Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Artificial intelligence 6
- Computer networks 5
- Computer security 5
- Cloud computing 3
- Computer programs 3
- Data processing 3
- Electronic data processing 3
- Industrial applications 3
- Machine learning 3
- Management 3
- Security measures 3
- Analysis 2
- Business 2
- Computer network protocols 2
- Computer software 2
- Data recovery (Computer science) 2
- Database management 2
- Distributed processing 2
- Electrical & Computer Engineering 2
- Electronic commerce 2
- Engineering & Applied Sciences 2
- File organization (Computer science) 2
- Food industry and trade 2
- Information resources management 2
- Internet 2
- Internet of things 2
- Nanostructured materials 2
- Paisajismo y Urbanismo 2
- Production scheduling 2
- Quality control 2
-
1Publicado 2014Tabla de Contenidos: “…Chapter 4: Learning in Multiplayer Stochastic Games4.1 Introduction; 4.2 Multiplayer Stochastic Games; 4.3 Minimax-Q Algorithm; 4.4 Nash Q-Learning; 4.5 The Simplex Algorithm; 4.6 The Lemke-Howson Algorithm; 4.7 Nash-Q Implementation; 4.8 Friend-or-Foe Q-Learning; 4.9 Infinite Gradient Ascent; 4.10 Policy Hill Climbing; 4.11 WoLF-PHC Algorithm; 4.12 Guarding a Territory Problem in a Grid World; 4.13 Extension of L R-I Lagging Anchor Algorithm to Stochastic Games; 4.14 The Exponential Moving-Average Q-Learning (EMA Q-Learning) Algorithm…”
Libro electrónico -
2
-
3
-
4Publicado 2021Libro electrónico
-
5
-
6Publicado 2010Tabla de Contenidos: “…3.9 Aportación de la finca al capital de la sociedad promotora3.10 Conclusión final sobre la viabilidad de la promoción; Capítulo 4; 4.1 Decálogo de la negociación; 4.2 Negociación de contratos de adquisición del solar; 4.3 Negociación del derecho de superfície; 4.4 Elevación de contratos privados a escritura pública; 4.5 Negociación de la financiación propia: los socios inversores; 4.6 Negociaciones de inversiones de intermediarios financieros; 4.7 Negociación con agentes intermediarios; 4.8 Declaración de obra nueva y división horizontal; 4.9 Negociación de contratos de comercialización…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull)Lectura limitada a 1 usuario concurrente.
Libro electrónico -
7
-
8
-
9por Gucer, VasfiTabla de Contenidos: “…Sample scenarios -- 4.1 TSM Extended Agent solution components -- 4.2 Tivoli Storage Manager command execution -- 4.3 When to use the TSM Extended Agent -- 4.4 TSM Extended Agent installation -- 4.5 Creating job definitions -- 4.5.1 Tivoli Storage Manager client command strings -- 4.5.2 Tivoli Storage Manager Admin command strings -- 4.5.3 Scheduling jobs using the workstation class -- 4.6 Description of the scenarios -- 4.6.1 Database backup -- 4.6.2 Backup device configuration -- 4.6.3 Backup volume history -- 4.6.4 Clean volume history -- 4.6.5 Expiration process -- 4.6.6 Reclamation process -- 4.6.7 Migration process -- 4.6.8 Restore -- 4.7 Summary -- Appendix A. …”
Publicado 2005
Libro electrónico -
10por Montalt Alcayde, Enrique ( 1948-)
Publicado 2010Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
11
-
12
-
13
-
14Publicado 2020Libro electrónico
-
15por Ballesteros, Ruth
Publicado 2011Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
16
-
17Publicado 2014Tabla de Contenidos: “…Antifungal Agents -- 58. Antiviral Agents (Nonretroviral) -- 59. …”
Libro electrónico -
18Publicado 2014Tabla de Contenidos: “…Machine generated contents note: Preface ix References xii 1 Introduction 1 1.1 Overview 1 1.2 Cloud definition 2 1.3 Cloud evolution 3 1.4 Cloud services 5 1.5 Cloud deployment types 6 1.6 Main challenges of Clouds 7 1.7 Summary 10 1.8 Exercises 10 References 11 Part One Cloud management 13 2 Cloud structure 15 2.1 Introduction 15 2.2 Infrastructure components 15 2.3 Cloud Layers 17 2.4 Cloud relations 23 2.5 Cloud dynamics 27 2.6 Data types 27 2.7 Summary 30 2.8 Exercises 30 References 30 3 Fundamentals of Cloud management 31 3.1 Introduction 31 3.2 Clouds management services 32 3.3 Virtual control center 37 3.4 Prerequisite input-data for the management services 37 3.5 Management of user requirements 40 3.6 Summary 46 3.7 Exercises 47 References 47 4 Cloud properties 49 4.1 Introduction 49 4.2 Adaptability property 50 4.3 Resilience property 51 4.4 Scalability property 52 4.5 Availability property 53 4.6 Reliability property 53 4.7 Security and privacy property 54 4.8 Business model 55 4.9 Summary 56 4.10 Exercises 57 References 57 5 Automated management services 59 5.1 Introduction 59 5.2 Virtual layer self-managed services 60 5.3 Virtual services interdependency 65 5.4 Application layer self-managed services 67 5.5 Application services interdependency 70 5.6 Security and privacy by design 71 5.7 Multi-tier application deployment in the Cloud 73 5.8 Main challenges and requirements 79 5.9 Summary 82 5.10 Exercises 82 References 83 Part Two Clouds security fundamentals 85 6 Background 87 6.1 Topics flow 87 6.2 Trusted Computing 89 6.3 Summary 97 References 97 7 Challenges for establishing trust in Clouds 99 7.1 Introduction 99 7.2 Effects of Cloud dynamism on trust relationships 100 7.3 Challenges 103 7.4 Summary 105 7.5 Exercises 105 References 105 8 Establishing trust in Clouds 107 8.1 Introduction 107 8.2 Organization requirements 107 8.3 Framework requirements 108 8.4 Device properties 111 8.5 Framework architecture 112 8.6 Required software agents 116 8.7 Framework workflow 119 8.8 Discussion and analysis 125 8.9 Summary 126 8.10 Exercises 127 References 127 9 Clouds chains of trust 129 9.1 Introduction 129 9.2 Software agents revision 130 9.3 Roots of and chains of trust definition 130 9.4 Intra-layer chains of trust 132 9.5 Trust across layers 140 9.6 Summary 143 9.7 Exercises 143 References 143 10 Provenance in Clouds 145 10.1 Introduction 145 10.2 Motivating scenarios 148 10.3 Log records management and requirements 150 10.4 Framework domain architecture 155 10.5 Framework software agents 157 10.6 Framework workflow 160 10.7 Threat analysis 171 10.8 Discussion and future directions 173 10.9 Exercises 175 References 175 11 Insiders 177 11.1 Introduction 177 11.2 Insiders definition 178 11.3 Conceptual models 182 11.4 Summary 185 11.5 Exercises 185 References 186 Part Three Practical examples 187 12 Real life examples 189 12.1 Open Stack 189 12.2 Amazon web services 195 12.3 Component architecture 197 12.4 Prototype 203 12.5 Summary 209 Reference 209 13 Case study 211 13.1 Scenario 211 13.2 Home healthcare architecture in the Cloud 212 13.3 Insiders analysis for home healthcare 212 13.4 Cloud threats 220 References 226 …”
Libro electrónico -
19Publicado 1989Tabla de Contenidos: “…Failure Handling in Routine Design; 4.1 Introduction to Failure-Handling; 4.2 Knowledge for Failure Handling; 4.3 Redesign Problem-solving; 4.4 An Overview of Failure Handling; 4.5 Design Agent Failure; 4.6 Failure-handling in Other Research; 4.7 Summary…”
Libro electrónico -
20Publicado 2003Tabla de Contenidos: “…Antidepressants II: Tricyclic Agents; 24. Antidepressants III: Other Agents; 25. …”
Libro electrónico