Mostrando 1,681 - 1,700 Resultados de 2,396 Para Buscar 'Guarrate~', tiempo de consulta: 1.51s Limitar resultados
  1. 1681
    Publicado 2020
    Tabla de Contenidos: “…6.3 Typing Conditionals -- 6.4 Open-logical Predicates for Refinement Types -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Constructive Game Logic -- 1 Introduction -- 2 Related Work -- 3 Syntax -- 3.1 Example Games -- 4 Semantics -- 4.1 Realizers -- 4.2 Formula and Game Semantics -- 4.3 Demonic Semantics -- 5 Proof Calculus -- 6 Theory: Soundness -- 7 Operational Semantics -- 8 Theory: Constructivity -- 9 Conclusion and Future Work -- References -- Optimal and Perfectly Parallel Algorithms for On-demand Data-flow Analysis -- 1 Introduction -- 2 Preliminaries -- 2.1 The IFDS Framework -- 2.2 Trees and Tree Decompositions -- 3 Problem definition -- 4 Treewidth-based Data-ow Analysis -- 4.1 Preprocessing -- 4.2 Word Tricks -- 4.3 Answering Queries -- 4.4 Parallelizability and Optimality -- 5 Experimental Results -- 6 Conclusion -- References -- Concise Read-Only Specifications for Better Synthesis of Programs with Pointers -- 1 Introduction -- 1.1 Correct Programs that Do Strange Things -- 1.2 Towards Simple Read-Only Specifications for Synthesis -- 1.3 Our Contributions -- 2 Program Synthesis with Read-Only Borrows -- 2.1 Basics of SSL-based Deductive Program Synthesis -- 2.2 Reducing Non-Determinism with Read-Only Annotations -- 2.3 Composing Read-Only Borrows -- 2.4 Borrow-Polymorphic Inductive Predicates -- 3 BoSSL: Borrowing Synthetic Separation Logic -- 3.1 BoSSL rules -- 3.2 Memory Model -- 3.3 Soundness -- 4 Implementation and Evaluation -- 4.1 Experimental Setup -- 4.2 Performance and Quality of the Borrowing-Aware Synthesis -- 4.3 Stronger Correctness Guarantees -- 4.4 Robustness under Synthesis Perturbations -- 5 Limitations and Discussion -- 6 Related Work -- 7 Conclusion -- References -- Soundness conditions for big-step semantics -- 1 Introduction -- 2 A meta-theory for big-step semantics -- 3 Extended semantics…”
    Libro electrónico
  2. 1682
    Publicado 2015
    Tabla de Contenidos: “…Cell Challenges 93 -- 3.7 Conclusions and Future Directions 97 -- References 99 -- 4 Cooperation for Next Generation Wireless Networks 105 -- 4.1 Introduction 105 -- 4.2 Cooperative Diversity and Relaying Strategies 107 -- 4.2.1 Cooperation and Network Coding 107 -- 4.2.2 Cooperative ARQ MAC Protocols 108 -- 4.3 PHY Layer Impact on MAC Protocol Analysis 110 -- 4.3.1 Impact of Fast Fading and Shadowing on Packet Reception for QoS Guarantee 111 -- 4.3.2 Impact of Shadowing Spatial Correlation 112 -- 4.4 Case Study: NCCARQ 113 -- 4.4.1 NCCARQ Overview 113 -- 4.4.2 PHY Layer Impact 114 -- 4.5 Performance Evaluation 116 -- 4.5.1 Simulation Scenario 116 -- 4.5.2 Simulation Results 117 -- 4.6 Conclusion 122 -- Acknowledgements 122 -- References 122 -- 5 Mobile Clouds: Technology and Services for Future Communication Platforms 125 -- 5.1 Introduction 125 -- 5.2 The Mobile Cloud 127 -- 5.2.1 User Resources 129 -- 5.2.2 Software Resources 130 -- 5.2.3 Hardware Resources 131 -- 5.2.4 Networking Resources 132 -- 5.3 Mobile Cloud Enablers 133 -- 5.3.1 The Mobile User Domain 133 -- 5.3.2 Wireless Technologies 135 -- 5.3.3 Software and Middleware 139 -- 5.4 Network Coding 140 -- 5.5 Summary 145 -- References 145 -- 6 Cognitive Radio for 5G Wireless Networks 149 -- 6.1 Introduction 149 -- 6.2 Overview of Cognitive Radio Technology in 5G Wireless 150 -- 6.3 Spectrum Optimisation using Cognitive Radio 152 -- 6.4 Relevant Spectrum Optimisation Literature in 5G 152.…”
    Libro electrónico
  3. 1683
    Publicado 2018
    Tabla de Contenidos: “…Front Cover -- Estimation and Control of Large-Scale Networked Systems -- Copyright -- Contents -- Preface -- Acknowledgments -- Notation and Symbols -- 1 Introduction -- 1.1 A General View on Control System Design -- 1.2 Communication and Control -- 1.3 Book Contents -- 1.3.1 Controllability and Observability of a Control System -- 1.3.2 Centralized and Distributed State Estimations -- 1.3.3 State Estimations and Control With Imperfect Communications -- 1.3.4 Veri cation of Stability and Robust Stability -- 1.3.5 Distributed Controller Design for an LSS -- 1.3.6 Structure Identi cation for an LSS -- 1.3.7 Attack Estimation/Identi cation and Other Issues -- 1.4 Bibliographic Notes -- References -- 2 Background Mathematical Results -- 2.1 Linear Space and Linear Algebra -- 2.1.1 Vector and Matrix Norms -- 2.1.2 Hamiltonian Matrices and Distance Among Positive De nite Matrices -- 2.2 Generalized Inverse of a Matrix -- 2.3 Some Useful Transformations -- 2.4 Set Function and Submodularity -- 2.5 Probability and Random Process -- 2.6 Markov Process and Semi-Markov Process -- 2.7 Bibliographic Notes -- References -- 3 Controllability and Observability of an LSS -- 3.1 Introduction -- 3.2 Controllability and Observability of an LTI System -- 3.2.1 Minimal Number of Inputs/Outputs Guaranteeing Controllability/Observability -- 3.2.2 A Parameterization of Desirable Input/Output Matrices -- 3.2.3 Some Nitpicking -- 3.3 A General Model for an LSS -- 3.4 Controllability and Observability for an LSS -- 3.4.1 Subsystem Transmission Zeros and Observability of an LSS -- 3.4.2 Observability Veri cation -- 3.4.3 A Condition for Controllability and Its Veri cation -- 3.4.4 In/Out-degree and Controllability/Observability of a Networked System -- 3.5 Construction of Controllable/Observable Networked Systems -- 3.6 Bibliographic Notes -- Appendix 3.A…”
    Libro electrónico
  4. 1684
    por Enea, Constantin
    Publicado 2023
    Tabla de Contenidos: “…2.2 Existing Approaches -- 3 Algorithms -- 3.1 First-Cut Algorithm -- 3.2 Logarithmic Algorithm -- 3.3 Lazy Algorithm -- 4 Experimental Evaluation -- 5 Application to Extended Regular Expressions -- 5.1 Reduction from Incremental Regex Emptiness to GIDs -- 6 Related Work -- References -- Model Checking Race-Freedom When ``Sequential Consistency for Data-Race-Free Programs'' is Guaranteed -- 1 Introduction -- 2 Theory -- 3 Implementation and Evaluation -- 3.1 Background on OpenMP -- 3.2 Background on CIVL-C -- 3.3 Transformation for Data Race Detection -- 3.4 Evaluation -- 4 Related Work -- 5 Conclusion -- References -- Searching for i-Good Lemmas to Accelerate Safety Model Checking -- 1 Introduction -- 2 Preliminaries -- 2.1 Boolean Transition System -- 2.2 Safety Checking and Reachability Analysis -- 2.3 Overview of IC3 and CAR -- 3 Finding i-Good Lemmas -- 3.1 What Are i-good Lemmas -- 3.2 Searching for i-good Lemmas -- 4 Related Work -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Experimental Results -- 5.3 Why Do branching and refer-skipping Work? …”
    Libro electrónico
  5. 1685
    Publicado 2024
    Tabla de Contenidos: “…3.3 Fundamental Human Rights Guarantees -- 3.3.1 Right to Life -- 3.3.2 Substantive Human Rights -- 3.3.2.1 Right to Food -- 3.3.2.2 Right to Water and Sanitation -- 3.3.2.3 Right to Adequate Accommodation -- 3.3.3 Right to Health -- 4 Breaches under International Criminal Law -- 4.1 Arbitrary Withholding of Consent as a War Crime -- 4.1.1 War Crimes in General -- 4.1.2 Murder, Torture and Cruel Treatment -- 4.1.3 Starvation of Civilians -- 4.1.3.1 Amendment of Article 8 of the Rome Statute -- 4.1.3.2 Reasons for Including the Crime of Starvation for Situations of Non-international Armed Conflict -- 4.1.3.3 Elements of Starvation under the Rome Statute -- 4.2 Withholding of Consent as a Crime against Humanity -- 4.2.1 Crimes against Humanity in General -- 4.2.2 Offences, in Particular Torture and Extermination -- 4.3 Withholding of Consent as Genocide -- 4.3.1 Definition of Genocide and Required Intention -- 4.3.2 Offences, in Particular Killing and Causing Serious Harm -- Part 4 Legal Consequences of Arbitrary Withholding of Consent -- Chapter 14 Introduction -- Chapter 15 Accountability of the Affected State -- 1 State Responsibility -- 1.1 Constitutive Elements -- 1.2 Scope of Application -- 1.3 Consequences of State Responsibility -- 1.3.1 Cessation and Reparation -- 1.3.2 Invocation -- 2 Responsibility for Violations of Human Rights Treaties -- 2.1 In General -- 2.2 Individual Complaint Procedure and Monitoring Mechanisms -- 3 Individual Responsibility under Criminal Law -- Chapter 16 Accountability of Non-state Armed Groups -- 1 No Direct Responsibility of the Armed Group -- 2 Determination of Breaches within Monitoring Mechanisms -- 2.1 Addressing Breaches of Non-state Armed Groups -- 2.2 Attribution of an Act to Armed Groups -- 3 Individual Responsibility of the Members of the Armed Group -- 3.1 Under International Criminal Law…”
    Libro electrónico
  6. 1686
    Publicado 2022
    “…The experimental project arose from the need to respond to the need to guarantee the practicability of professional training courses at a time when, due to the pandemic, it was not possible to accommodate all students in schools. …”
    Libro electrónico
  7. 1687
    Publicado 2012
    “…The Java programming language provides safety and security guarantees such as type safety and its security architecture. …”
    Libro electrónico
  8. 1688
    Publicado 2010
    “…In addition to being a fundamental human right, access to justice is one of the conditions to guarantee the effectiveness of all human rights. A society that does not guarantee access to justice can hardly be said to be a society that has effectively reached a Democratic Rule of Law…”
    Libro electrónico
  9. 1689
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- Advances in GPU Research and Practice -- Copyright -- Dedication -- Contents -- List of Contributors -- Preface -- Acknowledgments -- Part 1: Programming and tools -- Chapter 1: Formal analysis techniques for reliable GPU programming: current solutions and call to action -- 1 GPUs in Support of Parallel Computing -- Bugs in parallel and GPU code -- 2 A quick introduction to GPUs -- Organization of threads -- Memory spaces -- Barrier synchronization -- Warps and lock-step execution -- Dot product example -- 3 Correctness issues in GPU programming -- Data races -- Lack of forward progress guarantees -- Floating-point accuracy -- 4 The need for effective tools -- 4.1 A Taxonomy of Current Tools -- 4.2 Canonical Schedules and the Two-Thread Reduction -- Race freedom implies determinism -- Detecting races: ``all for one and one for all'' -- Restricting to a canonical schedule -- Reduction to a pair of threads -- 4.3 Symbolic Bug-Finding Case Study: GKLEE -- 4.4 Verification Case Study: GPUVerify -- 5 Call to Action -- GPUs will become more pervasive -- Current tools show promise -- Solving basic correctness issues -- Equivalence checking -- Clarity from vendors and standards bodies -- User validation of tools -- Acknowledgments -- References -- Chapter 2: SnuCL: A unified OpenCL framework for heterogeneous clusters -- 1 Introduction -- 2 OpenCL -- 2.1 Platform Model -- 2.2 Execution Model -- 2.3 Memory Model -- 2.4 Synchronization -- 2.5 Memory Consistency -- 2.6 OpenCL ICD -- 3 Overview of SnuCL framework -- 3.1 Limitations of OpenCL -- 3.2 SnuCL CPU -- 3.3 SnuCL Single -- 3.4 SnuCL Cluster -- 3.4.1 Processing synchronization commands -- 4 Memory management in SnuCL Cluster -- 4.1 Space Allocation to Memory Objects -- 4.2 Minimizing Copying Overhead -- 4.3 Processing Memory Commands -- 4.4 Consistency Management…”
    Libro electrónico
  10. 1690
    Publicado 2019
    Tabla de Contenidos: “…9 Organization Assignment in Federated Cloud Environments based onMulti-Target Optimization of Security -- 9.1 Introduction -- 9.2 Background Work Related to Domain -- 9.2.1 Basics on Cloud computing -- 9.2.2 Clouds Which are Federated -- 9.2.3 Cloud Resource Management -- 9.3 Architectural-Based Cloud Security Implementation -- 9.4 Expected Results of the Process -- 9.5 Conclusion -- References -- 10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee -- 10.1 Introduction -- 10.1.1 Key Research Problems in This Area -- 10.1.2 Problems with Interoperability -- 10.2 Difficulties from a Cloud Adoption Perspective -- 10.3 Security and Privacy -- 10.3.1 Resource Provisioning -- 10.3.1.1 Unwavering Quality -- 10.3.1.2 Interoperability -- 10.3.2 How Do We Define Cloud? …”
    Libro electrónico
  11. 1691
    Publicado 2011
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- Acknowledgements -- Chapter 1: Corporate Accounting (Company Accounts)-Issue of Share Capital -- 1.1 Definition -- 1.2 Characteristics of a Company -- 1.3 Kinds of Companies (or) Types of Companies -- 1.3.1 Statutory Companies -- 1.3.2 Government Company -- 1.3.3 Foreign Company -- 1.3.4 Holding Company -- 1.3.5 Subsidiary Company -- 1.3.6 Registered Company -- 1.3.7 Listed Company -- 1.3.8 Private Company -- 1.3.9 Limited Company -- 1.3.10 Unlimited Company -- 1.3.11 Distinction between Private Company and Public Limited Company -- 1.4 Privileges of a Private Limited Company -- 1.5 Documents -- 1.5.1 Memorandum of Association -- 1.5.2 Articles of Association -- 1.5.3 Certificate of Incorporation -- 1.5.4 Prospectus -- 1.5.5 Certificate of Commencement of Business -- 1.6 Share Capital -- 1.6.1 Authorized Capital (Nominal/Registered Capital) -- 1.6.2 Issued Capital -- 1.6.3 Subscribed Capital -- 1.6.4 Called-up Capital -- 1.6.5 Paid-up Capital -- 1.6.6 Uncalled Capital -- 1.6.7 Reserve Capital -- 1.7 Differences Between "Capital Reserve" and "Reserve Capital" -- 1.8 Shares of a Company -- 1.8.1 Meaning -- 1.8.2 Classes of Shares -- 1.8.2.1 Preference Share -- 1.8.3 Types or Kinds of Preference Shares -- 1.8.3.1 On the Basis of Dividend Right -- 1.8.3.2 On the Basis of Participation in Surplus Profits -- 1.8.3.3 On the Basis of Recovery of Capital -- 1.8.3.4 On the Basis of Conversion into Equity Shares -- 1.8.3.5 Guaranteed Preference Share -- 1.9 Equity Shares -- 1.9.1 Distinction Between Preference Share and Equity Share -- 1.10 Management of Companies -- 1.10.1 Shareholders -- 1.10.2 Board of Directors -- 1.10.3 Managing Director -- 1.10.4 Manager -- 1.11 General Meetings of the Company -- 1.11.1 Statutory Meeting -- 1.11.2 Annual General Meeting -- 1.11.3 Extraordinary General Meeting -- 1.12 Quorum…”
    Libro electrónico
  12. 1692
    por Gavin, Lee
    Publicado 2005
    Tabla de Contenidos: “…8.1 Overview of event notification -- 8.1.1 Subscription to a business object -- 8.2 Event and archive stores -- 8.2.1 Content of an event store -- 8.2.2 Implementing an event store -- 8.2.3 Accessing the event store -- 8.2.4 Creating an archive store -- 8.3 Polling -- 8.3.1 Standard behavior -- 8.3.2 Basic logic for the poll method -- 8.3.3 Archiving events -- 8.3.4 Multithreaded -- 8.3.5 Processing events by event priority -- 8.3.6 Event distribution -- 8.4 Custom pollForEvents() method -- 8.4.1 Accessing a subscription manager -- 8.4.2 Verifying the connection -- 8.4.3 Retrieving event records -- 8.4.4 Getting the business object name, verb, and key -- 8.4.5 Checking for subscriptions to the event -- 8.4.6 Retrieving application data -- 8.4.7 Sending the business object to Adapter Framework -- 8.4.8 Completing the processing of an event -- 8.4.9 Archiving the event -- 8.4.10 Releasing event store resources -- 8.5 Processing delete events -- 8.5.1 Setting the verb in the event record -- 8.5.2 Setting the verb in the business object -- 8.5.3 Setting the verb during mapping -- 8.6 Guaranteed event delivery -- 8.6.1 Container-managed events -- 8.6.2 Duplicate event elimination -- Chapter 9. …”
    Libro electrónico
  13. 1693
    Publicado 2014
    “…Designed with busy teachers in mind, the Classroom Gems series draws together an extensive selection of practical, tried-and-tested, off-the-shelf ideas, games and activities guaranteed to transform any lesson or classroom in an instant. …”
    Libro electrónico
  14. 1694
    Publicado 2014
    “…Designed with busy teachers in mind, the Classroom Gems series draws together an extensive selection of practical, tried-and-tested, off-the-shelf ideas, games and activities guaranteed to transform any lesson or classroom in an instant. …”
    Libro electrónico
  15. 1695
    Publicado 2014
    “…Designed with busy teachers in mind, the Classroom Gems series draws together an extensive selection of practical, tried-and-tested, off-the-shelf ideas, games and activities guaranteed to transform any lesson or classroom in an instant. …”
    Libro electrónico
  16. 1696
    Publicado 2015
    “…Fresh, creative strategies guaranteed to enliven online training 101 Ways to Make Learning Active Beyond the Classroom provides proven, practical strategies, activities, and tips for those tasked with facilitating training in any subject area among alternative settings. …”
    Libro electrónico
  17. 1697
    por Pugh, Colin
    Publicado 2008
    “…In addition, the strength of the guarantee or covenant from the sponsoring employer(s) and of insolvency guarantee arrangements should be carefully assessed when designing funding requirements…”
    Capítulo de libro electrónico
  18. 1698
    por Erling, Dan
    Publicado 2011
    “…It doesn't occur to them that, in fact, there is a process that virtually guarantees hiring the right person every time. To repeat: there is a process that virtually guarantees hiring the right person every time. …”
    Libro electrónico
  19. 1699
    por Foner, Eric, 1943-
    Publicado 2019
    “…They established the principle of birthright citizenship and guaranteed the privileges and immunities of all citizens. …”
    Libro
  20. 1700
    Publicado 2021
    Tabla de Contenidos: “…-- 7.2 Creating your own file formats for data storage -- 7.2.1 Writing data to disk with serde and the bincode format -- 7.3 Implementing a hexdump clone -- 7.4 File operations in Rust -- 7.4.1 Opening a file in Rust and controlling its file mode -- 7.4.2 Interacting with the filesystem in a type-safe manner with std::fs::Path -- 7.5 Implementing a key-value store with a log-structured, append-only storage architecture -- 7.5.1 The key-value model -- 7.5.2 Introducing actionkv v1: An in-memory key-value store with a command-line interface -- 7.6 Actionkv v1: The front-end code -- 7.6.1 Tailoring what is compiled with conditional compilation -- 7.7 Understanding the core of actionkv: The libactionkv crate -- 7.7.1 Initializing the ActionKV struct -- 7.7.2 Processing an individual record -- 7.7.3 Writing multi-byte binary data to disk in a guaranteed byte order -- 7.7.4 Validating I/O errors with checksums -- 7.7.5 Inserting a new key-value pair into an existing database -- 7.7.6 The full code listing for actionkv -- 7.7.7 Working with keys and values with HashMap and BTreeMap -- 7.7.8 Creating a HashMap and populating it with values -- 7.7.9 Retrieving values from HashMap and BTreeMap -- 7.7.10 How to decide between HashMap and BTreeMap -- 7.7.11 Adding a database index to actionkv v2.0 -- Summary -- 8 Networking -- 8.1 All of networking in seven paragraphs -- 8.2 Generating an HTTP GET request with reqwest -- 8.3 Trait objects -- 8.3.1 What do trait objects enable? …”
    Libro electrónico