Mostrando 10,041 - 10,060 Resultados de 13,297 Para Buscar '"The Mechanic"', tiempo de consulta: 0.13s Limitar resultados
  1. 10041
    Publicado 2017
    “…On the contrary DGK upregulation emerges as a non-oncogenic addition of certain tumors and represents one of the main mechanism by which cancer evades the immune attack. …”
    Libro electrónico
  2. 10042
    Publicado 2008
    “…One approach is based on formal or global kinetic mechanisms together with the computational fluid dynamics (CFD) tool. …”
    Libro electrónico
  3. 10043
    Publicado 2016
    “…Thus an entirely new paradigm in immunology, and more specifically in immune tolerance, is the coevolution of three systems, namely, the IDO1 mechanism, AhR-driven gene transcription, and T-cell regulatory activity, that originating from the initial need of protecting the fetus in mammals, have later turned into a pivotal mechanism of peripheral tolerance in autoimmunity, transplantation, and neoplasia…”
    Libro electrónico
  4. 10044
    Publicado 2017
    “…Lastly, you will also learn how to create and manage users access in an ConfigMgr environment By the end of this book, you will have learned to use the built-in mechanism to back up and restore data and also design maintenance plan. …”
    Libro electrónico
  5. 10045
    Publicado 2023
    “…The book begins by helping you get to grips with basic functions and algebraic datatypes, and gradually adds abstraction mechanisms and other powerful language features. Next, you'll explore recursion, formulate higher-order functions as reusable templates, and get the job done with laziness. …”
    Libro electrónico
  6. 10046
    Publicado 2023
    “…Through interactive examples and sample code, you will grasp approaches to filter malicious user input, sanitize model outputs, and implement robust validation mechanisms. The workshop specially focuses on skill-building around prompt engineering as a powerful mechanism to keep generative models restricted within secure guardrails. …”
    Video
  7. 10047
    Publicado 2019
    “…You'll then progress from creating basic shooting mechanics to more complex systems, such as user interface elements and intelligent enemy behavior. …”
    Libro electrónico
  8. 10048
    Publicado 2017
    “…With that strong foundation, Bill then teaches the language mechanics behind Go's concurrency primitives and covers all the things you need to know to design concurrent software. …”
    Video
  9. 10049
    Publicado 2020
    “…Current research on immunomodulation is focused on understanding the fundamental mechanisms that control the activation and regulation of innate immune cell function. …”
    Libro electrónico
  10. 10050
    Publicado 2013
    Tabla de Contenidos: “…-- Foreword xiii -- Preface xv -- List of Symbols xvii -- Acronyms and Abbreviations xix -- 1 Radio Wave Fundamentals 1 -- 1.1 Maxwell's Equations 1 -- 1.2 Free Space Propagation 3 -- 1.3 Uniform Plane Wave Propagation 3 -- 1.4 Propagation of Electromagnetic Waves in Isotropic and Homogeneous Media 5 -- 1.5 Wave Polarization 8 -- 1.6 Propagation Mechanisms 11 -- 1.6.1 Reflection by an Isotropic Material 12 -- 1.6.2 Reflection/Refraction by an Anisotropic Material 18 -- 1.6.3 Diffuse Reflection/Scattering 19 -- 1.6.4 Diffraction 20 -- 1.7 Propagation in the Earth's Atmosphere 21 -- 1.7.1 Properties of the Earth's Atmosphere 21 -- 1.7.2 Radio Waves in the Ionosphere 25 -- 1.8 Frequency Dispersion of Radio Waves 29 -- 1.8.1 Phase Velocity versus Group Velocity 30 -- 1.8.2 Group Path versus Phase Path 31 -- 1.8.3 Phase Path Stability: Doppler Shift/Dispersion 32 -- References 33 -- 2 Radio Wave Transmission 35 -- 2.1 Free Space Transmission 35 -- 2.1.1 Path Loss 35 -- 2.1.2 Relating Power to the Electric Field 37 -- 2.2 Transmission Loss of Radio Waves in the Earth's Atmosphere 38 -- 2.2.1 Attenuation due to Gases in the Lower Atmosphere and Rain: Troposphere 38 -- 2.2.2 Attenuation of Radio Waves in an Ionized Medium: Ionosphere 41 -- 2.3 Attenuation Due to Propagation into Buildings 43 -- 2.4 Transmission Loss due to Penetration into Vehicles 46 -- 2.5 Diffraction Loss 49 -- 2.5.1 Fundamentals of Diffraction Loss: Huygen's Principle 49 -- 2.5.2 Diffraction Loss Due to a Single Knife Edge: Fresnel Integral Approach 50 -- 2.6 Diffraction Loss Models 54 -- 2.6.1 Single Knife Edge Diffraction Loss 54 -- 2.6.2 Multiple Edge Diffraction Loss 55 -- 2.7 Path Loss Due to Scattering 57 -- 2.8 Multipath Propagation: Two-Ray Model 57 -- 2.8.1 Two-Ray Model in a Nondispersive Medium 58 -- 2.8.2 Two-Ray Model due to LOS and Ground Reflected Wave: Plane Earth Model 59 -- 2.8.3 Two-Ray Propagation via the Ionosphere 63 -- 2.9 General Multipath Propagation 66 -- 2.9.1 Time Dispersion due to Multipath Propagation 66.…”
    Libro electrónico
  11. 10051
    Publicado 2020
    Tabla de Contenidos: “…The local content management framework -- 3.1 Overview of local content requirements in Uganda's oil industry -- 3.2 Evaluation of local content requirements -- 3.2.1 Clarity of scope and provisions for measurement -- 3.2.2 Presence of monitoring mechanisms -- 3.2.3 Feasibility of implementation -- 4. …”
    Libro electrónico
  12. 10052
    Publicado 2018
    Tabla de Contenidos: “…10.6.1 Commissions and Considerations 217 -- 10.6.2 Selected Standards 217 -- 10.7 Summary 219 -- 11 Security Schemes for AMI Private Networks 221 -- 11.1 Preliminaries 221 -- 11.1.1 Security Services 221 -- 11.1.2 Security Mechanisms 222 -- 11.1.3 Notations of the Keys Used inThis Chapter 223 -- 11.2 Initial Authentication 223 -- 11.2.1 An Overview of the Proposed Authentication Process 223 -- 11.2.1.1 DAP Authentication Process 224 -- 11.2.1.2 Smart Meter Authentication Process 225 -- 11.2.2 The Authentication Handshake Protocol 226 -- 11.2.3 Security Analysis 229 -- 11.3 Proposed Security Protocol in Uplink Transmissions 230 -- 11.3.1 Single-Traffic Uplink Encryption 231 -- 11.3.2 Multiple-Traffic Uplink Encryption 232 -- 11.3.3 Decryption Process in Uplink Transmissions 233 -- 11.3.4 Security Analysis 235 -- 11.4 Proposed Security Protocol in Downlink Transmissions 235 -- 11.4.1 Broadcast Control Message Encryption 236 -- 11.4.2 One-to-One Control Message Encryption 236 -- 11.4.3 Security Analysis 237 -- 11.5 Domain Secrets Update 238 -- 11.5.1 AS Public/Private Keys Update 238 -- 11.5.2 Active Secret Key Update 238 -- 11.5.3 Preshared Secret Key Update 239 -- 11.6 Summary 239 -- 12 Security Schemes for Smart Grid Communications over Public Networks 241 -- 12.1 Overview of the Proposed Security Schemes 241 -- 12.1.1 Background and Motivation 241 -- 12.1.2 Applications of the Proposed Security Schemes in the Smart Grid 242 -- 12.2 Proposed ID-Based Scheme 244 -- 12.2.1 Preliminaries 244 -- 12.2.2 Identity-Based Signcryption 245 -- 12.2.2.1 Setup 245 -- 12.2.2.2 Keygen 245 -- 12.2.2.3 Signcryption 246 -- 12.2.2.4 Decryption 246 -- 12.2.2.5 Verification 246 -- 12.2.3 Consistency of the Proposed IBSC Scheme 247 -- 12.2.4 Identity-Based Signature 247 -- 12.2.4.1 Signature 248 -- 12.2.4.2 Verification 248 -- 12.2.5 Key Distribution and Symmetrical Cryptography 248 -- 12.3 Single Proxy Signing Rights Delegation 249 -- 12.3.1 Certificate Distribution by the Local Control Center 249.…”
    Libro electrónico
  13. 10053
    Publicado 2018
    Tabla de Contenidos: “…6.3.3.4 Partitioning in Graph Processing 166 -- 6.3.3.5 Dynamic Repartitioning in Graph Processing 167 -- 6.3.4 State of the Art: Priorities and Deadlines in Batch Processing Systems 167 -- 6.3.4.1 OS Mechanisms 167 -- 6.3.4.2 Preemption 167 -- 6.3.4.3 Real-Time Scheduling 168 -- 6.3.4.4 Fairness 168 -- 6.3.4.5 Cluster Management with SLOs 168 -- 6.4 Reconfigurations in NoSQL and Key-Value Storage/Databases 169 -- 6.4.1 Motivation 169 -- 6.4.2 Morphus: Reconfigurations in Sharded Databases/Storage 170 -- 6.4.2.1 Assumptions 170 -- 6.4.2.2 MongoDB System Model 170 -- 6.4.2.3 Reconfiguration Phases in Morphus 171 -- 6.4.2.4 Algorithms for Efficient Shard Key Reconfigurations 172 -- 6.4.2.5 Network Awareness 175 -- 6.4.2.6 Evaluation 175 -- 6.4.3 Parqua: Reconfigurations in Distributed Key-Value Stores 179 -- 6.4.3.1 System Model 180 -- 6.4.3.2 System Design and Implementation 181 -- 6.4.3.3 Experimental Evaluation 183 -- 6.5 Scale-Out and Scale-In Operations 185 -- 6.5.1 Stela: Scale-Out/Scale-In in Distributed Stream Processing Systems 186 -- 6.5.1.1 Motivation 186 -- 6.5.1.2 Data Stream Processing Model and Assumptions 187 -- 6.5.1.3 Stela: Scale-Out Overview 187 -- 6.5.1.4 Effective Throughput Percentage (ETP) 188 -- 6.5.1.5 Iterative Assignment and Intuition 190 -- 6.5.1.6 Stela: Scale-In 191 -- 6.5.1.7 Core Architecture 191 -- 6.5.1.8 Evaluation 193 -- 6.5.1.9 Experimental Setup 193 -- 6.5.1.10 Yahoo! …”
    Libro electrónico
  14. 10054
    Publicado 2009
    Tabla de Contenidos: “…10.4.2 Test for the EDGE System 443 -- 10.4.3 Test for the UMTS System 445 -- 10.4.4 Tests for the EDGE-to-UMTS System 445 -- 10.5 Conclusions 452 -- References 453 -- 11 Context-based Visual Media Content Adaptation 455 -- 11.1 Introduction 455 -- 11.2 Overview of the State of the Art in Context-aware Content Adaptation 457 -- 11.2.1 Recent Developments in Context-aware Systems 457 -- 11.2.2 Standardization Efforts on Contextual Information for Content Adaptation 467 -- 11.3 Other Standardization Efforts by the IETF and W3C 476 -- 11.4 Summary of Standardization Activities 479 -- 11.4.1 Integrating Digital Rights Management (DRM) with Adaptation 480 -- 11.4.2 Existing DRM Initiatives 480 -- 11.4.3 The New ''Adaptation Authorization'' Concept 481 -- 11.4.4 Adaptation Decision 482 -- 11.4.5 Context-based Content Adaptation 488 -- 11.5 Generation of Contextual Information and Profiling 492 -- 11.5.1 Types and Representations of Contextual Information 492 -- 11.5.2 Context Providers and Profiling 494 -- 11.5.3 User Privacy 497 -- 11.5.4 Generation of Contextual Information 498 -- 11.6 The Application Scenario for Context-based Adaptation of Governed Media Contents 499 -- 11.6.1 Virtual Classroom Application Scenario 500 -- 11.6.2 Mechanisms using Contextual Information in a Virtual Collaboration Application 502 -- 11.6.3 Ontologies in Context-aware Content Adaptation 503 -- 11.6.4 System Architecture of a Scalable Platform for Context-aware and DRM-enabled Content Adaptation 504 -- 11.6.5 Context Providers 507 -- 11.6.6 Adaptation Decision Engine 510 -- 11.6.7 Adaptation Authorization 514 -- 11.6.8 Adaptation Engines Stack 517 -- 11.6.9 Interfaces between Modules of the Content Adaptation Platform 544 -- 11.7 Conclusions 552 -- References 553 -- Index 559.…”
    Libro electrónico
  15. 10055
    por Jakobsen, Adam Tilmar
    Publicado 2024
    Tabla de Contenidos: “…6.4.9.8 Browser Password -- 6.4.9.9 Supercookies -- 6.4.10 Mail -- 6.4.10.1 Mail Archives -- 6.4.10.2 Offline Folder Files -- 6.4.10.3 Unread Mail -- 6.4.11 Persistence -- 6.4.11.1 Auto Start Programs -- 6.4.11.2 Scheduled Tasks -- 6.4.11.3 Service -- 6.4.12 Evidence Destruction -- 6.4.12.1 Log Clearing -- 6.4.12.2 File Deletion Detection Using J -- 6.5 Summary -- Chapter 7 macOS Forensics -- 7.1 File System -- 7.1.1 Native File Types -- 7.2 Security -- 7.3 Acquisition -- 7.3.1 Memory -- 7.3.1.1 Hibernation and RAM -- 7.4 Analysis -- 7.5 Evidence Location -- 7.5.1 System Configuration -- 7.5.2 User Accounts and Activity -- 7.5.2.1 Keychain -- 7.5.2.2 Notes -- 7.5.2.3 Recent Items -- 7.5.3 System Logs -- 7.5.4 Browser Usage -- 7.5.5 Email -- 7.5.6 Persistence Mechanisms -- 7.5.6.1 Login Item -- 7.5.6.2 Launch Items (Agents and Daemons) -- 7.5.6.3 Log In/Log Out Hooks -- 7.5.6.4 Dynamic Libraries (dylib) -- 7.5.6.5 At Tasks -- 7.5.6.6 Event Monitor Rules -- 7.5.6.7 Re‐opened Applications -- 7.5.7 Evidence of Destruction -- 7.6 Summary -- Chapter 8 Linux Forensics -- 8.1 File System -- 8.1.1 File System Timestamps -- 8.2 Security -- 8.3 Acquisition -- 8.3.1 Dump Memory -- 8.4 Analysis -- 8.4.1 chroot -- 8.5 Evidence Location -- 8.5.1 System Info -- 8.5.1.1 System Version -- 8.5.1.2 Computer Name -- 8.5.1.3 Localtime Settings -- 8.5.1.4 Boot Logs -- 8.5.1.5 Kernel Logs -- 8.5.1.6 Apt Install Repository Sources -- 8.5.1.7 Hosts File -- 8.5.1.8 Root UUID -- 8.5.1.9 Services -- 8.5.1.10 Syslogs -- 8.5.1.11 Background Processes -- 8.5.1.12 Disk Partitions -- 8.5.2 User Activity -- 8.5.2.1 Accounts and Groups -- 8.5.2.2 Group Information -- 8.5.2.3 Command History -- 8.5.2.4 Authentication -- 8.5.2.5 Last Login -- 8.5.2.6 Failed Logon Attempts -- 8.5.2.7 Installation of Software -- 8.5.2.8 File Edit -- 8.5.3 Network -- 8.5.3.1 Interfaces…”
    Libro electrónico
  16. 10056
    por Feng, Hui
    Publicado 2006
    “…Presenting a systematic political economy model in analyzing Beijing's decision-making mechanisms, the book argues that China's WTO policy making is a state-led, leadership driven, and top-down process. …”
    Libro electrónico
  17. 10057
    por Rodríguez Arenas, Mario
    Publicado 2015
    “…Drawing on the teachings of Francisco Tárrega, it explores left-hand fingering techniques and emphasizes the importance of right-hand mechanisms for achieving skillful execution. The work is designed for guitar enthusiasts and aims to demonstrate that the instrument is not as difficult as often perceived. …”
    Libro electrónico
  18. 10058
    por Martyniuk, Claudio
    Publicado 2016
    “…It combines personal narratives and historical accounts to provide insight into the mechanisms of state terror and its lasting impact…”
    Enlace del recurso
    Libro electrónico
  19. 10059
    por Charaudeau, Patrick
    Publicado 2021
    “…Patrick Charaudeau's 'El Discurso Político: Las Máscaras del Poder' delves into the intricate mechanisms of political discourse, exploring how language shapes power dynamics and societal perceptions. …”
    Libro electrónico
  20. 10060
    por Rubertis, Victor de
    Publicado 2017
    “…It cautions against excessive mechanical practice and encourages students to focus on musical expression and understanding the composer's intentions. …”
    Libro electrónico