Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 69
- Development 50
- Computer networks 44
- Management 38
- Application software 36
- Educació primària 28
- Ciencias empresariales 27
- Llibres de text 26
- Llibres del mestre 26
- Engineering & Applied Sciences 25
- Finance 25
- History 25
- Història 25
- Economics 24
- Business & Economics 23
- Certification 20
- Examinations 20
- Economic conditions 19
- Computer security 18
- Electronic data processing personnel 17
- Security measures 17
- Computer programs 16
- Universidad Pontificia de Salamanca (España) 16
- Electronic data processing 15
- Francisco Gárate 15
- Llibres d'exercicis 15
- Material didàctic 15
- Computer Science 14
- Information technology 14
- Law and legislation 14
-
1681Publicado 2020Tabla de Contenidos: “…6.3 Typing Conditionals -- 6.4 Open-logical Predicates for Refinement Types -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Constructive Game Logic -- 1 Introduction -- 2 Related Work -- 3 Syntax -- 3.1 Example Games -- 4 Semantics -- 4.1 Realizers -- 4.2 Formula and Game Semantics -- 4.3 Demonic Semantics -- 5 Proof Calculus -- 6 Theory: Soundness -- 7 Operational Semantics -- 8 Theory: Constructivity -- 9 Conclusion and Future Work -- References -- Optimal and Perfectly Parallel Algorithms for On-demand Data-flow Analysis -- 1 Introduction -- 2 Preliminaries -- 2.1 The IFDS Framework -- 2.2 Trees and Tree Decompositions -- 3 Problem definition -- 4 Treewidth-based Data-ow Analysis -- 4.1 Preprocessing -- 4.2 Word Tricks -- 4.3 Answering Queries -- 4.4 Parallelizability and Optimality -- 5 Experimental Results -- 6 Conclusion -- References -- Concise Read-Only Specifications for Better Synthesis of Programs with Pointers -- 1 Introduction -- 1.1 Correct Programs that Do Strange Things -- 1.2 Towards Simple Read-Only Specifications for Synthesis -- 1.3 Our Contributions -- 2 Program Synthesis with Read-Only Borrows -- 2.1 Basics of SSL-based Deductive Program Synthesis -- 2.2 Reducing Non-Determinism with Read-Only Annotations -- 2.3 Composing Read-Only Borrows -- 2.4 Borrow-Polymorphic Inductive Predicates -- 3 BoSSL: Borrowing Synthetic Separation Logic -- 3.1 BoSSL rules -- 3.2 Memory Model -- 3.3 Soundness -- 4 Implementation and Evaluation -- 4.1 Experimental Setup -- 4.2 Performance and Quality of the Borrowing-Aware Synthesis -- 4.3 Stronger Correctness Guarantees -- 4.4 Robustness under Synthesis Perturbations -- 5 Limitations and Discussion -- 6 Related Work -- 7 Conclusion -- References -- Soundness conditions for big-step semantics -- 1 Introduction -- 2 A meta-theory for big-step semantics -- 3 Extended semantics…”
Libro electrónico -
1682Publicado 2015Tabla de Contenidos: “…Cell Challenges 93 -- 3.7 Conclusions and Future Directions 97 -- References 99 -- 4 Cooperation for Next Generation Wireless Networks 105 -- 4.1 Introduction 105 -- 4.2 Cooperative Diversity and Relaying Strategies 107 -- 4.2.1 Cooperation and Network Coding 107 -- 4.2.2 Cooperative ARQ MAC Protocols 108 -- 4.3 PHY Layer Impact on MAC Protocol Analysis 110 -- 4.3.1 Impact of Fast Fading and Shadowing on Packet Reception for QoS Guarantee 111 -- 4.3.2 Impact of Shadowing Spatial Correlation 112 -- 4.4 Case Study: NCCARQ 113 -- 4.4.1 NCCARQ Overview 113 -- 4.4.2 PHY Layer Impact 114 -- 4.5 Performance Evaluation 116 -- 4.5.1 Simulation Scenario 116 -- 4.5.2 Simulation Results 117 -- 4.6 Conclusion 122 -- Acknowledgements 122 -- References 122 -- 5 Mobile Clouds: Technology and Services for Future Communication Platforms 125 -- 5.1 Introduction 125 -- 5.2 The Mobile Cloud 127 -- 5.2.1 User Resources 129 -- 5.2.2 Software Resources 130 -- 5.2.3 Hardware Resources 131 -- 5.2.4 Networking Resources 132 -- 5.3 Mobile Cloud Enablers 133 -- 5.3.1 The Mobile User Domain 133 -- 5.3.2 Wireless Technologies 135 -- 5.3.3 Software and Middleware 139 -- 5.4 Network Coding 140 -- 5.5 Summary 145 -- References 145 -- 6 Cognitive Radio for 5G Wireless Networks 149 -- 6.1 Introduction 149 -- 6.2 Overview of Cognitive Radio Technology in 5G Wireless 150 -- 6.3 Spectrum Optimisation using Cognitive Radio 152 -- 6.4 Relevant Spectrum Optimisation Literature in 5G 152.…”
Libro electrónico -
1683Publicado 2018Tabla de Contenidos: “…Front Cover -- Estimation and Control of Large-Scale Networked Systems -- Copyright -- Contents -- Preface -- Acknowledgments -- Notation and Symbols -- 1 Introduction -- 1.1 A General View on Control System Design -- 1.2 Communication and Control -- 1.3 Book Contents -- 1.3.1 Controllability and Observability of a Control System -- 1.3.2 Centralized and Distributed State Estimations -- 1.3.3 State Estimations and Control With Imperfect Communications -- 1.3.4 Veri cation of Stability and Robust Stability -- 1.3.5 Distributed Controller Design for an LSS -- 1.3.6 Structure Identi cation for an LSS -- 1.3.7 Attack Estimation/Identi cation and Other Issues -- 1.4 Bibliographic Notes -- References -- 2 Background Mathematical Results -- 2.1 Linear Space and Linear Algebra -- 2.1.1 Vector and Matrix Norms -- 2.1.2 Hamiltonian Matrices and Distance Among Positive De nite Matrices -- 2.2 Generalized Inverse of a Matrix -- 2.3 Some Useful Transformations -- 2.4 Set Function and Submodularity -- 2.5 Probability and Random Process -- 2.6 Markov Process and Semi-Markov Process -- 2.7 Bibliographic Notes -- References -- 3 Controllability and Observability of an LSS -- 3.1 Introduction -- 3.2 Controllability and Observability of an LTI System -- 3.2.1 Minimal Number of Inputs/Outputs Guaranteeing Controllability/Observability -- 3.2.2 A Parameterization of Desirable Input/Output Matrices -- 3.2.3 Some Nitpicking -- 3.3 A General Model for an LSS -- 3.4 Controllability and Observability for an LSS -- 3.4.1 Subsystem Transmission Zeros and Observability of an LSS -- 3.4.2 Observability Veri cation -- 3.4.3 A Condition for Controllability and Its Veri cation -- 3.4.4 In/Out-degree and Controllability/Observability of a Networked System -- 3.5 Construction of Controllable/Observable Networked Systems -- 3.6 Bibliographic Notes -- Appendix 3.A…”
Libro electrónico -
1684por Enea, ConstantinTabla de Contenidos: “…2.2 Existing Approaches -- 3 Algorithms -- 3.1 First-Cut Algorithm -- 3.2 Logarithmic Algorithm -- 3.3 Lazy Algorithm -- 4 Experimental Evaluation -- 5 Application to Extended Regular Expressions -- 5.1 Reduction from Incremental Regex Emptiness to GIDs -- 6 Related Work -- References -- Model Checking Race-Freedom When ``Sequential Consistency for Data-Race-Free Programs'' is Guaranteed -- 1 Introduction -- 2 Theory -- 3 Implementation and Evaluation -- 3.1 Background on OpenMP -- 3.2 Background on CIVL-C -- 3.3 Transformation for Data Race Detection -- 3.4 Evaluation -- 4 Related Work -- 5 Conclusion -- References -- Searching for i-Good Lemmas to Accelerate Safety Model Checking -- 1 Introduction -- 2 Preliminaries -- 2.1 Boolean Transition System -- 2.2 Safety Checking and Reachability Analysis -- 2.3 Overview of IC3 and CAR -- 3 Finding i-Good Lemmas -- 3.1 What Are i-good Lemmas -- 3.2 Searching for i-good Lemmas -- 4 Related Work -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Experimental Results -- 5.3 Why Do branching and refer-skipping Work? …”
Publicado 2023
Libro electrónico -
1685Publicado 2024Tabla de Contenidos: “…3.3 Fundamental Human Rights Guarantees -- 3.3.1 Right to Life -- 3.3.2 Substantive Human Rights -- 3.3.2.1 Right to Food -- 3.3.2.2 Right to Water and Sanitation -- 3.3.2.3 Right to Adequate Accommodation -- 3.3.3 Right to Health -- 4 Breaches under International Criminal Law -- 4.1 Arbitrary Withholding of Consent as a War Crime -- 4.1.1 War Crimes in General -- 4.1.2 Murder, Torture and Cruel Treatment -- 4.1.3 Starvation of Civilians -- 4.1.3.1 Amendment of Article 8 of the Rome Statute -- 4.1.3.2 Reasons for Including the Crime of Starvation for Situations of Non-international Armed Conflict -- 4.1.3.3 Elements of Starvation under the Rome Statute -- 4.2 Withholding of Consent as a Crime against Humanity -- 4.2.1 Crimes against Humanity in General -- 4.2.2 Offences, in Particular Torture and Extermination -- 4.3 Withholding of Consent as Genocide -- 4.3.1 Definition of Genocide and Required Intention -- 4.3.2 Offences, in Particular Killing and Causing Serious Harm -- Part 4 Legal Consequences of Arbitrary Withholding of Consent -- Chapter 14 Introduction -- Chapter 15 Accountability of the Affected State -- 1 State Responsibility -- 1.1 Constitutive Elements -- 1.2 Scope of Application -- 1.3 Consequences of State Responsibility -- 1.3.1 Cessation and Reparation -- 1.3.2 Invocation -- 2 Responsibility for Violations of Human Rights Treaties -- 2.1 In General -- 2.2 Individual Complaint Procedure and Monitoring Mechanisms -- 3 Individual Responsibility under Criminal Law -- Chapter 16 Accountability of Non-state Armed Groups -- 1 No Direct Responsibility of the Armed Group -- 2 Determination of Breaches within Monitoring Mechanisms -- 2.1 Addressing Breaches of Non-state Armed Groups -- 2.2 Attribution of an Act to Armed Groups -- 3 Individual Responsibility of the Members of the Armed Group -- 3.1 Under International Criminal Law…”
Libro electrónico -
1686Publicado 2022“…The experimental project arose from the need to respond to the need to guarantee the practicability of professional training courses at a time when, due to the pandemic, it was not possible to accommodate all students in schools. …”
Libro electrónico -
1687Publicado 2012“…The Java programming language provides safety and security guarantees such as type safety and its security architecture. …”
Libro electrónico -
1688Publicado 2010“…In addition to being a fundamental human right, access to justice is one of the conditions to guarantee the effectiveness of all human rights. A society that does not guarantee access to justice can hardly be said to be a society that has effectively reached a Democratic Rule of Law…”
Libro electrónico -
1689Publicado 2017Tabla de Contenidos: “…Front Cover -- Advances in GPU Research and Practice -- Copyright -- Dedication -- Contents -- List of Contributors -- Preface -- Acknowledgments -- Part 1: Programming and tools -- Chapter 1: Formal analysis techniques for reliable GPU programming: current solutions and call to action -- 1 GPUs in Support of Parallel Computing -- Bugs in parallel and GPU code -- 2 A quick introduction to GPUs -- Organization of threads -- Memory spaces -- Barrier synchronization -- Warps and lock-step execution -- Dot product example -- 3 Correctness issues in GPU programming -- Data races -- Lack of forward progress guarantees -- Floating-point accuracy -- 4 The need for effective tools -- 4.1 A Taxonomy of Current Tools -- 4.2 Canonical Schedules and the Two-Thread Reduction -- Race freedom implies determinism -- Detecting races: ``all for one and one for all'' -- Restricting to a canonical schedule -- Reduction to a pair of threads -- 4.3 Symbolic Bug-Finding Case Study: GKLEE -- 4.4 Verification Case Study: GPUVerify -- 5 Call to Action -- GPUs will become more pervasive -- Current tools show promise -- Solving basic correctness issues -- Equivalence checking -- Clarity from vendors and standards bodies -- User validation of tools -- Acknowledgments -- References -- Chapter 2: SnuCL: A unified OpenCL framework for heterogeneous clusters -- 1 Introduction -- 2 OpenCL -- 2.1 Platform Model -- 2.2 Execution Model -- 2.3 Memory Model -- 2.4 Synchronization -- 2.5 Memory Consistency -- 2.6 OpenCL ICD -- 3 Overview of SnuCL framework -- 3.1 Limitations of OpenCL -- 3.2 SnuCL CPU -- 3.3 SnuCL Single -- 3.4 SnuCL Cluster -- 3.4.1 Processing synchronization commands -- 4 Memory management in SnuCL Cluster -- 4.1 Space Allocation to Memory Objects -- 4.2 Minimizing Copying Overhead -- 4.3 Processing Memory Commands -- 4.4 Consistency Management…”
Libro electrónico -
1690Publicado 2019Tabla de Contenidos: “…9 Organization Assignment in Federated Cloud Environments based onMulti-Target Optimization of Security -- 9.1 Introduction -- 9.2 Background Work Related to Domain -- 9.2.1 Basics on Cloud computing -- 9.2.2 Clouds Which are Federated -- 9.2.3 Cloud Resource Management -- 9.3 Architectural-Based Cloud Security Implementation -- 9.4 Expected Results of the Process -- 9.5 Conclusion -- References -- 10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee -- 10.1 Introduction -- 10.1.1 Key Research Problems in This Area -- 10.1.2 Problems with Interoperability -- 10.2 Difficulties from a Cloud Adoption Perspective -- 10.3 Security and Privacy -- 10.3.1 Resource Provisioning -- 10.3.1.1 Unwavering Quality -- 10.3.1.2 Interoperability -- 10.3.2 How Do We Define Cloud? …”
Libro electrónico -
1691Publicado 2011Tabla de Contenidos: “…Cover -- Contents -- Preface -- Acknowledgements -- Chapter 1: Corporate Accounting (Company Accounts)-Issue of Share Capital -- 1.1 Definition -- 1.2 Characteristics of a Company -- 1.3 Kinds of Companies (or) Types of Companies -- 1.3.1 Statutory Companies -- 1.3.2 Government Company -- 1.3.3 Foreign Company -- 1.3.4 Holding Company -- 1.3.5 Subsidiary Company -- 1.3.6 Registered Company -- 1.3.7 Listed Company -- 1.3.8 Private Company -- 1.3.9 Limited Company -- 1.3.10 Unlimited Company -- 1.3.11 Distinction between Private Company and Public Limited Company -- 1.4 Privileges of a Private Limited Company -- 1.5 Documents -- 1.5.1 Memorandum of Association -- 1.5.2 Articles of Association -- 1.5.3 Certificate of Incorporation -- 1.5.4 Prospectus -- 1.5.5 Certificate of Commencement of Business -- 1.6 Share Capital -- 1.6.1 Authorized Capital (Nominal/Registered Capital) -- 1.6.2 Issued Capital -- 1.6.3 Subscribed Capital -- 1.6.4 Called-up Capital -- 1.6.5 Paid-up Capital -- 1.6.6 Uncalled Capital -- 1.6.7 Reserve Capital -- 1.7 Differences Between "Capital Reserve" and "Reserve Capital" -- 1.8 Shares of a Company -- 1.8.1 Meaning -- 1.8.2 Classes of Shares -- 1.8.2.1 Preference Share -- 1.8.3 Types or Kinds of Preference Shares -- 1.8.3.1 On the Basis of Dividend Right -- 1.8.3.2 On the Basis of Participation in Surplus Profits -- 1.8.3.3 On the Basis of Recovery of Capital -- 1.8.3.4 On the Basis of Conversion into Equity Shares -- 1.8.3.5 Guaranteed Preference Share -- 1.9 Equity Shares -- 1.9.1 Distinction Between Preference Share and Equity Share -- 1.10 Management of Companies -- 1.10.1 Shareholders -- 1.10.2 Board of Directors -- 1.10.3 Managing Director -- 1.10.4 Manager -- 1.11 General Meetings of the Company -- 1.11.1 Statutory Meeting -- 1.11.2 Annual General Meeting -- 1.11.3 Extraordinary General Meeting -- 1.12 Quorum…”
Libro electrónico -
1692por Gavin, LeeTabla de Contenidos: “…8.1 Overview of event notification -- 8.1.1 Subscription to a business object -- 8.2 Event and archive stores -- 8.2.1 Content of an event store -- 8.2.2 Implementing an event store -- 8.2.3 Accessing the event store -- 8.2.4 Creating an archive store -- 8.3 Polling -- 8.3.1 Standard behavior -- 8.3.2 Basic logic for the poll method -- 8.3.3 Archiving events -- 8.3.4 Multithreaded -- 8.3.5 Processing events by event priority -- 8.3.6 Event distribution -- 8.4 Custom pollForEvents() method -- 8.4.1 Accessing a subscription manager -- 8.4.2 Verifying the connection -- 8.4.3 Retrieving event records -- 8.4.4 Getting the business object name, verb, and key -- 8.4.5 Checking for subscriptions to the event -- 8.4.6 Retrieving application data -- 8.4.7 Sending the business object to Adapter Framework -- 8.4.8 Completing the processing of an event -- 8.4.9 Archiving the event -- 8.4.10 Releasing event store resources -- 8.5 Processing delete events -- 8.5.1 Setting the verb in the event record -- 8.5.2 Setting the verb in the business object -- 8.5.3 Setting the verb during mapping -- 8.6 Guaranteed event delivery -- 8.6.1 Container-managed events -- 8.6.2 Duplicate event elimination -- Chapter 9. …”
Publicado 2005
Libro electrónico -
1693Publicado 2014“…Designed with busy teachers in mind, the Classroom Gems series draws together an extensive selection of practical, tried-and-tested, off-the-shelf ideas, games and activities guaranteed to transform any lesson or classroom in an instant. …”
Libro electrónico -
1694Publicado 2014“…Designed with busy teachers in mind, the Classroom Gems series draws together an extensive selection of practical, tried-and-tested, off-the-shelf ideas, games and activities guaranteed to transform any lesson or classroom in an instant. …”
Libro electrónico -
1695Publicado 2014“…Designed with busy teachers in mind, the Classroom Gems series draws together an extensive selection of practical, tried-and-tested, off-the-shelf ideas, games and activities guaranteed to transform any lesson or classroom in an instant. …”
Libro electrónico -
1696Publicado 2015“…Fresh, creative strategies guaranteed to enliven online training 101 Ways to Make Learning Active Beyond the Classroom provides proven, practical strategies, activities, and tips for those tasked with facilitating training in any subject area among alternative settings. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
1697por Pugh, Colin“…In addition, the strength of the guarantee or covenant from the sponsoring employer(s) and of insolvency guarantee arrangements should be carefully assessed when designing funding requirements…”
Publicado 2008
Capítulo de libro electrónico -
1698por Erling, Dan“…It doesn't occur to them that, in fact, there is a process that virtually guarantees hiring the right person every time. To repeat: there is a process that virtually guarantees hiring the right person every time. …”
Publicado 2011
Libro electrónico -
1699por Foner, Eric, 1943-“…They established the principle of birthright citizenship and guaranteed the privileges and immunities of all citizens. …”
Publicado 2019
Libro -
1700Publicado 2021Tabla de Contenidos: “…-- 7.2 Creating your own file formats for data storage -- 7.2.1 Writing data to disk with serde and the bincode format -- 7.3 Implementing a hexdump clone -- 7.4 File operations in Rust -- 7.4.1 Opening a file in Rust and controlling its file mode -- 7.4.2 Interacting with the filesystem in a type-safe manner with std::fs::Path -- 7.5 Implementing a key-value store with a log-structured, append-only storage architecture -- 7.5.1 The key-value model -- 7.5.2 Introducing actionkv v1: An in-memory key-value store with a command-line interface -- 7.6 Actionkv v1: The front-end code -- 7.6.1 Tailoring what is compiled with conditional compilation -- 7.7 Understanding the core of actionkv: The libactionkv crate -- 7.7.1 Initializing the ActionKV struct -- 7.7.2 Processing an individual record -- 7.7.3 Writing multi-byte binary data to disk in a guaranteed byte order -- 7.7.4 Validating I/O errors with checksums -- 7.7.5 Inserting a new key-value pair into an existing database -- 7.7.6 The full code listing for actionkv -- 7.7.7 Working with keys and values with HashMap and BTreeMap -- 7.7.8 Creating a HashMap and populating it with values -- 7.7.9 Retrieving values from HashMap and BTreeMap -- 7.7.10 How to decide between HashMap and BTreeMap -- 7.7.11 Adding a database index to actionkv v2.0 -- Summary -- 8 Networking -- 8.1 All of networking in seven paragraphs -- 8.2 Generating an HTTP GET request with reqwest -- 8.3 Trait objects -- 8.3.1 What do trait objects enable? …”
Libro electrónico