Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 77
- Management 56
- Computer networks 30
- Engineering & Applied Sciences 26
- Business & Economics 24
- Computer security 23
- Security measures 22
- Finance 21
- Leadership 21
- Business 20
- Historia 20
- Social aspects 20
- Computer science 19
- Data processing 18
- Information technology 18
- Development 17
- Examinations 17
- Application software 15
- Computer Science 15
- Electronic data processing 15
- Politics and government 15
- Prevention 15
- Economic aspects 14
- Certification 13
- Social conditions 13
- International business enterprises 12
- Success in business 12
- Technological innovations 12
- Big data 11
- Data mining 11
-
241Publicado 2016“…As in past ASPLOS conferences, I used a 2-phase review process, with each paper receiving 3 reviews in round 1, and a minimum of an additional 2 reviews in round 2. …”
Libro electrónico -
242
-
243por Ricarte, Joana. author“…Taking Israel and Palestine as a case study, the book traces different representations of success and failure of the protracted peace process, as well as its associated policies, narratives, norms and practices, to analyze its impact on identity and its contribution to the maintenance and/or transformation of the cultural component of violence. On the one hand, drawing from an interdisciplinary approach comprising International Relations (IR), History and Social Psychology, this book proposes an analytical framework for assessing the specificities of the construction of identities in protracted conflicts. …”
Publicado 2023
Libro electrónico -
244por Mazzara, ManuelTabla de Contenidos: “…Part I: The Beginning 1. The Arcadia of Innopolis 2. …”
Publicado 2022
Libro electrónico -
245Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Error Estimation of the Function by (Zrμ, r ≥1) Using Product Means (E,s)(N, pn,qn) of the Conjugate Fourier Series -- 1.1 Introduction -- 1.1.1 Definition 1 -- 1.1.2 Definition 2 -- 1.1.3 Definition 3 -- 1.2 Theorems -- 1.2.1 Theorem 1 -- 1.2.2 Theorem 2 -- 1.3 Lemmas -- 1.3.1 Lemma 1 -- 1.3.2 Lemma 2 -- 1.3.3 Lemma 3 -- 1.4 Proof of the Theorems -- 1.4.1 Proof of the Theorem 1 -- 1.4.2 Proof of the Theorem 2 -- 1.5 Corollaries -- 1.5.1 Corollary 1 -- 1.5.2 Corollary 2 -- 1.6 Example -- 1.7 Conclusion -- References -- Chapter 2 Blow Up and Decay of Solutions for a Klein-Gordon Equation With Delay and Variable Exponents -- 2.1 Introduction -- 2.2 Preliminaries -- 2.3 Blow Up of Solutions -- 2.4 Decay of Solutions -- Acknowledgment -- References -- Chapter 3 Some New Inequalities Via Extended Generalized Fractional Integral Operator for Chebyshev Functional -- 3.1 Introduction -- 3.2 Preliminaries -- 3.3 Fractional Inequalities for the Chebyshev Functional -- 3.4 Fractional Inequalities in the Case of Extended Chebyshev Functional -- 3.5 Some Other Fracional Inequalities Related to the Extended Chebyshev Functional -- 3.6 Concluding Remark -- References -- Chapter 4 Blow Up of the Higher-Order Kirchhoff-Type System With Logarithmic Nonlinearities -- 4.1 Introduction -- 4.2 Preliminaries -- 4.3 Blow Up for Problem for E (0) < -- d -- 4.4 Conclusion -- References -- Chapter 5 Developments in Post-Quantum Cryptography -- 5.1 Introduction -- 5.2 Modern-Day Cryptography -- 5.2.1 Symmetric Cryptosystems -- 5.2.2 Asymmetric Cryptosystems -- 5.2.3 Attacks on Modern Cryptosystems -- 5.2.3.1 Known Attacks -- 5.2.3.2 Side-Channel Attacks -- 5.3 Quantum Computing -- 5.3.1 The Main Aspects of Quantum Computing -- 5.3.2 Shor's Algorithm -- 5.3.3 Grover's Algorithm…”
Libro electrónico -
246
-
247
-
248
-
249Publicado 2023Libro electrónico
-
250Publicado 2008Libro electrónico
-
251Publicado 2025“…The contributions were organized in topical sections as follows: Part I: Invited papers; fundamentals of formal verification; foundations; learn and repair; programming languages.- logic and automata; Part II: Tools and case studies; embedded systems track; industry day track; tutorial papers. …”
Libro electrónico -
252Publicado 2010Libro electrónico
-
253
-
254Publicado 2014Libro electrónico
-
255
-
256Publicado 2021Tabla de Contenidos: “…Cover -- Dangerous Gifts: Imperialism, Security, and Civil Wars in the Levant, 1798-1864 -- Copyright -- Dedication -- Foreword -- Contents -- List of Figures and Maps -- Note on Transliteration -- Introduction -- Historicizing the Eastern Question -- Silence, Civil Wars, and Lives -- PART I: AVANT LE MOT -- 1: Crossing the Mediterranean -- Defining the 'Eastern Question' -- France and the Ottoman Empire -- Preparation for the Egyptian Expedition -- 2: The Circle of Justice and the Napoleonic Wars -- The Circle of Justice -- The Sultan's Bafflement -- The Wrecked Victory -- 3: The Chase in the Desert: Empires and Civil War in Egypt, 1801-1812 -- Ottoman Egypt before the Eastern Question -- Useful Allies, Dangerous Enemies -- The Tripartite Civil War -- PART II: THE INVENTION OF THE EASTERN QUESTION -- 4: A New Era?…”
Libro electrónico -
257
-
258Publicado 2003Libro electrónico
-
259Publicado 2012Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
260Publicado 2018“…The evening of the second day finds the conference in Kulturhuset, Stadsteatern, one of the largest cultural institutions in Northern Europe, for a curated exhibition of art installations and live performances exploring the post-digital. …”
Libro electrónico