Mostrando 20,461 - 20,480 Resultados de 26,560 Para Buscar '"performance"', tiempo de consulta: 0.15s Limitar resultados
  1. 20461
    por Monson, Philip
    Publicado 2005
    Tabla de Contenidos: “…4.2 Configuring Workplace Collaboration Services security -- 4.2.1 LDAP security overview -- 4.2.2 Configuration Wizard: Disabling WebSphere Member Manager CUR security -- 4.2.3 Required user accounts for enabling Workplace Collaboration Services external LDAP security -- 4.2.4 Editing the security helper files -- 4.2.5 Enabling external LDAP security -- 4.2.6 Verifying the security configuration -- 4.2.7 (Optional) Configuring read-only LDAP access for Tivoli Directory Server and Domino -- 4.3 Configuring the Workplace Collaboration Services data store -- 4.3.1 Overview: The Workplace Collaboration Services data store -- 4.3.2 What you need -- 4.3.3 Installing the DB2 Administration Client software -- 4.3.4 Installing Fix Pack 7a for the DB2 Administration Client -- 4.3.5 Installing DB2 UDB Enterprise Server Edition on a remote server -- 4.3.6 Creating and configuring the Workplace Collaboration Services database -- 4.3.7 Details: DB2 database creation and configuration -- 4.3.8 Transferring WebSphere Portal data from Cloudscape to DB2 -- 4.3.9 Migrating Workplace Collaboration Services data to DB2 -- 4.3.10 Running reorgchk for performance -- 4.3.11 Verifying Workplace Collaboration Services deployment status after data store configuration -- 4.4 Running Workplace Collaboration Services configuration script to connect to external HTTP server -- 4.4.1 Installing IBM HTTP Server -- 4.4.2 Configuring IBM HTTP Server -- 4.4.3 Connecting Workplace Collaboration Services to the external HTTP server -- 4.4.4 Updating the WebSphere Application Server plug-in -- 4.4.5 Configuring Collaborative Learning for external HTTP -- 4.4.6 Verifying the Workplace Collaboration Services deployment with remote HTTP -- 4.5 Next steps -- Chapter 5. …”
    Libro electrónico
  2. 20462
    Publicado 2012
    Tabla de Contenidos: “…8.2 Working with Strings -- 8.2.1 Reading a string -- 8.2.2 Writing a string -- 8.2.3 Comparing strings -- 8.2.4 Copying one string into other -- 8.2.5 Length of a string -- 8.2.6 Concatenation of strings -- 8.3 Useful Functions for Operating on Strings -- 8.4 Simple String Programs -- 8.4.1 Capitalize first character -- 8.4.2 Reading a string containing blank -- 8.4.3 Removing return from a string -- 8.4.4 Sorting strings -- 8.4.5 Printing Strings with Field Specifications -- 8.4.6 Copying strings -- 8.5 Our Own Strings -- 8.6 Constructors for Type String -- 8.7 Interactive Constructor for Class String -- 8.8 Operator Overloading with Class String -- For Advanced Readers -- Summary -- Multiple Choice Questions and Answers -- Exercises -- Chapter 9: Inheritance I -- 9.1 Introduction -- 9.2 Derived and Base Class -- 9.3 Public Derivation -- 9.3.1 Public members of base class -- 9.3.2 Private members of base class -- 9.3.3 Protected members of base class -- 9.4 Private Derivation -- 9.5 Protected Derivation -- 9.6 Function Overriding -- 9.6.1 Overriding and overloading -- 9.7 Base and Derived Class Constructors -- 9.8 End of Chapter Programs -- 9.8.1 Working with private derivation -- 9.8.2 Program on students and their performance -- 9.8.3 Function overriding: different signature -- For Advanced Readers -- Summary -- Multiple Choice Questions and Answers -- Exercises -- Chapter 10: Inheritance II -- 10.1 Multiple Inheritance -- 10.2 Hierarchical Inheritance -- 10.3 Multilevel Inheritance -- 10.4 Hybrid Inheritance -- 10.5 A Multipath Inheritance -- 10.6 Virtual Base Class -- 10.7 Constructors for Virtual Base Classes -- 10.8 Classification of Inheritance -- 10.9 Relationships -- 10.9.1 is-a Relationship -- 10.9.2 has-a Relationship -- 10.10 Practical Class Definition -- For Advanced Readers -- Summary -- Multiple Choice Questions and Answers…”
    Libro electrónico
  3. 20463
    Publicado 2018
    Tabla de Contenidos: “…2.5.4 Relative humidity measurement -- 2.5.5 Tilt measurement -- 2.5.6 Other applications -- 2.6 Future trends -- Sources of further information and advice -- References -- 3 - Smart temperature sensors and temperature sensor systems -- 3.1 Introduction -- 3.2 Measuring temperature, temperature differences, and temperature changes in industrial applications -- 3.3 Temperature-sensing elements -- 3.3.1 Introduction -- 3.3.2 Temperature sensor characteristics of bipolar junction transistors -- 3.3.3 ΔVBE temperature sensors -- 3.3.4 Bipolar junction transistors in complementary metal-oxide semiconductor (CMOS) technology -- 3.4 Basic concepts of smart temperature sensors -- 3.4.1 Architectures of smart temperature sensor systems -- 3.4.2 Temperature sensors with a duty-cycle-modulated (DEM) output -- 3.5 Methods to improve the accuracy of CMOS smart temperature-sensor systems -- 3.5.1 Dynamic element matching -- 3.5.2 Chopping -- 3.6 Principles of BJT-based smart temperature sensors with DCM -- 3.7 Signal processing of duty cycle modulated signals -- 3.7.1 Three methods of averaging -- 3.7.1.1 First type of averaging: best accuracy at any speed -- 3.7.1.2 Second type of averaging: simplest method -- 3.7.1.3 Third method of averaging: best accuracy at intermediate and low speeds -- 3.8 Fabrication and test results -- 3.8.1 Fabrication -- 3.8.2 Accuracy over temperature range and supply voltage range -- 3.8.3 Noise -- 3.8.4 Packaging shift and long-term stability -- 3.8.5 Performance summary -- 3.8.6 Simple systems with digital and analog signal processing -- 3.9 Summary -- References -- 4 - Capacitive sensors for displacement measurement in the subnanometer range -- 4.1 Introduction -- 4.2 Challenges for subnanometer displacement measurement with capacitive sensors -- 4.3 Offset capacitance cancellation technique…”
    Libro electrónico
  4. 20464
    Publicado 2011
    Tabla de Contenidos: “…. -- 1.7 Organization of the Book -- References -- Review Questions -- Chapter 2: Project Organization -- 2.1 Introduction -- 2.2 Construction Company -- 2.3 Forms of Business Organization -- 2.3.1 Sole Proprietorship -- 2.3.2 Partnership -- 2.3.3 Corporation -- 2.3.4 Limited Liability Company (LlC) -- 2.3.5 Private Limited Company -- 2.3.6 Public Limited Company -- 2.3.7 Government Enterprises -- 2.3.8 Joint Ventures -- 2.4 Structure of Construction Organization -- 2.4.1 Centralized Functional -- 2.4.2 Decentralized Multidivisional -- 2.5 Organizing for Project Management -- 2.5.1 Classical (Functional) -- 2.5.2 Pure Project or Product Management -- 2.5.3 Matrix Organizations -- 2.6 Management Levels -- 2.6.1 Director Level -- 2.6.2 President Level -- 2.6.3 Construction Management Level -- 2.6.4 Project Management Level -- 2.6.5 Functional Management Level -- 2.7 Traits of a Project Manager -- 2.7.1 Strategies for Enhancing the Performance of a Project Manager -- 2.8 Important Traits of a Project Coordinator -- 2.8.1 Team Building Skill -- 2.8.2 Contract Implementation Skill -- 2.8.3 Project Organization Skill -- 2.9 Ethical Conduct for Engineers…”
    Libro electrónico
  5. 20465
    por Mittal, Ajay
    Publicado 2010
    Tabla de Contenidos: “…Conceptual Questions and Answers -- Code Snippets -- Multiple-choice Questions -- Outputs and Explanations to Code Snippets -- Answers to Multiple-choice Questions -- Programming Exercises -- Test Yourself -- 3 Statements -- 3.1 Introduction -- 3.2 Statements -- 3.3 Classification of Statements -- 3.3.1 Based Upon the Type of Action they Perform -- 3.3.2 Based Upon the Number of Constituent Statements -- 3.3.3 Based Upon their Role -- 3.4 Summary -- Exercise Questions -- Conceptual Questions and Answers -- Code Snippets -- Multiple-choice Questions -- Outputs and Explanations to Code Snippets -- Answers to Multiple-choice Questions -- Programming Exercises -- Test Yourself -- 4 Arrays and Pointers -- 4.1 Introduction -- 4.2 Arrays -- 4.3 Single-dimensional Arrays -- 4.3.1 Declaration of a Single-dimensional Array -- 4.3.2 Usage of Single-dimensional Array -- 4.3.3 Memory Representation of Single-dimensional Array -- 4.3.4 Operations on a Single-dimensional Array -- 4.4 Pointers -- 4.4.1 Operations on Pointers -- 4.4.2 void pointer -- 4.4.3 Null Pointer -- 4.5 Relationship Between Arrays and Pointers -- 4.6 Scaling up the Concept -- 4.6.1 Array of Arrays (Multi-dimensional Arrays) -- 4.6.2 Array of Pointers -- 4.6.3 Pointer to a Pointer -- 4.6.4 Pointer to an Array -- 4.7 Advantages and Limitations of Arrays -- 4.8 Summary -- Exercise Questions -- Conceptual Questions and Answers -- Code Snippets -- Multiple-choice Questions -- Outputs and Explanations to Code Snippets -- Answers to Multiple-choice Questions -- Programming Exercises -- Test Yourself -- 5 Functions -- 5.1 Introduction -- 5.2 Functions -- 5.3 Classification of Functions -- 5.3.1 Based Upon who Develops the Function -- 5.3.2 Based Upon the Number of Arguments a Function Accepts -- 5.4 Summary -- Exercise Questions -- Conceptual Questions and Answers -- Code Snippets…”
    Libro electrónico
  6. 20466
    por Ebel, Nadin
    Publicado 2021
    Tabla de Contenidos: “…7.1 Practices als Teil des Service-Wertsystems -- 7.1.1 Practices in vier Dimensionen -- 7.1.2 Einteilung der Practices -- 7.2 General Management Practices -- 7.2.1 Architecture Management -- 7.2.2 Continual Improvement -- 7.2.3 Information Security Management -- 7.2.4 Knowledge Management -- 7.2.5 Measurement and Reporting -- 7.2.5.1 Einfluss von Kennzahlen auf das Verhalten -- 7.2.5.2 Berichtswesen -- 7.2.6 Organizational Change Management -- 7.2.6.1 Aktivitäten des organisatorischen Veränderungsmanagements -- 7.2.7 Portfolio Management -- 7.2.8 Project Management -- 7.2.9 Relationship Management -- 7.2.10 Risk Management -- 7.2.11 Service Financial Management -- 7.2.12 Strategy Management -- 7.2.13 Supplier Management -- 7.2.13.1 Sourcing, Lieferantenstrategie und -beziehungen -- 7.2.13.2 Bewertung und Auswahl von Lieferanten -- 7.2.13.3 Aktivitäten -- 7.2.13.4 Service-Integration -- 7.2.14 Workforce and Talent Management -- 7.2.14.1 Aktivitäten -- 7.3 Service Management Practices -- 7.3.1 Availability Management -- 7.3.2 Business Analysis -- 7.3.3 Capacity and Performance Management -- 7.3.4 Change Enablement -- 7.3.5 Incident Management -- 7.3.6 IT Asset Management -- 7.3.7 Monitoring and Event Management -- 7.3.8 Problem Management -- 7.3.8.1 Problemidentifizierungsphase -- 7.3.8.2 Problem-Control-Phase -- 7.3.8.3 Error-Control-Phase -- 7.3.8.4 Schnittstellen -- 7.3.9 Release Management -- 7.3.10 Service Catalogue Management -- 7.3.11 Service Configuration Management -- 7.3.12 Service Continuity Management -- 7.3.13 Service Design -- 7.3.13.1 Design Thinking -- 7.3.13.2 Customer und User Experience -- 7.3.14 Service Desk -- 7.3.15 Service Level Management -- 7.3.15.1 Service Level Agreements -- 7.3.16 Service Request Management -- 7.3.17 Service Validation and Testing -- 7.3.17.1 Service Validation -- 7.3.17.2 Testing…”
    Libro electrónico
  7. 20467
    por Peterson, David L.
    Publicado 2022
    Tabla de Contenidos: “…7.4.2 Risk Communication -- 7.5 Key Findings -- 7.6 Key Information Needs -- 7.6.1 Understudied Health Effects -- 7.6.2 Health Benefits and Trade-Offs of Public Health Interventions -- 7.6.3 Economic Impacts -- 7.6.4 Central Repository of Standards and Actions -- 7.7 Conclusions -- References -- 8 Resource Manager Perspectives on the Need for Smoke Science -- 8.1 Introduction -- 8.2 Managing Wildland Fire to Improve Ecosystem Conditions While Minimizing Smoke Impacts -- 8.2.1 Smoke Concerns and Barriers to Prescribed Fire -- 8.2.2 Applying Prescribed Fire Across Large Landscapes -- 8.2.3 Utilizing Wildfires and Natural Ignitions -- 8.2.4 Implications of Wildfire Response Actions and Suppression for Air Quality -- 8.2.5 Alternatives to Burning-Evaluating Emissions Reduction -- 8.2.6 Effects of Fuel Moisture on Emissions and Dispersion -- 8.2.7 Fuel Type, Fuel Loading, and Fuel Consumption -- 8.2.8 Techniques for Minimizing Smoke Impacts -- 8.2.9 Components of Wildland Fire Smoke -- 8.2.10 Soils and Emissions -- 8.2.11 Remote Sensing and Data for Fuels, Fire, and Smoke -- 8.2.12 Prescribed Fire Tracking Data -- 8.2.13 Fire Emissions and the National Emissions Inventory -- 8.3 Wildland Fire and Smoke Decision Tools -- 8.3.1 Multiple Fires and Airshed Analysis -- 8.3.2 Fire Growth Models and Smoke Dispersion -- 8.3.3 Background Air Quality Conditions -- 8.3.4 Smoke Models for Fire Planning -- 8.3.5 Use of Air Quality Measurements -- 8.3.6 Air Quality Impacts of Prescribed Fire Versus Wildfire -- 8.3.7 Smoke Model Performance and Accuracy -- 8.3.8 Long-Range Forecasts and Projections for Planning and Early Warning -- 8.3.9 Tools and Data Needs for the Future -- 8.3.10 Identifying Areas at High Risk from Wildfire and Smoke -- 8.4 Health, Safety, and Societal Impacts of Smoke -- 8.4.1 What is a Smoke-Affected Day?…”
    Libro electrónico
  8. 20468
    Publicado 2022
    Tabla de Contenidos: “…-- 5.5.2 Securitization and bank performance -- 5.5.3 International evidence -- 5.6 Exercises -- CHAPTER 6 COMPLEXITY IN BANKING -- 6.1 Introduction -- 6.1.1 Organizational complexity…”
    Libro electrónico
  9. 20469
    Publicado 2023
    Tabla de Contenidos: “…9.4.2 Calculation for Even Numbers -- 9.4.3 Corollaries -- 9.4.4 Code Snippet -- 9.4.5 Output -- 9.5 Conclusion -- References -- Chapter 10 Solution of Matrix Games With Pay.Offs of Single-Valued Neutrosophic Numbers and Its Application to Market Share Problem -- 10.1 Introduction -- 10.2 Preliminaries -- 10.3 Matrix Games With SVNN Pay-Offs and Concept of Solution -- 10.4 Mathematical Model Construction for SVNNMG -- 10.4.1 Algorithm for Solving SVNNMG -- 10.5 Numerical Example -- 10.5.1 A Market Share Problem -- 10.5.2 The Solution Procedure and Result Discussion -- 10.5.3 Analysis and Comparison of Results With Li and Nanfs Approach -- 10.6 Conclusion -- References -- Chapter 11 A Novel Score Function-Based EDAS Method for the Selection of a Vacant Post of a Company with q-Rung Orthopair Fuzzy Data -- 11.1 Introduction -- 11.2 Preliminaries -- 11.3 A Novel Score Function of q-ROFNs -- 11.3.1 Some Existing q-ROF Score Functions -- 11.3.2 A Novel Score Function of q-ROFNs -- 11.4 EDAS Method for q-ROF MADM Problem -- 11.5 Numerical Example -- 11.6 Comparative Analysis -- 11.7 Conclusions -- Acknowledgments -- References -- Chapter 12 Complete Generalized Soft Lattice -- 12.1 Introduction -- 12.2 Soft Sets and Soft Elements.Some Basic Concepts -- 12.3 gs-Posets and gs-Chains -- 12.4 Soft Isomorphism and Duality of gs-Posets -- 12.5 gs-Lattices and Complete gs-Lattices -- 12.6 s-Closure System and s-Moore Family -- 12.7 Complete gs-Lattices From s-Closure Systems -- 12.8 A Representation Theorem of a Complete gs-Lattice as an s-Closure System -- 12.9 gs-Lattices and Fixed Point Theorem -- References -- Chapter 13 Data Representation and Performance in a Prediction Model -- 13.1 Introduction -- 13.1.1 Various Methods for Predictive Modeling -- 13.1.2 Problem Definition -- 13.2 Data Description and Representations -- 13.3 Experiment and Result…”
    Libro electrónico
  10. 20470
    por Foltz, Kevin
    Publicado 2020
    Tabla de Contenidos: “…3.3.4 Secure Data Acquisition -- 3.3.5 Integrity at the Source -- 3.4 Temporal Data -- 3.5 Credential Data -- 3.6 Distributed Stores -- 4 Access and Privilege -- 4.1 Access Control -- 4.2 Authorization and Access in General -- 4.3 Access Control List -- 4.3.1 Group Requirements -- 4.3.2 Role Requirements -- 4.3.3 ACRs and ACLs -- 4.3.4 Discretionary Access Control and Mandatory Access Control -- 4.4 Complex Access Control Schemas -- 4.5 Privilege -- 4.6 Concept of Least Privilege -- 4.6.1 Least Privilege Case Study -- 5 Cryptography -- 5.1 Introduction -- 5.2 Cryptographic Keys and Key Management -- 5.2.1 Asymmetric Key Pairs -- 5.2.1.1 RSA Key Generation -- 5.3 Symmetric Keys -- 5.3.1 TLS Mutual Authentication Key Production -- 5.3.2 Other Key Production -- 5.4 Store Keys -- 5.5 Delete Keys -- 5.6 Encryption -- 5.7 Symmetric versus Asymmetric Encryption Algorithms -- 5.7.1 Asymmetric Encryption -- 5.7.2 RSA Asymmetric Encryption -- 5.7.3 Combination of Symmetric and Asymmetric Encryption -- 5.7.4 Symmetric Encryption -- 5.7.4.1 Stream Ciphers -- 5.7.4.2 Block Ciphers -- 5.7.5 AES/Rijndael Encryption -- 5.7.5.1 Description of the AES Cipher -- 5.7.6 Data Encryption Standard -- 5.7.6.1 Triple DES -- 5.7.6.2 Description of the Triple DES Cipher -- 5.8 Decryption -- 5.8.1 Asymmetric Decryption -- 5.8.2 Symmetric Decryption -- 5.9 Hash Function -- 5.9.1 Hash Function Algorithms -- 5.9.2 Hashing with Cryptographic Hash Function -- 5.9.2.1 MD-5 -- 5.9.2.2 SHA-3-Defined SHA-512 -- 5.10 Signatures -- 5.10.1 XML Signature -- 5.10.2 S/MIME Signature -- 5.10.3 E-Content Signature -- 5.11 A Note on Cryptographic Key Lengths -- 5.11.1 Encryption Key Discovery -- 5.11.2 The High-Performance Dilemma -- 5.11.3 Parallel Decomposition of Key Discovery -- 5.12 Internet Protocol Security -- 5.13 Other Cryptographic Services -- 5.14 The Java Cryptography Extension…”
    Libro electrónico
  11. 20471
    Publicado 2024
    Tabla de Contenidos: “…8.3.1.2 Goals of Meetings with Senior Leadership -- 8.3.1.3 Meetings with Key Leaders -- 8.3.1.4 Execute the Communication Process -- 8.3.1.5 Conduct Interviews with Designated Leaders, Managers, and High-Priority Staff -- 8.3.1.6 Provide a Written Questionnaire for Remaining Designated Staff -- 8.3.1.7 Perform an Extensive Analysis of Findings -- 8.3.1.8 Creation of a Written Report with Detailed Study Findings -- 8.3.1.9 Present Findings to Leadership and Determine Next Steps -- 8.3.1.10 Presentation to the Organization -- 8.4 Redesigning an Organization to Execute with Data and Analytics -- 8.4.1 Business Knowledge -- 8.4.2 Data Knowledge -- 8.4.3 AI and Analytics Knowledge -- 8.4.4 Technology Stack-Architecture, Platforms, Systems -- 8.4.5 Culture -- 8.4.6 People -- 8.5 Conclusion -- References -- 9 Additional Stories on the Data Front -- 9.1 Managing the End-to-End Process of Patient Experience-Two Case Studies by Carol Maginn -- 9.1.1 Patient Case A -- 9.1.2 Patient Case B -- 9.1.3 Pricing Offers an Intuitively Simple Problem That Provides Use of the Most Complicated Mathematical Models -- 9.2 Textual Extraction, Transformation, and Learning -- 9.2.1 Some Sources of Textual Data -- 9.2.1.1 Voice Recordings -- 9.2.1.2 Printed Text -- 9.2.1.3 Internet and Social Media -- 9.2.1.4 Email -- 9.2.1.5 Electronic Texts as a Source -- 9.2.1.6 What Is a Taxonomy? …”
    Libro electrónico
  12. 20472
    Publicado 2024
    Tabla de Contenidos: “…Chapter 5 Deep Learning Algorithms and Architectures for Multimodal Data Analysis -- 5.1 Introduction to Multimodal Data Analysis -- 5.2 Overview of Deep Learning Algorithms and Architectures -- 5.2.1 Pre-Processing of the Multimodal Data -- 5.2.2 The Training Process of Deep Learning Models on Multimodal Data -- 5.2.3 Deep Learning Methods and Blockchain Technology Consortium -- 5.3 Conclusion and Future Directions -- Abbreviations -- References -- Chapter 6 Deep Learning Algorithms: Clustering and Classifications for Multimedia Data -- 6.1 Introduction -- 6.1.1 Deep Learning and Its Applications in Multimedia Data Analysis -- 6.1.2 Classification Algorithms in Deep Learning Can Be Broadly Classified into the Following Categories -- 6.1.3 Deep Learning for Clustering Multimedia Data -- 6.1.4 Types of Clustering -- 6.1.5 Classification of Clustering Algorithms in Deep Learning -- 6.1.6 List of More Comprehensive Deep Learning Clustering Algorithms -- 6.2 Deep Clustering Algorithm Challenges and the Multimedia Data -- 6.2.1 Convolutional Autoencoders for Clustering Images -- 6.2.2 Deep Convolutional Embedded Clustering for Clustering Images -- 6.2.3 Multimodal Deep Embedded Clustering for Clustering Multimodal Data -- 6.2.4 Case Studies - The Effectiveness of Deep Learning for Clustering Multimodal Data -- 6.3 Deep Learning for Classification of Multimedia Data -- 6.3.1 Incorporating Multimodal Data for Improving Classification Performance -- 6.4 Blockchain Technology and Deep Learning Algorithms in the Context of Multimodal Data -- 6.4.1 Cross-Border Blockchain Technology and Deep Learning Methods -- 6.4.2 Key Attributes of Cross-Border Blockchain Technology -- 6.4.3 Cross-Border and Deep Learning Multimodal Blockchain Technology -- 6.4.4 Future Trends and Applications of the Blockchain and Deep Learning -- 6.5 Conclusion -- Abbreviations…”
    Libro electrónico
  13. 20473
    Publicado 2015
    “…erefore, in addition to providing guidance, examples of how to perform them using some of the most used editors of digital content are presented. …”
    Texto completo en Odilo
    Otros
  14. 20474
    por Jennings, Jasón
    Publicado 2006
    Libro
  15. 20475
    “…If private schools also attract higher-performing students and better teachers than public schools, parents will also feel that they are securing the best possible education for their child..…”
    Capítulo de libro electrónico
  16. 20476
    “…The objective of this review is to perform a systematic review of the beneficial and harmful effects of a single oral dose of mifepristone 200 mg and a single buccal dose of misoprostol 800 mcg (four 200 mcg tablets) administered in a sequential regimen for the medical termination of a developing intrauterine pregnancy in women of child-bearing age…”
    Libro electrónico
  17. 20477
    por Gertsman, Elina
    Publicado 2015
    “…Analyzes the changing roles of vision and sensation in the complex performative ways in which audiences engaged with devotional art, both in public and in private…”
    Libro
  18. 20478
    Publicado 2000
    Vídeo cassette
  19. 20479
    por Springsteen, Bruce, 1949-
    Publicado 2002
    CDROM
  20. 20480
    CDROM