiatives 480 -- 11.4.3 The New ''Adaptation Authorization'' Concept 481 -- 11.4.4 Adaptation Decision 482 -- 11.4.5 Context-based Content Adaptation 488 -- 11.5 Generation of Contextual Information and Profiling 492 -- 11.5.1 Types and Representations of Contextual Information 492 -- 11.5.2 Context Providers and Profiling 494 -- 11.5.3 User Privacy 497 -- 11.5.4 Generation of Contextual Information 498 -- 11.6 The Application Scenario for Context-based Adaptation of Governed Media Contents 499 -- 11.6.1 Virtual Classroom Application Scenario 500 -- 11.6.2 Mechanisms using Contextual Information in a Virtual Collaboration Application 502 -- 11.6.3 Ontologies in Context-aware Content Adaptation 503 -- 11.6.4 System Architecture of a Scalable Platform for Context-aware and DRM-enabled Content Adaptation 504 -- 11.6.5 Context Providers 507 -- 11.6.6 Adaptation Decision Engine 510 -- 11.6.7 Adaptation Authorization 514 -- 11.6.8 Adaptation Engines Stack 517 -- 11.6.9 Interfaces between Modules of the Content Adaptation Platform 544 -- 11.7 Conclusions 552 -- References 553 -- Index 559.…”
Libro electrónico -
10055por Jakobsen, Adam TilmarTabla de Contenidos: “…6.4.9.8 Browser Password -- 6.4.9.9 Supercookies -- 6.4.10 Mail -- 6.4.10.1 Mail Archives -- 6.4.10.2 Offline Folder Files -- 6.4.10.3 Unread Mail -- 6.4.11 Persistence -- 6.4.11.1 Auto Start Programs -- 6.4.11.2 Scheduled Tasks -- 6.4.11.3 Service -- 6.4.12 Evidence Destruction -- 6.4.12.1 Log Clearing -- 6.4.12.2 File Deletion Detection Using J -- 6.5 Summary -- Chapter 7 macOS Forensics -- 7.1 File System -- 7.1.1 Native File Types -- 7.2 Security -- 7.3 Acquisition -- 7.3.1 Memory -- 7.3.1.1 Hibernation and RAM -- 7.4 Analysis -- 7.5 Evidence Location -- 7.5.1 System Configuration -- 7.5.2 User Accounts and Activity -- 7.5.2.1 Keychain -- 7.5.2.2 Notes -- 7.5.2.3 Recent Items -- 7.5.3 System Logs -- 7.5.4 Browser Usage -- 7.5.5 Email -- 7.5.6 Persistence Mechanisms -- 7.5.6.1 Login Item -- 7.5.6.2 Launch Items (Agents and Daemons) -- 7.5.6.3 Log In/Log Out Hooks -- 7.5.6.4 Dynamic Libraries (dylib) -- 7.5.6.5 At Tasks -- 7.5.6.6 Event Monitor Rules -- 7.5.6.7 Re‐opened Applications -- 7.5.7 Evidence of Destruction -- 7.6 Summary -- Chapter 8 Linux Forensics -- 8.1 File System -- 8.1.1 File System Timestamps -- 8.2 Security -- 8.3 Acquisition -- 8.3.1 Dump Memory -- 8.4 Analysis -- 8.4.1 chroot -- 8.5 Evidence Location -- 8.5.1 System Info -- 8.5.1.1 System Version -- 8.5.1.2 Computer Name -- 8.5.1.3 Localtime Settings -- 8.5.1.4 Boot Logs -- 8.5.1.5 Kernel Logs -- 8.5.1.6 Apt Install Repository Sources -- 8.5.1.7 Hosts File -- 8.5.1.8 Root UUID -- 8.5.1.9 Services -- 8.5.1.10 Syslogs -- 8.5.1.11 Background Processes -- 8.5.1.12 Disk Partitions -- 8.5.2 User Activity -- 8.5.2.1 Accounts and Groups -- 8.5.2.2 Group Information -- 8.5.2.3 Command History -- 8.5.2.4 Authentication -- 8.5.2.5 Last Login -- 8.5.2.6 Failed Logon Attempts -- 8.5.2.7 Installation of Software -- 8.5.2.8 File Edit -- 8.5.3 Network -- 8.5.3.1 Interfaces…”
Publicado 2024
Libro electrónico -
10056por Feng, Hui“…Presenting a systematic political economy model in analyzing Beijing's decision-making mechanisms, the book argues that China's WTO policy making is a state-led, leadership driven, and top-down process. …”
Publicado 2006
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10057por Rodríguez Arenas, Mario“…Drawing on the teachings of Francisco Tárrega, it explores left-hand fingering techniques and emphasizes the importance of right-hand mechanisms for achieving skillful execution. The work is designed for guitar enthusiasts and aims to demonstrate that the instrument is not as difficult as often perceived. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
10058por Martyniuk, Claudio“…It combines personal narratives and historical accounts to provide insight into the mechanisms of state terror and its lasting impact…”
Publicado 2016
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Libro electrónico -
10059por Charaudeau, Patrick“…Patrick Charaudeau's 'El Discurso Político: Las Máscaras del Poder' delves into the intricate mechanisms of political discourse, exploring how language shapes power dynamics and societal perceptions. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10060por Rubertis, Victor de“…It cautions against excessive mechanical practice and encourages students to focus on musical expression and understanding the composer's intentions. …”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico