Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
1481por Saguet, PierreTabla de Contenidos:
Publicado 2012Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
1482por International Conference on Pedestrian and Evacuation DynamicsTabla de Contenidos: “…Pedestrian Performance Data -- Federal Investigation of the Evacuation of the World Trade Center on September 11, 2001 -- Free speed distributions — Based on empirical data in different traffic conditions -- Collecting Pedestrian Trajectory Data In Real-time -- Full-Scale Evacuation Experiments in a smoke filled Rail Carriage — a detailed study of passenger behaviour under reduced visibility -- Minimum Stair Width for Evacuation, Overtaking Movement and Counterflow — Technical Bases and Suggestions for the Past, Present and Future -- Study on information guiding based on human psych-physiological responses in China -- Research on pedestrian crowd characteristics and behaviours in peak-time on Chinese campus -- Pedestrian Dynamics -- Behaviour on tunnel fire -- Earthquake — the importance of earthquake-resistant design in case of emergency evacuations -- Decision Loads and Route Qualities for Pedestrians — Key Requirements for the Design of Pedestrian Navigation Services -- Cyclone and Storm Surge, Pedestrian Evacuation and Emergency Response in India -- Experimental Study and Theoretical Analysis of Signage Legibility Distances as a Function of Observation Angle -- Exploring Pedestrian Shopping Decision Processes — an Application of Gene Expression Programming -- Evacuation Simulation -- A Discrete choice framework for acceleration and direction change behaviors in walking pedestrians -- Calibration and validation of the Legion simulation model using empirical data -- Evacuation Simulation for Road Tunnels — Findings from the use of microscopic methodology for escape route analyses -- A Data-Driven Model of Pedestrian Movement -- Distributed intelligence in pedestrian simulations -- Design of Escape Routes by Simulating Evacuation Dynamics in Conjunction with a Probabilistic Safety Concept -- The 2001 World Trade Centre Evacuation -- Dynamic Navigation Field — a local and on-demand family of algorithms for wayfinding -- Microscopic calibration and validation of pedestrian models — Cross-comparison of models using experimental data -- Pedestrian flow optimization with a genetic algorithm based on Boolean grids -- Developing a Pedestrian Agent Model for Analyzing an Overpass accident -- The simulation of crowd dynamics at very large events — Calibration, empirical data, and validation -- Moore and more and symmetry -- The RiMEA Project — Development of a new Regulation -- Football Stadium Simulation — A microscopic simulation of the pedestrian access -- Instability of pedestrian flow in two-dimensional optimal velocity model -- Evacuation Simulation at Linz Central Station — Usefulness during design, approval and start-up -- Why “Faster is Slower” in Evacuation Process -- Development of an Agent-based Behavior Module for Evacuation Models — Focused on the Behaviors in the Dark -- Comparative Investigation of the Dynamic Simulation of Foot Traffic Flow -- Evacuation from underground railway stations — Available and required safe egress time for different station types and general evaluation criteria -- A discrete microscopic model for pedestrian dynamics to manage emergency situations in airport terminals -- Steps Toward the Fundamental Diagram — Empirical Results and Modelling -- Model for Office Building Usage Simulation -- Features of Discrete Event Simulation Systems for Spatial Pedestrian and Evacuation Dynamics -- Evolving Direct Perception Models of Human Behavior in Building Systems -- Fundamental diagram of a one-dimensional cellular automaton model for pedestrian flow — the ASEP with shuffled update -- Ship Evacuation -- Implementing Ship Motion in AENEAS — Model Development and First Results -- Data Collection in Support of the Modelling of Naval Vessels -- Collective animal motion -- Self-organised choice based on inter-attraction: the example of gregarious animals -- Traffic on bi-directional ant-trails -- Herding in Real Escape Panic -- From Ant Trails to Pedestrian Dynamics — Learning from Nature…”
Publicado 2006
Libro electrónico -
1483Publicado 2021Tabla de Contenidos: “…Denouement -- Chapter 5: Data Quality -- Missing Data -- Biasing Trends -- Understanding Bias -- Detecting Bias -- Comparison to Baselines -- Benford's Law -- Class Imbalance -- Normalization and Scaling -- Applying a Machine Learning Model -- Scaling Techniques -- Factor and Sample Weighting -- Cyclicity and Autocorrelation -- Domain Knowledge Trends -- Discovered Cycles -- Bespoke Validation -- Collation Validation -- Transcription Validation -- Exercises -- Data Characterization -- Oversampled Polls -- Denouement -- Part III - Rectification and Creation -- Chapter 6: Value Imputation -- Typical-Value Imputation -- Typical Tabular Data -- Locality Imputation -- Trend Imputation -- Types of Trends -- A Larger Coarse Time Series -- Understanding the Data -- Removing Unusable Data -- Imputing Consistency -- Interpolation -- Non-Temporal Trends -- Sampling -- Undersampling -- Oversampling -- Exercises -- Alternate Trend Imputation -- Balancing Multiple Features -- Denouement -- Chapter 7: Feature Engineering -- Date/Time Fields -- Creating Datetimes -- Imposing Regularity -- Duplicated Timestamps -- Adding Timestamps -- String Fields -- Fuzzy Matching -- Explicit Categories -- String Vectors -- Decompositions -- Rotation and Whitening -- Dimensionality Reduction -- Visualization -- Quantization and Binarization -- One-Hot Encoding -- Polynomial Features -- Generating Synthetic Features -- Feature Selection -- Exercises -- Intermittent Occurrences -- Characterizing Levels -- Denouement -- Part IV - Ancillary Matters -- Closure -- What You Know -- What You Don't Know (Yet) -- Glossary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
1484Publicado 2007Tabla de Contenidos: “…W1 – Aspect-Oriented Modeling -- 9th International Workshop on Aspect-Oriented Modeling -- Modeling Features in Aspect-Based Product Lines with Use Case Slices: An Exploratory Case Study -- Join Point Patterns: A High-Level Join Point Selection Mechanism -- W2 – Critical Systems Development -- Critical Systems Development Using Modeling Languages – CSDUML 2006 Workshop Report -- Modeling an Electronic Throttle Controller Using the Timed Abstract State Machine Language and Toolset -- Model Checking of UML 2.0 Interactions -- W3 – Reverse Engineering -- 3rd International Workshop on Metamodels, Schemas, Grammars and Ontologies -- A Unified Ontology-Based Process Model for Software Maintenance and Comprehension -- Formalizing the Well-Formedness Rules of EJB3QL in UML + OCL -- W4 – Quality in Modeling -- The 1st Workshop on Quality in Modeling -- Consistency of Business Process Models and Object Life Cycles -- A Qualitative Investigation of UML Modeling Conventions -- W5 – Advanced User Interfaces -- Model Driven Development of Advanced User Interfaces (MDDAUI) – MDDAUI’06 Workshop Report -- A Model-Driven Approach to the Engineering of Multiple User Interfaces -- Model-Driven Dynamic Generation of Context-Adaptive Web User Interfaces -- W6 – Real-Time and Embedded Systems -- Modelling and Analysis of Real Time and Embedded Systems – Using UML -- Time Exceptions in Sequence Diagrams -- Applying Model Intelligence Frameworks for Deployment Problem in Real-Time and Embedded Systems -- W7 – OCL -- OCL for (Meta-)Models in Multiple Application Domains -- OCL-Based Validation of a Railway Domain Profile -- OCL Support in an Industrial Environment -- W8 – Integrating MDA and V&V -- Report on the 3rd MoDeVa Workshop – Model Design and Validation -- Towards Model-Driven Unit Testing -- Validation of Model Transformations – First Experiences Using a White Box Approach -- W9 – Model Size Metrics -- Summary of the 2006 Model Size Metrics Workshop -- Model Size Matters -- On the Application of Software Metrics to UML Models -- W10 – Models@run.time -- Summary of the Workshop Models@run.time at MoDELS 2006 -- Using Runtime Models to Unify and Structure the Handling of Meta-information in Reflective Middleware -- Applying OMG D&C Specification and ECA Rules for Autonomous Distributed Component-Based Systems -- W11 – Multi-Paradigm Modeling -- Summary of the Workshop on Multi-Paradigm Modeling: Concepts and Tools -- Think Global, Act Local: Implementing Model Management with Domain-Specific Integration Languages -- S1 – Doctoral Symposium -- MoDELS 2006 Doctoral Symposium -- Model Driven Security Engineering for the Realization of Dynamic Security Requirements in Collaborative Systems -- S2 – Educators Symposium -- Educators’ Symposium at MoDELS 2006 -- If You’re Not Modeling, You’re Just Programming: Modeling Throughout an Undergraduate Software Engineering Program -- Teaching Software Modeling in a Simulated Project Environment -- Repository for Model Driven Development (ReMoDD) -- S3 – A Formal Semantics for UML -- 2 nd UML 2 Semantics Symposium: Formal Semantics for UML -- A UML Simulator Based on a Generic Model Execution Engine -- Queries and Constraints: A Comprehensive Semantic Model for UML2 -- Analysis of UML Activities with Dynamic Meta Modeling Techniques…”
Libro electrónico -
1485Publicado 2004Tabla de Contenidos: “…Applying a Stylesheet to an XML DocumentSee Also; Use Character and Entity References; Character References; The xml:lang attribute; Entity References; Examine XML Documents in Text Editors; Vim; Emacs with nXML; See Also; Explore XML Documents in Graphical Editors; xmlspy; xRay2; ; See Also; Choose Tools for Creating an XML Vocabulary; Well-Formedness, Validation, and Schemas; DTD; Other schema languages; Namespaces; See Also; Test XML Documents Online; RUWF; RXP; Brown University's Validation Form; Test XML Documents from the Command Line; RXP; xmlvalid; xmllint; xmlwf…”
Libro electrónico -
1486Publicado 2007Tabla de Contenidos: “…XML and DatabasesRelational Databases; XML Databases; Other Databases; Summary; Resources; Part V: Programming XML; Chapter 12: XML Document Object Model (DOM); What Is DOM?; XML Validation Using XML DOM; Summary; Chapter 13: Simple API for XML (SAX); Introducing XML Parsing; SAX Architecture; SAX Packages and Classes; Searching in an XML File; Writing XML Contents Using SAX; XML Validation Using SAX; Advantages and Disadvantages of SAX; Summary; Chapter 14:Ajax; XMLHttpRequest; The DOM; Putting It All Together; Ajax Libraries; Ajax Resources; Summary; Chapter 15: XML and .NET…”
Libro electrónico -
1487Publicado 2020Tabla de Contenidos: “…INTERNAL VALIDITY -- 8.3. EXTERNAL VALIDITY -- 8.4. CONCLUSION -- 9. …”
Libro electrónico -
1488por Olson, Jack E.Tabla de Contenidos: “…5.3 Assignment of Problems for Initial Study5.5 Determining the Basic Strategy for the Archiving Application; Chapter 6: Resources Needed; 6.5 Archive Server; Summary; Chapter 7: Locating Data; Summary; Chapter 8: Locating Metadata; 8.3 Selecting a Version of the Metadata; 8.4 Classifying Data; Summary; Chapter 9: Data and Metadata Validation; 9.4 Validating Data Classification; 9.6 Repeating Validation Activities; Summary; Part 3: Designing Database Archiving Applications; Chapter 10: Designing for Archive Independence; 10.2 Independence from DBMS; 10.3 Independence from Systems; Summary…”
Publicado 2009
Libro electrónico -
1489por Etheridge, DeniseTabla de Contenidos: “…Excel 2007 Top 100 Simplified Tips & Tricks; Table of Contents; Chapter 1 Boost Your Efficiency; Validate with a VALIDATION LIST; Validate with DATA ENTRY RULES; Extend a series with AUTOFILL; Insert SYMBOLS OR SPECIAL CHARACTERS; Hide rows by GROUPING AND OUTLINING; FIND AND REPLACE formats; ADD COMMENTS to your worksheet; Let Excel READ BACK YOUR DATA; Create your own SORT OR AUTOFILL; Chapter 2 Work with Formulas and Functions; ENTER FORMULAS using a variety of methods; Name CELLS AND RANGES; Define a CONSTANT; CREATE FORMULAS that include names; Calculate with THE FUNCTION WIZARD…”
Publicado 2007
Libro electrónico -
1490Publicado 1998Tabla de Contenidos: “…Selection methods; 3.1 Introduction; 3.2 Validity; 3.3 Correlation; 3.4 Measuring validity; 3.5 Reliability; 3.6 Improving criterion-related validity; 3.7 Choosing performance criteria; 3.8 Psychometric tests; 3.9 Other kinds of test; 3.10 Assessment centres; 3.1 1 The interview…”
Libro electrónico -
1491por McDaniel, AdamTabla de Contenidos: “…HTML5: Your visual blueprint for designing rich web pages and applications; Credits; About the Author; Author's Acknowledgments; How to Use This Visual Blueprint Book; Table of Contents; Chapter 1: Introducing HTML5; Introducing HTML5; Understanding HTML5 Web Browsers; Understanding Backward Compatibility; Understanding the History of Markup Languages; Introducing the New and Changed HTML5 Tags and Attributes; Understanding Obsolete HTML Tags and Attributes; Validate a Website for HTML5 Compliance; Validate a Web Browser for HTML5 Support; Support HTML5 in Internet Explorer With a Plug-In…”
Publicado 2012
Libro electrónico -
1492Publicado 2001Tabla de Contenidos: “…Presumptive Validity of International Arbitration Agreements -- 1. …”
Libro electrónico -
1493Publicado 2011Tabla de Contenidos: “…-- Well-Formedness Rules -- XML Encoding -- Special Characters -- Summary -- 2 Native XML Storage: XMLType -- Creating XMLTypes -- XML Schema-based XMLType -- Querying XMLTypes -- Updating XMLTypes -- Transforming XMLTypes -- Reading Binary XMLTypes in Java -- Summary -- 3 XML Database Repository -- Creating Resources -- Deleting Resources -- Querying XML DB Repository -- Using RESOURCE_VIEW and PATH_VIEW -- Using XDBUriType -- Linking to Resources -- Updating Resources -- Version Control -- Using XML DB Repository Events -- Creating Event Handlers -- Registering Event Handlers -- Summary -- 4 Parsing XML -- DOM Parsing in Java -- Basic DOM Parsing -- Splitting XML Using DOM -- Scalable DOM Parsing -- Cutting and Pasting Across Documents -- DOM Parsing in SQL -- Retrieving and Creating a CDATA Section -- Importing a DOM Node -- SAX Parsing -- Basic SAX Parsing -- SAX Print -- Parsing Binary XML -- Writing XML to Binary XML -- Reading from Binary XML -- Summary -- 5 Validating XML -- DTD Validation -- Using Oracle XDK Command-Line Utility -- Using Oracle XDK Java APIs -- Using Oracle XML DB -- XML Schema Validation -- XML Schema and Namespaces -- Using Oracle XDK Command-Line Utility -- Using Oracle XDK Java APIs -- Using Oracle XML DB -- Using JAXB with XML Schemas -- Summary -- 6 Navigating XML with XPath -- XPath Basics -- Processing XPath in Java -- Extracting XPath from XML Documents -- Summary -- 7 XSL Transformations -- Understanding XSLT Processing -- Basic XSLT Features -- Multiple XML Inputs -- Building an XSL Index -- Creating XSLT Extensions -- Advanced XSLT Features -- Modularizing XSLT Processing with Temporary Trees…”
Libro electrónico -
1494por International SPIN WorkshopTabla de Contenidos: “…Invited Keynotes -- From model checking to a temporal proof -- Model checking if your life depends on it: a view from intel’s trenches -- Model checking if your life depends on it: a view from intel’s trenches -- Technical Papers and Tool Reports -- Model-checking in finite state-space systems with fine-grained abstractions using SPIN -- Implementing LTL model checking with net unfoldings -- Directed explicit model checking with HSF-SPIN -- Directed explicit model checking with HSF-SPIN -- Addressing dynamic issues of program model checking -- Addressing dynamic issues of program model checking -- Automatically validating temporal safety properties of interfaces -- Automatically validating temporal safety properties of interfaces -- Verification experiments on the MASCARA protocol -- Verification experiments on the MASCARA protocol -- Using SPIN for feature interaction analysis - a case study -- Using SPIN for feature interaction analysis - a case study -- Behavioural analysis of the enterprise javaBeansTM component architecture -- Behavioural analysis of the enterprise javaBeansTM component architecture -- p2b: A translation utility for linking promela and symbolic model checking (tool paper) -- p2b: A translation utility for linking promela and symbolic model checking (tool paper) -- Transformations for model checking distributed java programs -- Transformations for model checking distributed java programs -- Distributed LTL model-checking in SPIN -- Distributed LTL model-checking in SPIN -- Parallel state space construction for model-checking -- Parallel state space construction for model-checking -- Model checking systems of replicated processes with spin -- Model checking systems of replicated processes with spin -- A SPIN-based model checker for telecommunication protocols -- A SPIN-based model checker for telecommunication protocols -- Modeling and verifying a price model for congestion control in computer networks using promela/spin -- Modeling and verifying a price model for congestion control in computer networks using promela/spin -- Invited Project Summaries -- A model checking project at philips research -- Applications of model checking at honeywell laboratories -- Coarse-granular model checking in practice…”
Publicado 2001
Libro electrónico -
1495Publicado 2018Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Introduction to Node.js -- The Basics of Node.js -- Applications of Node.js -- Activity: Running Basic Node.js Code -- The Module System -- Application Modularization -- Module Categories -- Built-In Modules -- npm - Third-Party Module Registry -- Scanning for node_modules -- Handy npm Commands -- Local Modules -- Activity: Using a Third-Party Package for the Previous math.js Code -- Asynchronous Programming with Node.js -- Callbacks -- Promises -- Async/Await -- Activity: Transforming a Text File Using an Async Function -- Summary -- Building the API - Part 1 -- Building a Basic HTTP Server -- Setting up Hapi.js -- Exercise 1: Building a Basic Hapi.js Server -- Using an API Client -- Returning JSON Strings -- Exercise 2: Returning JSON -- Using nodemon for Development Workflow -- Exercise 3: Using nodemon -- Setting up the Logger -- Exercise 4: Setting up the Logger -- Understanding Requests -- A Look at HTTP Request Methods -- Exercise 5: Getting a List of Resources -- Exercise 6: Getting a Specific Resource -- Exercise 7: Creating a New Todo with POST -- Exercise 8: Updating a Resource with PUT -- Exercise 9: Updating with PATCH -- Exercise 10: Deleting a Resource with DELETE -- Request Validation -- Exercise 11: Validating a Request -- Summary -- Building the API - Part 2 -- Working with the DB Using Knex.js -- Exercise 12: Setting up the Database -- Exercise 13: Connecting to the Database -- Exercise 14: Creating a Record -- Exercise 15: Reading from the Database -- Exercise 16: Updating a Record -- Exercise 17: Deleting a Record -- Exercise 18: Cleaning up the Code -- Authenticating Your API with JWT -- Exercise 19: Securing All the Routes -- Exercise 20: Adding User Authentication -- Authentication versus Authorization…”
Libro electrónico -
1496por Ajzen, IcekTabla de Contenidos: “…Front cover -- Half Title -- Title -- Copyright -- Dedication -- Contents -- Preface -- Chapter 01 ATTITUDES AND PERSONALITY TRAITS -- FROM ACTS TO DISPOSITIONS -- Inferring personality traits from behavior -- Inferring attitudes from behavior -- Attitudes versus traits -- Explicit measures of attitudes and personality traits -- Overcoming self-presentation biases -- Implicit measures of attitudes and personality traits -- FROM DISPOSITIONS TO ACTIONS -- Dimensions of personality -- A hierarchical model of attitude -- SUMMARY AND CONCLUSIONS -- NOTES -- SUGGESTIONS FOR FURTHER READING -- Chapter 02 CONSISTENCY IN HUMAN AFFAIRS -- PSYCHOLOGICAL FOUNDATIONS OF CONSISTENCY -- Preference for consistency -- Functional consistency -- Inherent consistency -- EMPIRICAL EVIDENCE -- Behavioral consistency -- Predictive validity -- Implications -- SUMMARY AND CONCLUSIONS -- NOTES -- SUGGESTIONS FOR FURTHER READING -- Chapter 03 FROM DISPOSITIONS TO ACTIONS -- THE MODERATING VARIABLES APPROACH -- Situational factors as moderators -- Individual differences as moderators -- Secondary characteristics of the disposition -- THE MODE MODEL: AN INTEGRATIVE THEORETICAL FRAMEWORK -- Strength of behavioral dispositions -- MODERATING VARIABLES AND THE QUESTION OF CONSISTENCY -- Limitations of a moderating variables approach -- SUMMARY AND CONCLUSIONS -- NOTES -- SUGGESTIONS FOR FURTHER READING -- Chapter 04 THE PRINCIPLE OF COMPATIBILITY -- THE LOGIC OF AGGREGATION -- Consistency of behavioral aggregates -- Predictive validity for behavioral aggregates -- Aggregation and the question of consistency -- PREDICTION OF SPECIFIC BEHAVIORAL TENDENCIES -- The principle of compatibility -- PERSONALITY TRAITS AND SPECIFIC RESPONSE TENDENCIES -- Routines and habits -- Perceived behavioral control -- ATTITUDES AND SPECIFIC RESPONSE TENDENCIES -- Attitude toward a behavior…”
Publicado 2005
Libro electrónico -
1497Publicado 2023Tabla de Contenidos: “…7.2.2 Update business metrics periodically -- 7.2.3 Business metric timescales -- 7.3 Trade off multiple business metrics -- 7.3.1 Reduce negative side effects -- 7.3.2 Evaluate with multiple metrics -- Summary -- 8 Practical considerations -- 8.1 Violations of statistical assumptions -- 8.1.1 Violation of the iid assumption -- 8.1.2 Nonstationarity -- 8.2 Don't stop early -- 8.3 Control family-wise error -- 8.3.1 Cherry-picking increases the false-positive rate -- 8.3.2 Control false positives with the Bonferroni correction -- 8.4 Be aware of common biases -- 8.4.1 Confounder bias -- 8.4.2 Small-sample bias -- 8.4.3 Optimism bias -- 8.4.4 Experimenter bias -- 8.5 Replicate to validate results -- 8.5.1 Validate complex experiments -- 8.5.2 Monitor changes with a reverse A/B test -- 8.5.3 Measure quarterly changes with holdouts -- 8.6 Wrapping up -- Summary -- Appendix A Linear regression and the normal equations -- A.1 Univariate linear regression -- A.2 Multivariate linear regression -- Appendix B One factor at a time -- Appendix C Gaussian process regression -- index -- inside back cover…”
Libro electrónico -
1498Publicado 2012Tabla de Contenidos: “…Training Cognition Optimizing Efficiency, Durability, and Generalizability; Copyright; Contents; Preface; 1 Introduction: Training and its Cognitive Underpinnings; 2 Empirically Valid Principles of Training; 3 Basic Research on Training Principles; 4 Attention and Cognitive Resource Load in Training Strategies; 5 Acquisition and Transfer of Basic Skill Components; 6 How Cognitive Ability and Automation Influence Training Performance and Transfer; 7 Conducting Technology-Based Applied Training Research; 8 A New Taxonomy for Training…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1499Publicado 2004Tabla de Contenidos: “…Book Cover; Title; Contents; List of illustrations; List of contributors; Theoretical and historiographical foundations; Introduction; Coming full (hermeneutic) circle: The controversy about psychological methods; Reinventing validity: Reflections on principles and practices from beyond the quality-quantity divide; Mixing it up; Discursive analysis and the interpretation of statistics; ""Structured judgement methods""--the best of both worlds?…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1500Publicado 2010Tabla de Contenidos: “…The Interplay Between Ontology as Categorial Analysis and Ontology as Technology -- Ontological Architectures -- Organization and Management of Large Categorical Systems -- The Information Flow Approach to Ontology-Based Semantic Alignment -- Ontological Evaluation and Validation -- Tools for Ontology Engineering and Management -- Ontological Tools: Requirements, Design Issues and Perspectives -- Using the Unified Foundational Ontology (UFO) as a Foundation for General Conceptual Modeling Languages -- Lightweight Ontologies -- WordNet -- Controlled English to Logic Translation -- Cyc -- Ontological Foundations of dolce -- General Formal Ontology (GFO): A Foundational Ontology for Conceptual Modelling -- Ontologies in Biology -- The Ontology of Medical Terminological Systems: Towards the Next Generation of Medical Ontologies -- Ontologies of Language and Language Processing -- Business Ontologies -- Ontologies for E-government -- An Ontology-Driven Approach and a Context Management Framework for Ubiquitous Computing Applications -- Category Theory as a Mathematics for Formalizing Ontologies -- Issues of Logic, Algebra and Topology in Ontology -- The Institutional Approach -- Ontology Engineering, Universal Algebra, and Category Theory…”
Libro electrónico