Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Development 355
- History 349
- Application software 303
- Engineering & Applied Sciences 237
- Computer Science 177
- Filosofía 152
- Computer programs 138
- Management 129
- Crítica e interpretación 124
- Computer networks 113
- Computer security 113
- Web site development 109
- Java (Computer program language) 107
- Security measures 102
- Computer programming 97
- Cloud computing 94
- Computer software 94
- Microsoft .NET Framework 94
- Historia y crítica 93
- Internet programming 80
- Programming 76
- Biblia 75
- Software engineering 71
- Cristianismo 70
- Artificial intelligence 69
- Job hunting 68
- History and criticism 66
- Design 65
- Business & Economics 63
-
8661Publicado 2009“…The third part addresses issues of mobile robots and multi-agent systems, including SLAM of mobile robots based on fusion of odometry and visual data, configuration of a localization system by a team of mobile robots, development of generic real-time motion controller for differential mobile robots, control of fuel cells of mobile robots, modelling of omni-directional wheeled-based robots, building of hunter- hybrid tracking environment, as well as design of a cooperative control in distributed population-based multi-agent approach. …”
Libro electrónico -
8662Publicado 2018“…Enter Elixir, with its modern, Ruby-like, extendable syntax, compile and runtime evaluation, hygienic macro system, and more. …”
Libro electrónico -
8663Publicado 2015“…本書作者包含: Stephen Anderson Martin Charlier Lisa deBettencourt Jeff Faneuff Andy Goodman Camille Goudeseune Bill Hartman Erin Rae Hoffer Steven Keating Brook Kennedy Dirk Knemeyer Barry Kudrowitz Gershom Kutliroff Michal Levin Matt Nish-Lapidus Marco Righetto Juhan Sonin Scott Stropkay Scott Sullivan Hunter Whitney Yaron Yanai 關於本書編者: Jonathan Follett 是Involution Studios的負責人,他是設計師以及使用者體驗與資訊設計主題的作者。…”
Libro electrónico -
8664por Zeeshan, Afzaal Ahmad. author“…You will: Implement security for the .NET Core runtime for cross-functional workloads Work with code style and review guidelines to improve the security, performance, and maintenance of components Add to DevOps pipelines to scan code for security vulnerabilities Deploy software on a secure infrastructure, on Docker, Kubernetes, and cloud environments…”
Publicado 2020
Libro electrónico -
8665Publicado 2015“…The model stored in Cassandra is subsequently accessed by the event processing module, implemented in Akka. The Akka runtime module will then score 1000s of event per seconds per node.Each element of this system (Spark, Akka, Cassandra) can be distributed on multiple nodes. …”
-
8666por Bagga, Jaspreet“…The entire value chain is explored in detail, including usage of APIs and runtime control. Author Jaspreet Bagga demonstrates how SAP’s prebuilt integration packages facilitate quicker, more comprehensive integrations, and how they support a variety of integration patterns. …”
Publicado 2023
Libro electrónico -
8667Publicado 2014“…Contributors include: Viviana Comensoli, Virginia Dillon, Andrew Hadfield, John M. Hunt, Anna Kalinowska, Joop W. Koopmans, Lena Liapi, Nick Moon, Adam Morton, Lena Steveker, Catherine Tremain, Emma Whipday…”
Libro electrónico -
8668por Corsi, Dinora“…At this time the political regimes were actively involved in the witch hunts, not least the Catholic church which was intensely engaged in developing instruments of control aimed at governing and curbing dissent. …”
Publicado 2009
Libro electrónico -
8669Publicado 2016“…Increasing interactions between humans and bats as a result of hunting, disease relationships, occupation of human dwellings, and conflict over fruit crops are explored in depth. …”
Libro electrónico -
8670por Eszterhas, Joe“…"foot soldiers" would hunt him down. He's antagonized almost everyone at the top in Tinseltown. …”
Publicado 2006
Acceso a las primeras páginas
Libro -
8671por Williams, Yohuru R., 1971-“…History Beyond the Textbook" presents six powerful teaching strategies, each with many sample lessons suitable for grades 5-12, that tap into students' natural curiosity and investigative instincts.Your students will become detectives of the past as they: ghost-hunt in their neighborhoods, researching mysterious buildings, monuments, and other 'haunted' spaces; solve historical crime scenes, or 'cold cases'; analyze primary and secondary sources using fingerprinting techniques; reconstruct 'accidents' that occurred at important intersections in history; prepare arguments as defenders or prosecutors in famous court cases; and, undertake paranormal investigations to communicate with figures from the past…”
Publicado 2009
Libro -
8672Publicado 2021“…The proponents of HBOT have an obligation to both show the greater effectiveness of HBOT than a functional sham and to demonstrate a plausible mechanism. Until then, the strongest recommendation that should be made is that the 'sham' therapy can be used until the case is proven. …”
Libro electrónico -
8673Publicado 2018“…The proponents of HBOT have an obligation to both show the greater effectiveness of HBOT than a functional sham and to demonstrate a plausible mechanism. Until then, the strongest recommendation that should be made is that the 'sham' therapy can be used until the case is proven. …”
Libro electrónico -
8674Publicado 2022“…'Trust' is the root meaning of Christian 'faith' (pistis, fides), and trusting in God and Christ is still fundamental to Christians. But unlike faith, and other aspects of faith such as belief or hope, trust is little studied. …”
Otros -
8675Publicado 2016“…Der vorliegende Band vereint demgemäß sechs Beiträge, die das Gebet in jeweils einem dieser Kontexte verorten: Jörg Frey untersucht das Vaterunser im Horizont antik-jüdischen Betens, Reinhard Feldmeier im Kontext der paganen Gebetsliteratur; Florian Wilk präsentiert es als Element der frühen Jesusüberlieferung, Peter von der Osten Sacken als Zugang zum Matthäusevangelium; Michael Wolter interpretiert es im Rahmen des Lukasevangeliums, Jürgen Wehnert im Duktus der Didache. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull)Libro -
8676por Tejero Hierro, Pablo ( 1997-)“…The bibliographic search was carried out during the period from October 20, 2018 until June 10, 2019 both inclusive. The databases consulted were: PUBMED, PEDro, ScienceDirect and Cochrane library. …”
Publicado 2019
Electrónico -
8677Publicado 2016“…Er wurde wie andere wichtige Gestalten der Antike (z.B. Sokrates) ungerecht hingerichtet. Das Vorkommen der Streitgespräche durch das ganze Markusevangelium hindurch führt dazu, dass dieses als eine apologetische Schrift der Gestalt Jesu wirkt. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
8678por Altman, Yair M.“…Using Java, we can extensively customize the Matlab environment and application GUI, enabling the creation of very esthetically pleasing applications. Unlike Matlab's interface with other programming languages, the internal Java classes and the Matlab-Java interface were never fully documented by The MathWorks (TMW), the company that manufactures the Matlab product. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8679Publicado 2011“…A literary mirror is an invaluable resource for those researching twentieth-century Balinese authors who wrote in Indonesian. Until now, such writers have received very little attention in the existing literature. …”
Libro electrónico -
8680Publicado 2007“…Goodarzi provides us with the first in-depth study on the Syrian-Iranian nexus, which traces the origins and development of the strategic partnership between Damascus and Tehran from 1979 until the present. He argues that contrary to prevailing views (due in large part to the authoritarian and unpopular nature of the Syrian and Iranian regimes), the alliance between them was conceived as essentially defensive in nature. …”
Libro electrónico