Mostrando 141 - 160 Resultados de 200 Para Buscar 'Kamsack~', tiempo de consulta: 1.26s Limitar resultados
  1. 141
    Publicado 2023
    “…In doing so, you'll implement popular technologies such as Angular Router, Scully, Electron, Angular service workers, Jamstack, NgRx, and more. By the end of this book, you will have the skills you need to build Angular apps using a variety of different technologies according to your or your client's needs. …”
    Libro electrónico
  2. 142
  3. 143
    Publicado 1953
    Tabla de Contenidos: “…Hess-Hüttig -- v. 10. Hufeland-Kaffsack -- v. 11. Kafka-Kleinfercher -- v. 12. Kleinhans-Kreling -- v. 13. …”
    Libro
  4. 144
    Publicado 2023
    Tabla de Contenidos: “…Cloudflare service portfolio -- Cloudflare Workers - the workhorse at the edge -- Service Workers - the namesake and power behind Cloudflare Workers -- Cloudflare Workers - functionality and features -- Other languages supported -- Cloudflare Workers KV -- Cloudflare Pages -- JAMStack -- Cloudflare Pages and JAMStack -- Newest Cloudflare serverless offerings -- Cloudflare R2 storage -- Durable objects -- Workers and KV - learning by example -- Setting up the development environment with Wrangler -- Creating your first worker -- Deploying your worker -- Workers KV store -- Project -- Implementation -- More vendors in edge computing and JAMStack -- Summary -- Chapter 7: Kubernetes, Knative and OpenFaaS -- Containerization and Docker fundamentals -- Docker images -- Container orchestration and Kubernetes -- Kubernetes architecture and components -- Kubernetes how-to with minikube -- Knative -- Knative components -- Knative Eventing -- Knative and service meshes -- Knative installation and setup -- OpenFaaS -- OpenFaaS architecture -- Function runtime and watchdog -- Asynchronous functions -- FaaSD -- OpenFaaS installation and setup -- Example project - implementing a GitHub webhook with a Telegram notification -- High-level solution -- Design and architecture -- Application code and infrastructure automation -- Summary -- Chapter 8: Self-Hosted FaaS with Apache OpenWhisk -- OpenWhisk - concepts and features -- Actions and action chains -- Architecture -- Creating and managing actions and entities -- Creating your first action -- Triggers and rules -- Packages -- Feeds -- Web actions -- Administration and deployment -- Project - IoT and event processing with IBM Cloud functions -- Summary -- Part 3 - Design, Build, and Operate Serverless -- Chapter 9: Implementing DevOps Practices for Serverless -- General SDLC practices for serverless…”
    Libro electrónico
  5. 145
    Publicado 2009
    Tabla de Contenidos: “…Part I: Methodologies for complex problem solving: Generating automatic projections by means of genetic programming -- Neural lazy local learning -- Optimization by using genetic algorithms with micropopulations -- Analyzing parallel cellular genetic algorithms -- Evaluating new advanced multiobjective metaheuristics -- Canonical metaheuristics for dynamic optimization problems -- Solving constrained optimization problems with hybrid evolutionary algorithms -- Optimization of time series using parallel, adaptive, and neural techniques -- Using reconfigurable computing to optimization of cryptographic algorithms -- Genetic algorithms, parallelism and reconfigurable hardware -- Divide and conquer: advanced techniques -- Tools for tree searches: branch-and-bound and A* algorithms -- Tools for tree searches: Dynamic programming -- Part II: Applications: Automatic search of behavior strategies in auctions -- Evolving rules for local time series prediction -- Metaheuristics in bioinformatics: DNA sequencing and reconstruction -- Optimal location of antennae in telecommunication networks -- Optimization of image processing algorithms using FPGAs -- Application of cellular automata algorithms to the parallel simulation of laser dynamics -- Dense stereo disparity from an artificial life standpoint -- Exact, metaheuristic, and hybrid approaches to multidimensional knapsack problems -- Greedy seeding and problem-specific operators for GAs solution of strip packing problems -- Solving the KCT problem: large scale neighborhood search and solution merging -- Experimental study of GA-based schedulers in dynamic distributed computing environments -- Remote optimization service (ROS) -- Remote services for advanced problem optimization…”
    Libro electrónico
  6. 146
    Publicado 1969
    Libro
  7. 147
    Publicado 2019
    “…Create a Gatsby.js Progressive Web App with GraphQL, React, and WordPress and add JAMstack to your skills About This Video The author demonstrates how to set up and create an application from scratch using Gatsby and WordPress. …”
    Video
  8. 148
    Publicado 2015
    Libro
  9. 149
    Publicado 2016
    Tabla de Contenidos: “…La hora de la autonomía / Esteva, Gustavo -- Autonomía y dscolonización / Prada Alcoreza, Raúl -- La autonomía yaqui y su lucha por el agua / Lerma Rodríguez, Enriqueta -- Disputa por la autonomía indígena y la plurinaiconalidad en Bolivia / Pavel Camilo López Flores -- Resistencias territoriales, prácticas comunitarias e identidad ancestral : reflexiones en torno a las autonomías indígenas en los Valles Calchaquíes / Luciana García Guerreiro y Sergio Álvarez -- Consumismo, espectáculo y despojo de creación : luchas por las autonomías artesanales del pueblo Kamsá / Gloria Stella Barrera Jurado -- Sociedades otras : una aproximaicón a la iniciativa zapatista desde el territorio / Diana Itzu Gutiérrez Luna -- El Municipio Autónomo Rebelde Zapatista (MAREZ) Ricardo Flores Magón / Adriana Gómez Bonilla -- Geografia dos conflitos por terra no Brail (2013) / Carlos Walter Porto Gonçalves y Danilo Pereira Cuin…”
    Libro electrónico
  10. 150
    Publicado 2007
    Tabla de Contenidos: “…Scatter Search -- Experiments Using Scatter Search for the Multidemand Multidimensional Knapsack Problem -- A Scatter Search Heuristic for the Fixed-Charge Capacitated Network Design Problem -- Tabu Search -- Tabu Search-Based Metaheuristic Algorithm for Large-scale Set Covering Problems -- Log-Truck Scheduling with a Tabu Search Strategy -- Nature-inspired methods -- Solving the Capacitated Multi-Facility Weber Problem by Simulated Annealing, Threshold Accepting and Genetic Algorithms -- Reviewer Assignment for Scientific Articles using Memetic Algorithms -- GRASP and Iterative Methods -- Grasp with Path-Relinking for the Tsp -- Using a Randomised Iterative Improvement Algorithm with Composite Neighbourhood Structures for the University Course Timetabling Problem -- Dynamic and Stochastic Problems -- Variable Neighborhood Search for the Probabilistic Satisfiability Problem -- The ACO/F-Race Algorithm for Combinatorial Optimization Under Uncertainty -- Adaptive Control of Genetic Parameters for Dynamic Combinatorial Problems -- A Memetic Algorithm for Dynamic Location Problems -- A Study of Canonical GAs for NSOPs -- Particle Swarm Optimization and Sequential Sampling in Noisy Environments -- Distributed and Parallel Algorithms -- Embedding a Chained Lin-Kernighan Algorithm into a Distributed Algorithm -- Exploring Grid Implementations of Parallel Cooperative Metaheuristics -- Algorithm Tuning, Algorithm Design and Software Tools -- Using Experimental Design to Analyze Stochastic Local Search Algorithms for Multiobjective Problems -- Distance Measures and Fitness-Distance Analysis for the Capacitated Vehicle Routing Problem -- Tuning Tabu Search Strategies Via Visual Diagnosis -- Solving Vehicle Routing Using IOPT…”
    Libro electrónico
  11. 151
    Publicado 2012
    Tabla de Contenidos: “…/ Neo Simutanyi -- Judicial independence and the judicialisation of electoral politics in Malawi and Uganda / Siri Gloppen & Fidelis Kanyongolo -- From parliamentary supremacy to judicial review: relations between parliament and the judiciary in Tanzania / Jwani Mwaikusa -- Judicial review of parliamentary actions in South Africa: a nuanced interpretation of the separation of powers / Hugh Corder -- Prosecutions, politics and the law: the way things are / Philip Stenning -- The civilianisation of prosecutorial services in Tanzania / Sifuni Mchome -- Accountable governance and the role of national human rights institutions: the experience of the Malawi human rights commission / Danwood Chirwa & Redson Kapindu -- Balancing independence and accountability: the role of Chapter 9 institutions in South Africa's constitutional democracy / Pierre De Vos -- Accountability compromised: floor crossing in Malawi and South Africa / Lia Nijzink -- Democracy within political parties: the state of affairs in East and southern Africa / Augustine Magolowondo -- Political parties in Malawi: an accountability analysis / Nandini Patel -- Family matters: the interplay between formal and informal incentives for accountability in Mali's local communities / Martin van Vliet -- Understanding local forms of accountability: initial findings from Ghana and Malawi / Diana Cammack -- External accountability meets accountability assistance: the case of legislative strengthening in Africa / Peter Burnell…”
    Libro electrónico
  12. 152
    por Bräutigam, Antonia
    Publicado 2019
    Tabla de Contenidos: “…Frontmatter 1 Inhalt 5 Einleitung: Ein überschauender Blick auf das Thema 9 1 Ein zeitdiagnostischer Blick auf die Lebensbedingungen moderner Menschen 17 2 Grundlegende philosophisch-theologische Problemlagen der Moderne am Literaturbeispiel Jean Pauls 69 1 Narrationen von Grenzüberschreitungen: Begriffsklärung Jenseitsreise 75 2 Der Wunsch nach (Selbst-)Vergewisserung: Beispiele zur Typologie antiker Jenseitsreisen 89 3 Entwurf eines Analyseschemas: Wesentliche Elemente von Jenseitsreisen 99 1 Verstehenshorizont von Welt und Selbst: Der Begriff der Weltanschauung 101 2 Entwurf einer Hermeneutik der Weltanschauungen in Jenseitsreisenliteratur 115 1 Von planetaren Anderswelten und erdengleichen Gegenwelten: Auswahl der untersuchten Werke 123 2.1 Clive Staple Lewis: Die Perelandra-Trilogie 127 2.2 Fjodor Michailowitsch Dostojewski: Traum eines lächerlichen Menschen 165 2.3 Franz Werfel: Stern der Ungeborenen 192 2.4 David Lindsay: Die Reise zum Arcturus 224 2.5 Hermann Kasack: Die Stadt hinter dem Strom 257 2.6 Thomas Mann: Der Zauberberg 297 2.7 Samuel Beckett: Der Verwaiser 331 3 Ergebnis: Funktion und Bedeutung der Jenseitsreise in der Literatur der Moderne 371 1 Sehnsüchte der Moderne: Verknüpfung der Zugriffe mit den Jenseitsreisen 377 2 Die soteriologische Bedeutung des Motivs der Jenseitsreise in der Moderne 389 3 Erlösungsbewusstsein und Ordnungsbemühung: Literarische Jenseitsreisen in der Moderne philosophisch-theologisch bedacht 397 1 Ausblick: Weltanschauungsanalytische Literaturtheologie 399 2 Ausblick: Literatur als moderner locus theologicus alienus? …”
    Tesis
  13. 153
    Publicado 2020
    Libro
  14. 154
    Publicado 2015
    Tabla de Contenidos: “…Anhören15. Der Turk - Kossack - Der Walsche - Aria Polon - Der Francos - Walachica [Guberniumsammlung, Mahrisches Landesarchiv, Brno] / Anonymus. 16. …”
    CDROM
  15. 155
    Publicado 2021
    Tabla de Contenidos: “…Implementing Hash Functions -- Implementing SHA-1/256/368/512, MD2, and MD5 -- Conclusion -- References -- Chapter 9: Block Ciphers: DES and AES -- Preliminaries -- Networks Based on Substitution and Permutation -- Attacks Based on Linear Cryptanalysis -- Attacks Based on Differential Cryptanalysis -- The Data Encryption Standard (DES) -- DES Description -- Implementation of DES -- The Advanced Encryption System (AES) -- SubBytes Operations -- The ShiftRows Operation -- The MixColumn Operation -- The AddRoundKey Operation -- Key Expansion -- InvSubBytes Operation -- InvShiftRows Operation -- InvMixColumns Operation -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- Knapsack Approach -- The Algorithms -- Conclusion -- References -- Chapter 11: Formal Techniques for Cryptography -- Probability Theory -- Random Variables -- Birthday Problem -- Entropy -- Randomness in Cryptography -- Conclusion -- References -- Chapter 12: Visual Cryptography -- Conclusion -- References -- Chapter 13: Chaos-Based Cryptography -- Chaos Maps and Functions -- Logistic Map -- Chaos Theory in Cryptography -- Sensitivity to Initial Conditions -- Conclusion -- References -- Chapter 14: Steganography -- Algorithms and Methods for Different Steganography Types -- Steganography for Image Files -- Steganography for Audio Files -- Steganography for Video Files -- Practical Implementation -- Implementing the Least Significant Bit (LSB) Method -- Implementing the Histogram Analysis Method -- Conclusion -- References -- Index…”
    Libro electrónico
  16. 156
    Publicado 2013
    Tabla de Contenidos: “…Polynomial-Time Algorithms: Exercises Introduction to Complexity On the complexity to compute xnAsymptotic notations: O, o,, and -- Divide-and-Conquer Strassens algorithm Master theorem Solving recurrences -- Greedy Algorithms Motivating example: the sports hall Designing greedy algorithms Graph coloringTheory of matroids -- Dynamic Programming The coin changing problem The knapsack problem Designing dynamic-programming algorithms -- Amortized AnalysisMethods for amortized analysis -- Exercises, Solutions, and Bibliographic Notes appear at the end of each chapter in this section. -- NP-Completeness and Beyond NP-Completeness A practical approach to complexity theory Problem classesNP-complete problems and reduction theory Examples of NP-complete problems and reductionsImportance of problem definition Strong NP-completeness Why does it matter? …”
    Libro electrónico
  17. 157
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Chapter 1: Introduction -- Cryptography and Cryptanalysis -- Book Structure -- Conclusion -- References -- Chapter 2: JDK 17: New Features -- Conclusion -- References -- Chapter 3: Roadmap and Vision for Jakarta EE 10 -- Conclusion -- References -- Chapter 4: Java Cryptography Architecture -- Architecture and Design Principles -- JCA Classes and Algorithms -- Algorithms and Engine Classes -- Interfaces and Main Classes -- Data Encryption -- Hash Functions -- Signatures -- Generating Signatures -- Verifying the Signature -- Conclusion -- References -- Chapter 5: Classical Cryptography -- Caesar Cipher -- Implementation -- Cryptanalysis -- Vigenère Cipher -- Implementation -- Cryptanalysis -- Hill Cipher -- Implementation -- Cryptanalysis -- Conclusion -- References -- Chapter 6: Formal Techniques for Cryptography -- Definitions -- Probabilities and Statistics -- Conditional Probability -- Random Variables -- Entropy -- A Little Algebra -- Elliptic Curves -- Conclusion -- References -- Chapter 7: Pseudorandom Number Generators -- Examples of PRNGs -- Linear Congruential PRNGs -- Blum-Blum-Shub PRNG -- Linear Circuit PRNGs -- Other PRNGs -- PRNGs Security -- Java.util.Random Class -- Conclusion -- References -- Chapter 8: Hash Functions -- Conclusion -- References -- Chapter 9: Symmetric Encryption Algorithms -- Data Encryption Standard -- The Generation of Keys -- Encryption and Decryption Process -- Operation Modes for DES -- Advanced Encryption Standard -- Encryption and Decryption Process -- Operation Modes for AES -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- The Knapsack Approach -- Algorithms -- Conclusion -- References -- Chapter 11: Signature Schemes -- Conclusion -- References…”
    Libro electrónico
  18. 158
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewers -- Acknowledgments -- Part I: Getting Started -- Chapter 1: Introduction -- JamStack -- BlamStack -- Azure Static Web Apps -- Book Focus -- Let's Get Started! …”
    Libro electrónico
  19. 159
    por George, James A., 1948-
    Publicado 2010
    Tabla de Contenidos: “…SMART DATA; Contents; Wiley Series in Systems Engineering and Management; Foreword; Preface; Acknowledgments; Introduction: A Comprehensive Overview; Predictive Management; IDEF Lexicon for Executives; Organization of This Book; Smart Data in Three Dimensions; Business Rule; Case Study: IT Capital Budgeting Using a Knapsack Problem; Case Study: Better Decision Making: Field Testing, Evaluation and Validation of a Web-Based MedWatch Decision Support System (MWDSS); Engineering an Ubiquitous Strategy for Catalyzing Enterprise Performance Optimization; What Smart Data Provides; References…”
    Libro electrónico
  20. 160
    por Stamp, Mark
    Publicado 2011
    Tabla de Contenidos: “…2.3.4 Double Transposition Cipher2.3.5 One-Time Pad; 2.3.6 Project VENONA; 2.3.7 Codebook Cipher; 2.3.8 Ciphers of the Election of 1876; 2.4 Modern Crypto History; 2.5 A Taxonomy of Cryptography; 2.6 A Taxonomy of Cryptanalysis; 2.7 Summary; 2.8 Problems; 3 Symmetric Key Crypto; 3.1 Introduction; 3.2 Stream Ciphers; 3.2.1 A5/1; 3.2.2 RC4; 3.3 Block Ciphers; 3.3.1 Feistel Cipher; 3.3.2 DES; 3.3.3 Triple DES; 3.3.4 AES; 3.3.5 Three More Block Ciphers; 3.3.6 TEA; 3.3.7 Block Cipher Modes; 3.4 Integrity; 3.5 Summary; 3.6 Problems; 4 Public Key Crypto; 4.1 Introduction; 4.2 Knapsack; 4.3 RSA…”
    Libro electrónico