Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4421por International Conference on Pedestrian and Evacuation DynamicsTabla de Contenidos: “…Pedestrian Performance Data -- Federal Investigation of the Evacuation of the World Trade Center on September 11, 2001 -- Free speed distributions — Based on empirical data in different traffic conditions -- Collecting Pedestrian Trajectory Data In Real-time -- Full-Scale Evacuation Experiments in a smoke filled Rail Carriage — a detailed study of passenger behaviour under reduced visibility -- Minimum Stair Width for Evacuation, Overtaking Movement and Counterflow — Technical Bases and Suggestions for the Past, Present and Future -- Study on information guiding based on human psych-physiological responses in China -- Research on pedestrian crowd characteristics and behaviours in peak-time on Chinese campus -- Pedestrian Dynamics -- Behaviour on tunnel fire -- Earthquake — the importance of earthquake-resistant design in case of emergency evacuations -- Decision Loads and Route Qualities for Pedestrians — Key Requirements for the Design of Pedestrian Navigation Services -- Cyclone and Storm Surge, Pedestrian Evacuation and Emergency Response in India -- Experimental Study and Theoretical Analysis of Signage Legibility Distances as a Function of Observation Angle -- Exploring Pedestrian Shopping Decision Processes — an Application of Gene Expression Programming -- Evacuation Simulation -- A Discrete choice framework for acceleration and direction change behaviors in walking pedestrians -- Calibration and validation of the Legion simulation model using empirical data -- Evacuation Simulation for Road Tunnels — Findings from the use of microscopic methodology for escape route analyses -- A Data-Driven Model of Pedestrian Movement -- Distributed intelligence in pedestrian simulations -- Design of Escape Routes by Simulating Evacuation Dynamics in Conjunction with a Probabilistic Safety Concept -- The 2001 World Trade Centre Evacuation -- Dynamic Navigation Field — a local and on-demand family of algorithms for wayfinding -- Microscopic calibration and validation of pedestrian models — Cross-comparison of models using experimental data -- Pedestrian flow optimization with a genetic algorithm based on Boolean grids -- Developing a Pedestrian Agent Model for Analyzing an Overpass accident -- The simulation of crowd dynamics at very large events — Calibration, empirical data, and validation -- Moore and more and symmetry -- The RiMEA Project — Development of a new Regulation -- Football Stadium Simulation — A microscopic simulation of the pedestrian access -- Instability of pedestrian flow in two-dimensional optimal velocity model -- Evacuation Simulation at Linz Central Station — Usefulness during design, approval and start-up -- Why “Faster is Slower” in Evacuation Process -- Development of an Agent-based Behavior Module for Evacuation Models — Focused on the Behaviors in the Dark -- Comparative Investigation of the Dynamic Simulation of Foot Traffic Flow -- Evacuation from underground railway stations — Available and required safe egress time for different station types and general evaluation criteria -- A discrete microscopic model for pedestrian dynamics to manage emergency situations in airport terminals -- Steps Toward the Fundamental Diagram — Empirical Results and Modelling -- Model for Office Building Usage Simulation -- Features of Discrete Event Simulation Systems for Spatial Pedestrian and Evacuation Dynamics -- Evolving Direct Perception Models of Human Behavior in Building Systems -- Fundamental diagram of a one-dimensional cellular automaton model for pedestrian flow — the ASEP with shuffled update -- Ship Evacuation -- Implementing Ship Motion in AENEAS — Model Development and First Results -- Data Collection in Support of the Modelling of Naval Vessels -- Collective animal motion -- Self-organised choice based on inter-attraction: the example of gregarious animals -- Traffic on bi-directional ant-trails -- Herding in Real Escape Panic -- From Ant Trails to Pedestrian Dynamics — Learning from Nature…”
Publicado 2006
Libro electrónico -
4422Publicado 2018Tabla de Contenidos: “…Sending HATEOAS Links in Response -- Spring Boot Starter HATEOAS -- Validation -- Enabling Validation on the Controller Method -- Defining validations on the Bean -- Unit Testing Validations -- Documenting REST Services -- Generating a Swagger Specification -- Swagger UI -- Customizing Swagger Documentation Using Annotations -- Securing REST Services with Spring Security -- Adding Spring Security Starter -- Basic Authentication -- Integration Testing -- Unit Testing -- OAuth 2 Authentication -- High-level flow -- Implementing OAuth 2 authentication for Our Service -- Setting up Authorization and Resource Servers: -- Executing OAuth Requests -- Obtaining an Access Token -- Executing the Request Using the Access Token -- Integration Test -- Internationalization -- Caching -- Spring-boot-starter-cache -- Enabling Caching -- Caching Data -- JSR-107 Caching Annotations -- Auto-Detection Order -- Summary -- Assessments -- Lesson 3: Advanced Spring Boot Features -- Externalised Configuration -- Customizing Frameworks Through application.properties -- Logging -- Embedded Server Configuration -- Spring MVC -- Spring Starter Security -- Data Sources, JDBC and JPA -- Other Configuration Options -- Custom Properties in Application.Properties -- Configuration properties - Type-Safe Configuration Management -- Profiles -- Profiles-Based Bean Configuration -- Other Options for Application Configuration Values -- YAML Configuration -- Embedded Servers -- Switching to Jetty and Undertow -- Building a WAR file -- Developer Tools -- Live Reload -- Spring Boot Actuator -- HAL Browser -- Configuration Properties -- Environment Details -- Health -- Mappings -- Beans -- Metrics -- Auto-Configuration -- Debugging -- Deploying an Application to Cloud -- Cloud Foundry -- Summary -- Assessments -- Appendix: Assessment Answers…”
Libro electrónico -
4423Publicado 2016Tabla de Contenidos: “…IntroductionInstalling a Single Node Hadoop Cluster; Installing a multi-node Hadoop cluster; Adding new nodes to existing Hadoop clusters; Executing balancer command for uniform data distribution; Entering and exiting from the safe mode in a Hadoop cluster; Decommissioning DataNodes; Performing benchmarking on a Hadoop cluster; Introduction; Loading data from a local machine to HDFS; Exporting data from HDFS to local machine; Changing the replication factor of an existing file in HDFS; Setting the HDFS block size for all the files in a cluster…”
Libro electrónico -
4424Publicado 2015Tabla de Contenidos: “…DiscussionSee Also; 2.5 Persisting a Collection Between Application Sessions; Problem; Solution; Discussion; See Also; 2.6 Testing Every Element in an Array or List; Problem; Solution; Discussion; See Also; 2.7 Creating Custom Enumerators; Problem; Solution; Discussion; See Also; 2.8 Dealing with finally Blocks and Iterators; Problem; Solution; Discussion; See Also; 2.9 Implementing Nested foreach Functionality in a Class; Problem; Solution; Discussion; See Also; 2.10 Using a Thread-Safe Dictionary for Concurrent Access Without Manual Locking; Problem; Solution; Discussion; See Also…”
Libro electrónico -
4425por Lavigne, DruTabla de Contenidos: “…Create a Trash Directory; The Code; Replacing rm with ~/bin/trash; Running the Code Safely; Taking Out the Trash; Hacking the Hack; 9. …”
Publicado 2004
Libro electrónico -
4426por Davison, AndrewTabla de Contenidos: “…Application Timing ResultsTiming Results Using currentTimeMillis(); WormChase as an Applet; The WormChaseApplet Class; The WormPanel Class; Timing Results; Compilation in J2SE 5.0; What Is a Type-Safe Collection?; Dealing with Raw Types in J2SE 5.0; Full-Screen Worms; An Almost Full-Screen (AFS) Worm; The AFS WormChase Class; Stopping Window Movement; Timings for AFS; An Undecorated Full-Screen (UFS) Worm; The UFS WormChase Class; The Game Panel; Button Behavior; Drawing the Game Canvas; Exiting the Game; Timings for UFS; A Full-Screen Exclusive Mode (FSEM) Worm; The FSEM WormChase Class…”
Publicado 2005
Libro electrónico -
4427Publicado 2007Tabla de Contenidos: “…Chapter 4: Searching the Tube for Your One-in-a-Million VideoFinding More Than One Way to Search YouTube; Searching YouTube's Video Vault; Changing Channels; Indulging Your Special Interests with Groups; Searching through Playlists; Sorting a Search; Sifting through a Category; Refining Your Search to Target Results; Expediting Your Search with Chris and Doug's Tips and Tricks; Chapter 5: Customizing Your YouTube Experience; Saving Your Favorite Videos; Have It Your Way with Your Own Playlist; Channel Surfing; Get Me a Subscription; Communing with a Group; What's Your Preference?…”
Libro electrónico -
4428Publicado 2017Tabla de Contenidos: “…Winter wonderland; 3D perspective; Sausage grinder; Interlude: From the inside out; 8 Working with sound; Recording sounds; Samson USB Microphones; Audacity®; Adobe® Audition® CC; Sound in Flash; Dynamic sounds (AS3); Interlude: My wish list for Flash CC; 9 Flash to video; Document setup; Title and action safety; CC video templates; Safe colors; Ape Escape; Keeping it all in sync; QuickTime Exporter; SWF & FLV Toolbox; Interlude: Wacom tablets; 10 Interactivity; Stage 1; Stage 2; Stage 3; Stage 4; Stage 5; Stage 6; Interlude: Thank you; Index…”
Libro electrónico -
4429por Bowden, Mark, 1970-Tabla de Contenidos: “…; We're Still Collating; I Think It's Safe to Assume It Isn't a Zombie; This or That?; We're All Gonna Die, Man!…”
Publicado 2013
Libro electrónico -
4430por Pattison, TedTabla de Contenidos: “…Pages and Design; Working with Page Templates; Safe Mode Processing; Designing Site Pages by Using Controls…”
Publicado 2009
Libro electrónico -
4431por McFarlane, NigelTabla de Contenidos: “…Stop Once-Only Dialogs SafelyFlush and Clear Absolutely Everything; Dispose of Ordinary Web Surfing Information; Dispose of Everything Else via the User Interface; Dispose of Everything via the Filesystem; Strip the Firefox Install Area of Extras; See Also; Make Firefox Go Fast; Fix Dial-Up Modem Bottlenecks; Overclock Firefox; Speed up network access; Speed up page display; Expand Your Caching; Start Up Faster; Ultimate Speed Improvements; Start Up from the Command Line; See Also; Security; Drop Miscellaneous Security Blocks; Supply Passwords Automatically; Allow Foreign Code to Run…”
Publicado 2005
Libro electrónico -
4432por Hilyard, JayTabla de Contenidos: “…1.11 Converting Celsius to FahrenheitProblem; Solution; Discussion; 1.12 Converting Fahrenheit to Celsius; Problem; Solution; Discussion; 1.13 Safely Performing a Narrowing Numeric Cast; Problem; Solution; Discussion; See Also; 1.14 Finding the Length of Any Three Sides of a Right Triangle; Problem; Solution; Discussion; See Also; 1.15 Finding the Angles of a Right Triangle; Problem; Solution; Discussion; See Also; 1.16 Displaying an Enumeration Value as a String; Problem; Solution; Discussion; See Also; 1.17 Converting Plain Text to an Equivalent Enumeration Value; Problem; Solution…”
Publicado 2006
Libro electrónico -
4433por Sheppard, Andrew, 1961-Tabla de Contenidos: “…Run Skype only when neededRun Skype for only a limited part of the day; Ration bandwidth as part of a QoS plan; Configure Skype; Internet Connections; Ways to Configure Skype; Connecting Hardware to Your Computer; Setting the Sound Devices Used by Skype; Safely Cutting Your Phone Lines; Test Your Sound System; Test Call Sound Quality (echo123); Fix Sound-Quality Problems; Choose and Configure a Microphone and Speakers; Choose and Configure a USB Handset or Headset; Choose and Configure a Bluetooth Headset; See Also; Configure Skype to Use Regular Phones; Configure Skype on a Laptop…”
Publicado 2005
Libro electrónico -
4434Publicado 2010Tabla de Contenidos: “…; Chapter 18: Flinging Files; Get Stuff from a Web Page; Free Software on the Internet; E-Mail File Attachments; Part IV: Basic Computing; Chapter 19: Be Safe Out There; Fight the Bad Guys; Internet Explorer Tools; The Action Center; Chapter 20: Know What a File Is; Behold the File!…”
Libro electrónico -
4435
-
4436por Wooldridge, MikeTabla de Contenidos: “…Grow a SelectionCreate Slices; Chapter 5: Manipulate Selections; Move a Selection; Copy and Paste a Selection; Delete a Selection; Rotate a Selection; Scale a Selection; Skew or Distort a Selection; Feather the Border of a Selection; Extract an Object; Create Vanishing Point Planes; Copy between Vanishing Point Planes; Chapter 6: Paint and Draw with Color; Select the Foreground and Background Colors; Select a Web-Safe Color; Select a Color with the Eyedropper Tool; Select a Color with the Swatches Palette; Add a Color to the Swatches Palette; Using the Paintbrush Tool; Change Brush Styles…”
Publicado 2007
Libro electrónico -
4437por McFedries, PaulTabla de Contenidos: “…Make Your Internet Connection More SecureChapter 3: Browsing the World Wide Web; Introducing the World Wide Web; Understanding Web Browsing Basics; Learn About Internet Explorer; Discover Firefox; Browse with Safari; Browse Multiple Web Sites Using Tabs; Fill In a Web Form; Save Your Favorite Sites; Download Files to Your Computer; Save Web Data to Your Computer; Understanding Web Error Messages; Chapter 4: Surfing the Web Safely and Securely; Protect Yourself on the Web; Protect Your Children on the Web; Set the Web Security Level; Protect Yourself from Identity Theft; Guard Against Spyware…”
Publicado 2009
Libro electrónico -
4438por Martingell, PaulTabla de Contenidos: “…; Exterior or Interior; How Many Cameras are Being Used?; Direct Lights or Soft Lights?; Can the Lights be Set Up Safely and Run Throughout the Day Without Causing Any Danger to Any One Working Or Moving Through the Nearby Area, and Do I Have an Assistant to Help Me?…”
Publicado 2008
Libro electrónico -
4439Publicado 2012Tabla de Contenidos: “…QuickBooks 2012 For Dummies, UK Edition; About the Authors; Dedications; Authors' Acknowledgments; Contents at a Glance; Table of Contents; Introduction; About QuickBooks; About This Book; What You Can Safely Ignore; What You Should Not Ignore (Unless You're a Masochist); Three Foolish Assumptions; How This Book Is Organised; Conventions Used in This Book; Part I: Quickly into QuickBooks; Chapter 1: QuickBooks: The Heart of Your Business; Why QuickBooks?…”
Libro electrónico -
4440por Spotted Eagle, DouglasTabla de Contenidos: “…Vegas 5 Transitions EnvelopesSlip trim events; Ripple editing; Shuffle events; Time Selections; Markers and Regions; More Editing Wizardry; Effects (FX); Video effects; Audio effects; Using FX presets; Vegas aumations; Video aumations; Audio aumations; Picture-In-Picture effects; Adding motion to stills; Superimposing, levels, opacity; Composite modes; Composite using mattes; Composite using chroma key; Improve playback performance; Titling Tools and Video Vexations; Basic titles; Flashy titles; Stay title safe; Add text one letter or line at a time; Gently animate the text; Roll the credits…”
Publicado 2004
Libro electrónico