Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 665
- Història 642
- Església Catòlica 420
- España 334
- Biografia 264
- Antonio María Claret 257
- Cristianisme 226
- Bíblia 225
- Aspectes religiosos 212
- Política 198
- Cortés, Hernán 191
- Vida cristiana 146
- Espanya 128
- Cortes Españolas 126
- Vida espiritual 119
- Claret i Clarà, Antoni Maria 116
- Crítica e interpretación 109
- Biblia 106
- Jesús 102
- Donoso Cortés, Juan 97
- Sermones 95
- Crítica i interpretació 94
- Biografías 90
- Català 90
- Ensenyament 80
- Universidad Pontificia de Salamanca (España) 79
- Flores 78
- Meditaciones 77
- Mare de Déu 76
- Castilla (Reino) 75
-
15241Publicado 2011Tabla de Contenidos: “…. -- References -- A Method for Wandering Trajectory Detection in Video Monitor -- Introduction -- Algorithm Description -- Target Detection -- Determine the Initial Half-Line -- Calculate the Angle -- Judge the Type of Trajectory -- Experimental Results and Analysis -- Conclusion -- References -- The Design of a Vision-Based Motion Performance System -- Introduction -- Related Work -- System Overview -- Initialization -- Feature Detection -- Feature Tracking -- 3D Point Reconstruction and Display -- Experiments and Analysis -- Conclusion -- References -- Window Function for EEG Power Density Estimation and Its Application in SSVEP Based BCIs -- Introduction -- Experiment Setting -- Subjects -- EEG Recording -- Experimental Paradigms -- EEG Signal and Window Function -- Application in SSVEP -- Method -- Result -- Conclusion -- References -- Efficient Multi-resolution Plane Segmentation of 3D Point Clouds -- Introduction -- Related Work -- Efficient Multi-resolution Segmentation into Planar Segments -- Efficient Normal Estimation through Multiple Resolutions -- Pre-segmentation in Hough-Space -- Segmentation into Connected Components -- Accurate Segmentation through RANSAC -- Coarse-to-Fine Segmentation -- Post-Processing -- Experiments -- Conclusion and Future Work -- References -- 3D Body Pose Estimation Using an Adaptive Person Model for Articulated ICP -- Introduction -- Related Work -- Basic Algorithm -- Human Body Model -- Articulated Iterative Closest Point Algorithm -- Proposed Extensions -- Data Segmentation -- Data Assignment -- Model Adaption -- Self-collision Checking -- Model Initialization -- Experiments -- Conclusions -- References -- Self-optimising Production Systems…”
Libro electrónico -
15242Publicado 2016Tabla de Contenidos: “…Composing figures -- Arrow -- Star -- Assets mock-up -- Substituting the temporary assets -- Using labels -- Gizmos -- Getting basic core concepts into Unity -- Quick navigation -- Revisiting the prototype -- Testing with the closest people -- Testing with external people -- How to test -- Revisiting your prototype and iterating -- Summary -- Chapter 6: Breathing Life into Your First Creation - Creating and Importing Assets for Your Application -- Designing the application -- Creating the game elements -- Adobe Illustrator -- Vector graphics -- An introduction to Illustrator -- Creating badges in Illustrator -- Getting all rounded -- Using the Shape tool -- Using the effect -- Showing the best of you with badges -- Aiming above the bar -- Putting it all together with sprite sheets -- Importing and setting our assets in Unity -- Importing assets -- Import Settings -- The Sprite Editor -- Testing our settings -- Testing the packing tag -- Testing the dimensions of the sprites -- Summary -- Chapter 7: Get Your Motor Running -- Designing our application -- Getting started -- Creating the application interface -- The lateral menu -- The interface -- Opening and closing the menu -- Adding items to the menu -- The Home page -- The Tasks page -- Navigating through the different screens -- Defining tasks -- Object-oriented -- The Task class -- Dealing with tasks -- A prefab as Task panel -- The Task manager -- Allowing the user to create new Tasks -- Create Task button -- Delete task button -- Adding the icon -- Inserting the title -- Inserting the Due date -- Selecting the Task priority -- Setting up the Tasks page -- Summary -- Chapter 8: Break, Destroy, and Rebuild - the Art of Playtesting and Iteration -- Playtesting -- Methods of playtesting -- Going solo -- Group testing -- Open or controlled -- Getting the info - have a plan!…”
Libro electrónico -
15243Publicado 2019Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
15244por León Sanz, Rafael
Publicado 2014Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
15245por Nowicki, Zbigniew M.
Publicado 2007Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
15246Publicado 2013Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico
-
15247Publicado 2020Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico
-
15248Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Finding the closest object in the feature space -- Getting ready -- How to do it... -- How it works... -- There's more... -- Probabilistic clustering with Gaussian mixture models -- Getting ready -- How to do it... -- How it works... -- Using k-means for outlier detection -- Getting ready -- How to do it... -- How it works... -- Using KNN for regression -- Getting ready -- How to do it... -- How it works.. -- Chapter 7: Cross-Validation and Post-Model Workflow -- Introduction -- Selecting a model with cross-validation -- Getting ready -- How to do it... -- How it works... -- K-fold cross validation -- Getting ready -- How to do it.. -- There's more... -- Balanced cross-validation -- Getting ready -- How to do it... -- There's more... -- Cross-validation with ShuffleSplit -- Getting ready -- How to do it... -- Time series cross-validation -- Getting ready -- How to do it... -- There's more... -- Grid search with scikit-learn -- Getting ready -- How to do it... -- How it works... -- Randomized search with scikit-learn -- Getting ready -- How to do it... -- Classification metrics…”
Libro electrónico -
15249Publicado 2016Tabla de Contenidos: “…-- Functions Relevant to Lookups -- Basic Lookup Formulas -- The VLOOKUP function -- The HLOOKUP function -- The LOOKUP function -- Combining the MATCH and INDEX functions -- Specialized Lookup Formulas -- Looking up an exact value -- Looking up a value to the left -- Performing a case-sensitive lookup -- Choosing among multiple lookup tables -- Determining letter grades for test scores -- Calculating a grade point average -- Performing a two-way lookup -- Performing a two-column lookup -- Determining the address of a value within a range -- Looking up a value by using the closest match -- Looking up a value using linear interpolation -- Chapter 9: Working with Tables and Lists -- Tables and Terminology -- A list example -- A table example -- Working with Tables -- Creating a table -- Changing the look of a table -- Navigating and selecting in a table -- Adding new rows or columns -- Deleting rows or columns -- Moving a table -- Removing duplicate rows from a table -- Sorting and filtering a table -- Working with the Total row -- Using formulas within a table -- Referencing data in a table -- Converting a table to a list -- Using Advanced Filtering -- Setting up a criteria range -- Applying an advanced filter -- Clearing an advanced filter -- Specifying Advanced Filter Criteria -- Specifying a single criterion -- Specifying multiple criteria -- Specifying computed criteria -- Using Database Functions -- Inserting Subtotals -- Chapter 10: Miscellaneous Calculations -- Unit Conversions -- Rounding Numbers -- Basic rounding formulas…”
Libro electrónico -
15250Publicado 2015Tabla de Contenidos: “…Marilyn Carlson Nelson: Losing a Loved One -- My Crucibles Came Early -- Coping with Tragedy -- Exercise: Your Greatest Crucible -- Part Two: Developing as an Authentic Leader -- Chapter 4: Self-Awareness -- Arianna Huffington: Redefining Success -- Becoming Self-Aware -- The Importance of Emotional Intelligence -- David Pottruck: Journey to Self-Awareness -- Peeling Back the Onion -- Vulnerability Is Power -- Reflection and Introspection -- Randy Komisar's Struggle to Find His Track -- Chade-Meng Tan, Google's Jolly Good Fellow -- The Importance of Feedback -- Opening up Hidden Areas -- Lord John Browne and Tim Cook: Emerging from the Closet -- The Civil Rights Issue of our Time -- Self-Compassion and Self-Acceptance -- Becoming a Mindful Leader -- Exercise: Knowing Your Authentic Self -- Chapter 5: Values -- David Gergen: Crisis Strengthened His Values -- Values, Leadership Principles, and Ethical Boundaries -- Narayana Murthy: Building a Company with Principles -- Sam Palmisano: Leading by Values -- Testing Values under Pressure -- Jon Huntsman: Testing Values under Pressure -- Sallie Krawcheck: Putting Clients First -- Keith Krach: When Values Conflict -- Setting Ethical Boundaries -- Judy Haberkorn: Transparency Is the Right Thing to Do -- Values Challenges at Medtronic -- Exercise: Practicing Your Values and Principles -- Chapter 6: Sweet Spot -- Warren Buffett Finds His Sweet Spot -- Finding His Sweet Spot -- Buffett versus Wall Street -- Intrinsic and Extrinsic Motivations -- Finding Your Sweet Spot -- Exploring Warren Buffett's Motivations -- Tracy Britt: Heeding Your Call -- Kevin Sharer: Discovering His Sweet Spot -- Avoiding the Trap of Extrinsic Motivations -- Balancing Your Motivations -- Build on Your Strengths -- Chuck Schwab's Journey to His Sweet Spot -- Exercise: Your Sweet Spot -- Chapter 7: Support Team…”
Libro electrónico -
15251Publicado 2024Tabla de Contenidos: “…Written Lab -- Review Questions -- Chapter 9 Security Vulnerabilities, Threats, and Countermeasures -- Shared Responsibility -- Data Localization and Data Sovereignty -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Hardware -- Firmware -- Client-Based Systems -- Mobile Code -- Local Caches -- Server-Based Systems -- Large-Scale Parallel Data Systems -- Grid Computing -- Peer to Peer -- Industrial Control Systems -- Distributed Systems -- High-Performance Computing (HPC) Systems -- Real-Time Operating Systems -- Internet of Things -- Edge and Fog Computing -- Embedded Devices and Cyber-Physical Systems -- Static Systems -- Cyber-Physical Systems -- Security Concerns of Embedded and Static Systems -- Microservices -- Infrastructure as Code -- Immutable Architecture -- Virtualized Systems -- Virtual Software -- Virtualized Networking -- Software-Defined Everything -- Virtualization Security Management -- Containerization -- Mobile Devices -- Mobile Device Security Features -- Mobile Device Deployment Policies -- Essential Security Protection Mechanisms -- Process Isolation -- Hardware Segmentation -- Root of Trust -- System Security Policy -- Common Security Architecture Flaws and Issues -- Covert Channels -- Attacks Based on Design or Coding Flaws -- Rootkits -- Incremental Attacks -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 10 Physical Security Requirements -- Apply Security Principles to Site and Facility Design -- Secure Facility Plan -- Site Selection -- Facility Design -- Implement Site and Facility Security Controls -- Equipment Failure -- Wiring Closets -- Server Rooms/Data Centers -- Intrusion Detection Systems -- Cameras -- Access Abuses -- Media Storage Facilities -- Evidence Storage -- Work Area Security -- Utility Considerations…”
Libro electrónico -
15252Publicado 2024Tabla de Contenidos: “…-- K-means clustering -- Inertia -- Dunn's index -- Summary -- Chapter 3: Labeling Data for Regression -- Technical requirements -- Using summary statistics to generate housing price labels -- Finding the closest labeled observation to match the label -- Using semi-supervised learning to label regression data -- Pseudo-labeling…”
Libro electrónico -
15253Publicado 2021Tabla de Contenidos: “…Lawrance -- Per l'edizione di Guittone d'Arezzo: «Tutto mi strugge, in pensero e 'n pianto» (VI) / Lino Leonardi -- Boscà, Mendoza, Cetina i March / Albert Lloret -- Postil•les musicals franceses als «Estramps» de Jordi de Sant Jordi / Marta Marfany i Simó -- Sobre els falsos profetes al «Segon del Crestià» / Sadurní Martí -- La «Història de Jacob Xalabín», trenta anys després / Llúcia Martín Pascual -- Narcís Vinyoles i els petits animals literaris / Tomàs Martínez Romero -- Higini Anglès i Rafael Patxot i Jubert / Josep Massot i Muntaner -- Llull's arguments for the existence of God: a reflection on the basis of the «Llibre del gentil» / Annemarie C. …”
Enlace del recurso
Libro -
15254Publicado 1999Tabla de Contenidos: “…Ramon Artigues, Ramon Sanabria, Lluís Comeron -- Mercat de la Boqueria, Arq. Lluís Clotet i Ballús, Ignacio Paricio i Ansuátegui -- Pla especial de la Casa de Misericòrdia, per a la construcció de les noves facultats de Geografia, Història i Filosofia de la Universitat de Barcelona, Arq. …”
Libro -
15255Publicado 2022Tabla de Contenidos: “…Select Controls Based Upon Systems Security Requirements -- Evaluation criteria -- System certification and accreditation -- Understand Security Capabilities of Information Systems -- Trusted Computing Base -- Trusted Platform Module -- Secure modes of operation -- Open and closed systems -- Memory protection -- Encryption and decryption -- Protection rings -- Security modes -- Recovery procedures -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Client-based systems -- Server-based systems -- Database systems -- Cryptographic systems -- Industrial control systems -- Cloud-based systems -- Distributed systems -- Internet of Things -- Microservices -- Containerization -- Serverless -- Embedded systems -- High-performance computing systems -- Edge computing systems -- Virtualized systems -- Web-based systems -- Mobile systems -- Select and Determine Cryptographic Solutions -- Plaintext and ciphertext -- Encryption and decryption -- End-to-end encryption -- Link encryption -- Putting it all together: The cryptosystem -- Classes of ciphers -- Types of ciphers -- Cryptographic life cycle -- Cryptographic methods -- Public key infrastructure -- Key management practices -- Digital signatures and digital certificates -- Nonrepudiation -- Integrity (hashing) -- Understand Methods of Cryptanalytic Attacks -- Brute force -- Ciphertext only -- Known plaintext -- Frequency analysis -- Chosen ciphertext -- Implementation attacks -- Side channel -- Fault injection -- Timing -- Man in the middle -- Pass the hash -- Kerberos exploitation -- Ransomware -- Apply Security Principles to Site and Facility Design -- Design Site and Facility Security Controls -- Wiring closets, server rooms, and more -- Restricted and work area security -- Utilities and heating, ventilation, and air conditioning -- Environmental issues…”
Libro electrónico -
15256Publicado 2021Tabla de Contenidos: “…Lawrance -- Per l'edizione di Guittone d'Arezzo: «Tutto mi strugge, in pensero e 'n pianto» (VI) / Lino Leonardi -- Boscà, Mendoza, Cetina i March / Albert Lloret -- Postil•les musicals franceses als «Estramps» de Jordi de Sant Jordi / Marta Marfany i Simó -- Sobre els falsos profetes al «Segon del Crestià» / Sadurní Martí -- La «Història de Jacob Xalabín», trenta anys després / Llúcia Martín Pascual -- Narcís Vinyoles i els petits animals literaris / Tomàs Martínez Romero -- Higini Anglès i Rafael Patxot i Jubert / Josep Massot i Muntaner -- Llull's arguments for the existence of God: a reflection on the basis of the «Llibre del gentil» / Annemarie C. …”
Enlace del recurso
991006033449706719 -
15257Publicado 2012Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico
-
15258por Camarillo, GonzaloTabla de Contenidos: “…5.9 Changes due to Next Generation Networks (NGN) -- 5.10 Interworking -- 5.11 Combinational Services -- 5.12 Basic Sessions not Requiring Resource Reservation -- 5.13 Globally Routable User-Agent URI (GRUU) in IMS -- 5.14 IMS Communication Services Identification (ICSI) -- 5.15 IMS Application Reference Identifier (IARI) -- 5.16 NAT Traversal in the IMS -- 6 AAA on the Internet -- 6.1 Authentication, Authorization, and Accounting -- 6.2 AAA Framework on the Internet -- 6.3 The Diameter Protocol -- 7 AAA in the IMS -- 7.1 Authentication and Authorization in the IMS -- 7.2 he Cx and Dx Interfaces -- 7.3 The Sh Interface -- 7.4 Accounting -- 8 Policy and Charging Control in the IMS -- 8.1 PCC Architecture -- 8.2 Charging Architecture -- 8.3 Offline Charging Architecture -- 8.4 Online Charging Architecture -- 9 Quality of Service on the Internet -- 9.1 Integrated Services -- 9.2 Differentiated Services -- 10 Quality of Service in the IMS -- 10.1 Policy Control and QoS -- 10.2 Instructions to Perform Resource Reservations -- 10.3 Reservations by the Terminals -- 10.4 QoS in the Network -- 11 Security on the Internet -- 11.1 HTTP Digest Access Authentication -- 11.2 Certificates -- 11.3 TLS -- 11.4 S/MIME -- 11.5 Authenticated Identity Body -- 11.6 IPsec -- 11.7 Privacy -- 11.8 Encrypting Media Streams -- 12 Security in the IMS -- 12.1 Access Security -- 12.2 Network Security -- 13 Emergency Calls on the Internet -- 13.1 Introduction -- 13.2 Location Acquisition -- 13.3 Identifying Emergency Calls -- 13.4 Locating the closest PSAP -- 14 Emergency Calls in the IMS -- 14.1 Architecture for Supporting Emergency Calls in IMS -- 14.2 Establishing an Emergency Call in IMS -- 14.3 IMS Registration for Emergency Calls -- 14.4 Call back from PSAP to user -- 14.5 Anonymous calls -- 14.6 Emergency Calls in Fixed Broadband Accesses -- Part III The Media Plane in the IMS -- 15 Media Encoding -- 15.1 Speech Encoding -- 15.2 Video Encoding -- 15.3 Text Encoding -- 15.4 Mandatory Codecs in the IMS…”
Publicado 2008
Libro electrónico -
15259Publicado 2024Tabla de Contenidos: “…Cooling Systems -- Refrigeration Power Units -- Refrigerant Properties -- Refrigerant System Characteristics -- Packaged Air-Conditioning Systems -- Psychrometrics - Processes and Applications -- Heat Pumps -- Heat Recovery Devices -- Legionnaires' Disease -- Health Considerations and Building-Related Illnesses -- Part Eight-Drainage Systems, Sewage Treatment and Refuse Disposal -- Combined and Separate Systems -- Partially Separate System -- Rodding Point System -- Sewer Connection -- Drainage Ventilation -- Unventilated Stacks -- Drain Laying -- Means of Access -- Bedding of Drains -- Drains Under or Near Buildings -- Drainpipe Materials -- Joints Used on Drainpipes -- Anti-Flood Devices -- Garage Drainage -- Drainage Pumping -- Subsoil Drainage -- Tests on Drains -- Soakaways -- Cesspools and Septic Tanks -- Drainage Fields and Mounds -- Rainwater Harvesting -- Drainage Design and Formulae -- Waste and Refuse Processing -- Part Nine-Sanitary Fitments and Appliances: Discharge and Waste Systems -- Flushing Cisterns, Troughs and Valves -- Water Closets -- Bidets -- Showers -- Baths -- Sinks -- Wash Basins and Troughs -- Unplugged Appliances -- Thermostatic Temperature Control -- Urinals -- Hospital Sanitary Appliances -- Sanitary Conveniences -- Sanitary Conveniences for Disabled People -- Traps and Waste Valve -- Single-Stack System and Variations -- One- and Two-Pipe Systems -- Pumped Waste System -- Wash Basins - Waste Arrangements -- Washing Machine and Dishwasher Wastes -- Air Test -- Sanitation - Data -- Offsets -- Ground-Floor Appliances - High-Rise Buildings -- Fire Stops and Seals -- Flow Rates and Discharge Units -- Sanitation Design - Discharge Stack Sizing -- Gutter and Downpipe Sizing -- Part Ten-Gas Installation, Components and Controls -- Natural Gas - Combustion -- Mains Gas Supply and Installation -- Gas Service Pipe Intake…”
Libro electrónico -
15260por OECDTabla de Contenidos: “…Améliorer la gouvernance des régulateurs et la mise en œuvre de la réglementation -- Principaux constats -- Introduction -- Exécution des réglementations : un élément crucial de la politique réglementaire -- Les régulateurs et les organismes d'inspection, idéalement placés pour clore le cycle de la politique réglementaire -- Importance de l'existence de structures de gouvernance solides -- Une flexibilité nécessaire dans un environnement en pleine évolution -- Coordination entre institutions chargées de fournir des services réglementaires -- Relations avec le Parlement et confiance -- Créer une culture de l'indépendance -- Des cadres de ressources autonomes -- Des moyens de gestion et d'analyse des données suffisants -- Changer de méthode pour faire appliquer la réglementation et promouvoir son respect -- Notes -- Références -- Chapter 5. …”
Publicado 2018
Libro electrónico