Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History of engineering & technology 6
- RELIGION 4
- Freedom of information 3
- Human rights 3
- Law and legislation 3
- Management 3
- additive manufacturing 3
- finite element analysis 3
- Blockchains (Databases) 2
- Business & Economics 2
- Business ethics 2
- Christianity 2
- Citrix XenApp 2
- Computer networks 2
- Computer security 2
- Computer software 2
- Conflict of laws 2
- Crítica e interpretación 2
- Data protection 2
- Development 2
- Economics 2
- Electronic data processing 2
- Engineering & Applied Sciences 2
- European Court of Human Rights 2
- European Union 2
- Examinations 2
- Finance 2
- Globalization 2
- History 2
- Mathematical models 2
-
101Publicado 2017Tabla de Contenidos: “…. -- B The Steele Progeny: A Motley Crew of Circuit Court Tests -- III Doctrinal Analysis: Use-Based Rights and Commercial Effects -- A The Common Law Roots of Lanham Act Subject-Matter Jurisdiction -- B An Element of Modernity: The Effects-on-Commerce Factor -- IV A Bird's-Eye View: Taking Stock of Lanham Act Extraterritoriality -- A The Antitrust Gene: A Dominance of Effects -- B Common Law Goodwill Protection: Tea Rose/Rectanus Goes Global -- V Summary: An Era of International Trademark Propertization -- Conclusions -- 3 A Ragged Landscape of Theories -- Introduction -- Section 1 Traditional Civil Law Trademark Conflicts -- I The Principle of Territoriality -- II Analysis: The Curse of Formal Reasoning and Conduct Orientation -- Section 2 Modern Civil Law Unfair Competition Conflicts -- I The Marketplace Principle, Determination of Effects, and the De Minimis Rule -- A Collision-of-Interests and Substantive-Purpose Analysis -- B Multistate Scenarios: Determination of Marketplace Effects and De Minimis Limitations -- II Analysis: The Obsolescence of Tort Foundations -- Section 3 The New Paradigm-A Law of Market Regulation -- I Antitrust Conflicts Reloaded: The Effects Principle -- II Analysis: The Unboundedness of Unqualified Effects -- Section 4 Modern Soft Law-WIPO Recommendation, ALI Principles, and Others -- I Nonbinding Suggestions of Substantive Law and Conflicts Resolution -- A The Joint Recommendation Concerning Provisions on the Protection of Marks, and Other Industrial Property Rights in Signs, on the Internet -- B ALI Principles, CLIP Principles, and the Japanese Transparency Proposal -- II Analysis: "Chips off the Old Block" -- A The Joint Recommendation…”
Libro electrónico -
102
-
103Publicado 2000Libro electrónico
-
104por Hanson, AndrewTabla de Contenidos: “…-- 4.1 Fundamental idea: the circle S1 -- 4.2 A richer example: the 2-sphere S2 -- 4.3 Seeing quaternions as points on the 3-sphere S3 -- 4.4 Interactively following a quaternion path of incremental rotations -- 4.5 Displaying every point of the quaternion 3-sphere S3 -- 4.6 Examples of quaternion visualization strategies -- 5 Interacting with quaternions as hyperspheres -- 5.1 The 3D rolling ball -- 5.2 The 4D rolling ball -- 5.3 The ND rolling ball -- 6 Quaternions and uniform rotation distributions -- 6.1 Points on spheres -- 6.2 Theoretical basis for uniformity of spherical distributions -- 6.3 Elements of the uniform random sphere -- 6.4 Attractive incorrect quaternion sampling -- 6.5 More uniform quaternions: Gaussian and Shoemake/Diaconis -- 2 Orientation matching -- 7 Introduction: 2D cloud alignment problem -- 7.1 Context of the alignment task -- 7.2 Remark: some alignment problems are very simple -- 8 The 3D quaternion-based alignment problem -- 8.1 Introduction -- 8.2 Spatial alignment of matched 3D point sets -- 8.3 Reviewing the 3D spatial alignment RMSD problem…”
Publicado 2024
Libro electrónico -
105Publicado 2013Tabla de Contenidos: “…K Example of a Cross Section Calculation -- K.1 The spin-averaged squared matrix element -- K.2 Evaluation of two-body Lorentz-invariant phase space in 'laboratory' variables -- L Feynman Rules for Tree Graphs in QED -- L.1 External particles -- L.2 Propagators -- L.3 Vertices -- References -- Index -- Volume 2 -- Cover -- Half Title -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Preface -- V Non-Abelian Symmetries -- 12 Global Non-Abelian Symmetries -- 12.1 The Standard Model -- 12.2 The flavour symmetry SU(2)f -- 12.2.1 The nucleon isospin doublet and the group SU(2) -- 12.2.2 Larger (higher-dimensional) multiplets of SU(2) in nuclear physics -- 12.2.3 Isospin in particle physics: flavour SU(2)f -- 12.3 Flavour SU(3)f -- 12.4 Non-Abelian global symmetries in Lagrangian quantum field theory -- 12.4.1 SU(2)f and SU(3)f -- 12.4.2 Chiral symmetry -- Problems -- 13 Local Non-Abelian (Gauge) Symmetries -- 13.1 Local SU(2) symmetry -- 13.1.1 The covariant derivative and interactions with matter -- 13.1.2 The non-Abelian field strength tensor -- 13.2 Local SU(3) Symmetry -- 13.3 Local non-Abelian symmetries in Lagrangian quantum field theory -- 13.3.1 Local SU(2) and SU(3) Lagrangians -- 13.3.2 Gauge field self-interactions -- 13.3.3 Quantizing non-Abelian gauge fields -- Problems -- VI QCD and the Renormalization Group -- 14 QCD I: Introduction, Tree Graph Predictions, and Jets -- 14.1 The colour degree of freedom -- 14.2 The dynamics of colour -- 14.2.1 Colour as an SU(3) group -- 14.2.2 Global SU(3)c invariance, and 'scalar gluons' -- 14.2.3 Local SU(3)c invariance: the QCD Lagrangian -- 14.2.4 The θ-term -- 14.3 Hard scattering processes, QCD tree graphs, and jets -- 14.3.1 Introduction -- 14.3.2 Two-jet events in p̅p collisions -- 14.3.3 Three-jet events in p̅p collisions -- 14.4 3-jet events in e+e− annihilation…”
Libro electrónico -
106Publicado 2017Tabla de Contenidos: “…Three-axis tilt sensing -- Gyroscopes -- Mechanical gyroscopes -- Components of a gyroscope and axis of freedom -- Gyroscopes precession -- Proximity Sensor -- Workings of a inductive proximity sensor -- Workings of a capacitive proximity sensor -- Workings of a photoelectric proximity sensor -- Workings of a magnetic proximity sensor -- Pressure Sensor -- Workings of a pressure sensor -- Touch Sensors -- Touch sensors based on working principles -- Ultrasound/surface acoustic wave touch sensors -- Capacitive touch sensors -- Resistive touch sensors -- Biosensors -- ECG working principles -- Example heart rate estimation algorithm -- References -- 4 Sensor hubs -- Introduction to Sensor Hubs -- Dedicated Microcontroller Unit -- Application Processor-Based Sensor Hub -- Sensor-Based Hub With Micro Controller Unit -- FPGA-Based Sensor Hub -- Atmel SAM D20 Sensor Hub With Micro Controller Unit -- Cortex-M0+ Processor and Its Peripherals -- Device Service Unit -- Power Management Unit -- System Controller -- Watchdog Timer -- Real-Time Counter -- External Interrupt Controller -- Serial Communication Interface -- Intel Moorefield Platform (Application Processor-Based Sensor Hub) -- Integrated Sensor Hub -- Integrated sensor hub hardware architecture -- Integrated sensor hub power management -- Platform and sensor hub firmware architecture -- Supported sensors -- Security with integrated sensor hub -- STMicroelectronics Sensor-Based Hub With Micro Controller Unit (LIS331EB) -- Description of Blocks -- Cortex-M0 processor -- Accelerometer -- Sensing element -- State machine -- FIFO -- Bypass mode -- FIFO mode -- Stream mode -- Stream-to-FIFO mode -- Retrieving data from FIFO -- I2C interfaces -- I2C terminology/pin mapping -- LIS331EB as I2C slave to the application processor -- I2C to access accelerometer data -- I2C operation…”
Libro electrónico -
107Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Freedom with Cross-Cloud Architecture -- Scaling your business with Cross-Cloud Architecture -- Top IT drivers for integrating public clouds -- Cloud challenges and solutions -- Challenge 1 - connection and security with full compliance and control -- Challenge 2 - managing/integrating across clouds -- VMware Cross-Cloud Architecture -- Secure connectivity across clouds -- The backbone of a private cloud -- Extending services to public clouds -- Multi-cloud/mixed cloud use cases -- Cloud solutions supporting business objectives -- Modernizing your data center -- VMware hybrid clouds -- VMware - a partner for every cloud -- VMware vCloud Air -- AWS hybrid cloud -- IBM Cloud for VMware solutions -- Solution features -- Reference architecture -- IBM Cloud for VMware solutions -- Conceptual view -- Logical view -- Deployment view -- Summary -- Chapter 2: Implementing Service Architecture for Cross-Cloud Services -- Architecture overview -- Seamless integration of software-defined services -- Automating IT infrastructure -- Policy-based resource containers -- Automating manual and repetitive tasks -- Unified Management Console -- Scalability and performance -- Workload domains -- Management workload domain -- Workload domains -- VDI workload domains -- Hardware architecture - rack architecture -- Rack hardware -- Rack sizing -- Rack wiring -- Storage architecture (software-defined storage) -- vSAN storage policies -- Network architecture (network virtualization or software-defined network) -- Logical network design -- VMware Cloud Foundation software design -- SDDC Manager -- Physical Resource Manager -- Logical Resource Manager -- LRM Controller -- LRM logical resources and LRM services -- Hardware Management Service (HMS)…”
Libro electrónico -
108Publicado 2019Tabla de Contenidos: “…3.2 Security Issues in e-Business -- 3.2.1 Vulnerabilities -- 3.2.2 Security Attacks -- 3.2.3 Malware as a Threat -- 3.3 Common Vulnerabilities in e-Business -- 3.3.1 Phishing -- 3.3.2 Cross-Site Scripting (XSS) -- 3.4 Threats in e-Business -- 3.4.1 Ransomware -- 3.4.2 Spyware -- 3.4.3 Worms -- 3.4.4 Trojan Horse -- 3.5 Prevention Mechanism -- 3.6 Conclusion -- References -- 4 e-Commerce Security: Threats, Issues, andMethods -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 e-Commerce -- 4.3.1 Characteristics of e-Commerce Technology -- 4.3.2 Architectural Framework of e-Commerce -- 4.3.2.1 Two-Tier Architecture -- 4.3.2.2 Three-Tier Architecture -- 4.3.3 Advantages and Disadvantages of e-Commerce -- 4.4 Security Overview in e-Commerce -- 4.4.1 Purpose of Security in e-Commerce -- 4.4.2 Security Element at Different Levels of e-Commerce System -- 4.4.2.1 Hardware -- 4.4.2.2 Software -- 4.4.2.3 Environment -- 4.5 Security Issues in e-Commerce -- 4.5.1 Client Level -- 4.5.2 Front-End Servers and Software Application Level -- 4.5.3 Network and Server Level -- 4.6 Security Threats in e-Commerce -- 4.7 Security Approaches in e-Commerce -- 4.8 Comparative Analysis of Various Security Threats in e-Commerce -- 4.9 e-Commerce Security Life-Cycle Model -- 4.10 Conclusion -- References -- 5 Cyberwar is Coming -- 5.1 Introduction -- 5.2 Ransomware Attacks -- 5.2.1 Petya -- 5.2.2 WannaCry -- 5.2.3 Locky -- 5.3 Are Nations Ready? …”
Libro electrónico -
109
-
110Publicado 2025Tabla de Contenidos: “…Evaluating and drafting contracts -- Performing due diligence -- Managing intellectual property -- Chapter 3 Launching into the AI Marketing Era -- Ready or Not: AI Is Your New Marketing Copilot -- Putting performance marketers at risk -- Competing with creative directors -- Watching AI Upend the Corporate World -- Taking Foundational Steps Toward AI Marketing -- Addressing the marketing dichotomy -- Assessing progress with the AI checklist -- Adopting a Strategic Framework for Entering the AI Era -- Going for liftoff -- Initiating atmospheric ascent -- Reaching escape velocity -- Dominating deep space -- Part 2 Exploring Fundamental AI Structures and Concepts -- Chapter 4 Collecting, Organizing, and Transforming Data -- Defining Data in the Context of AI -- Considering the quality of data -- Getting an appropriate quantity of data -- Choosing Data Collection Methods for Marketing with AI -- Identifying data sources and methods -- Minding data privacy and ethics -- Putting Your Marketing Data in Its Place -- Understanding Data via Manual and Automated Systems -- Preparing the Data for Use by AI Algorithms and Models -- Perfecting data by cleaning -- Transforming data -- Splitting data into subsets -- Trimming down data -- Handling imbalanced and irrelevant data -- Chapter 5 Making Connections: Machine Learning and Neural Networks -- Examining the Process of Machine Learning -- Understanding Neural Networks -- Layers of a neural network -- Challenges with neural networks -- Supervised and Unsupervised Learning -- Following the path of supervised learning -- Embracing the freedom of unsupervised learning -- Exploring Reinforcement Learning -- Reinforcement learning in e-mail marketing -- Weighing explorations against exploits -- Mastering Sequences and Time Series -- Seeing how neural networks excel at time series analysis…”
Libro electrónico -
111Publicado 2017Tabla de Contenidos: “…-- Sprint Planning -- Sprint cycle -- Daily Scrum meeting -- Monitoring Sprint progress -- Sprint Review -- Sprint Retrospective -- Continuous Integration -- Agile runs on CI -- Types of projects that benefit from CI -- Elements of CI -- Version control system -- Branching strategy -- GitFlow branching model -- CI tool -- Self-triggered builds -- Code coverage -- Code coverage tools -- Static code analysis -- Automated testing -- Binary repository tools -- Automated packaging -- Benefits of using CI -- Freedom from long integrations -- Metrics -- Catching issues faster -- Rapid development -- Spend more time adding features -- Summary -- Chapter 2: Installing Jenkins -- Running Jenkins inside a servlet container -- Prerequisites -- Installing Java -- Installing Apache Tomcat -- Enabling the firewall and port 8080 -- Configuring the Apache Tomcat server -- Installing Jenkins on the Apache Tomcat server -- Installing Jenkins alone on an Apache Tomcat server -- Setting up the Jenkins home path -- Installing a standalone Jenkins server on Windows -- Prerequisites -- Installing Java -- Installing the latest stable version of Jenkins…”
Libro electrónico -
112por Gstrein, Oskar J.Tabla de Contenidos: “…-- 2.1 The Constituent Elements of the Rule of Law as a Fundamental Value of the EU System -- 3 The Challenge of Crafting a 'Core' Curriculum for the EU Law- and EU Studies-Related Courses -- 3.1 The Essential Methodological Toolkit for Teaching EU Law and EU Studies More Broadly -- 4 The Topic of the Rule of Law in EU Law- and EU Studies-Related Course Curricula -- 4.1 The Importance of Teaching Students About How the Rule of Law Works and How to Apply It…”
Publicado 2023
Libro electrónico -
113Publicado 2010Tabla de Contenidos: “…Cover -- Contents -- About the Authors -- Preface -- Unit I: Thinking Conceptually about Politics -- Chapter 1: Liberty -- 1.1 Meaning and Nature of Liberty -- 1.2 Negative Liberty -- 1.3 Positive Liberty -- 1.4 Conclusion -- Suggested Questions -- Bibliography -- Chapter 2: Equality -- 2.1 Meaning and Significance of Equality -- 2.2 Foundational Equality -- 2.2.1 Fundamental Equality of Persons -- 2.2.2 Equality of Opportunity -- 2.2.3 Equality of Condition -- 2.2.4 Equality of Outcome -- 2.3 Distributional Equality -- 2.3.1 Equality of Welfare -- 2.3.2 Equality of Resources -- 2.4 Equality of Capability -- 2.5 Conclusion -- Suggested Questions -- Bibliography -- Chapter 3: Justice -- 3.1 The Concept -- 3.2 Core Elements of Justice -- 3.2.1 Non-Arbitrariness -- 3.2.2 Consistency -- 3.2.3 Relevance -- 3.2.4 Proportion -- 3.2.5 Procedure -- 3.3 Justice as an Ethical Principle -- 3.3.1 Distributive Justice -- 3.3.1.1 Justice as Equality (Egalitarianism) -- 3.3.1.2 Justice Based on Contribution (Capitalist Justice) -- 3.3.1.3 Justice Based on Needs and Abilities (Socialism) -- 3.3.1.4 Justice as Freedom (Libertarianism) -- 3.3.1.5 Justice as Fairness -- 3.3.2 Retributive Justice -- 3.3.3 Compensatory Justice -- 3.4 Rawls' Theory of Justice as Fairness -- 3.4.1 Rawls' Method -- 3.4.2 Rawls' Principles of Justice -- 3.4.2.1 Principle of Equal Liberty -- 3.4.2.2 The Difference Principle -- 3.4.3 The Principle of Fair Equality of Opportunity -- 3.4.4 Critical Evaluation of Rawls' Theory -- 3.5 Distributive Justice and Business -- 3.6 Conclusion -- Suggested Questions -- Bibliography -- Chapter 4: Rights -- 4.1 Meaning and Nature of Rights -- 4.2 Basis Of Rights -- 4.2.1 Legal Rights -- 4.2.2 Moral Rights -- 4.2.3 Negative and Positive Rights -- 4.2.4 Contractual Rights -- 4.2.5 Natural Rights and Human Rights -- 4.3 Human Rights and the Corporate World…”
Libro electrónico -
114Publicado 2022Libro electrónico
-
115
-
116Publicado 2023Tabla de Contenidos: “…Intro -- Blockchain for Real World Applications -- Contents -- Illustrations -- Foreword -- Preface -- 1 Introduction -- 2 Distributed Ledger Technology -- 2.1 Different Types of Distributed Ledger Technology -- 2.1.1 Blockchain -- 2.1.2 Directed Acyclic Graph -- 2.1.3 Hashgraph -- 2.1.4 Holochain -- 2.1.5 Tempo (Radix) -- 2.2 Chronological Evolution -- 2.2.1 Blockchain 1.0 -- 2.2.2 Blockchain 2.0 -- 2.2.3 Blockchain 3.0 -- 2.2.4 Blockchain 4.0 -- 2.3 Blockchain Architecture -- 2.3.1 Block -- 2.3.2 Hash Function -- 2.3.3 Encryption -- 2.3.3.1 Problems -- 2.3.4 Keys: Public and Private -- 2.3.5 Decentralized Identifier -- 3 Blockchain Ecosystem -- 3.1 Working of Blockchain -- 3.2 Key Characteristics -- 3.2.1 Decentralization -- 3.2.2 Persistence -- 3.2.3 Anonymity -- 3.2.4 Auditability -- 3.3 Unspent Transaction Output -- 3.4 Classification of Blockchain on Access Management -- 3.4.1 Public Blockchain -- 3.4.2 Private Blockchain -- 3.4.3 Consortium Blockchain -- 3.5 Consensus -- 3.5.1 Proof-of-Work -- 3.5.2 Proof-of-Stake -- 3.5.3 Peercoin -- 3.5.4 Practical Byzantine Fault Tolerance -- 3.5.5 Delegated Proof-of-Stake -- 3.5.6 Ripple -- 3.5.7 Tendermint -- 3.5.8 Consensus Algorithms: A Comparison -- 3.5.8.1 Node Identity Management -- 3.5.8.2 Energy Saving -- 3.5.8.3 Tolerated Power of Adversary -- 3.5.9 Advances in Consensus Algorithms -- 3.6 Payment Verification in Blockchain -- 3.6.1 Simple Payment Verification -- 3.6.1.1 Key Features -- 3.6.2 Full Payment Verification -- 3.6.2.1 Key Features -- 3.7 Hashgraph -- 3.7.1 Elements of Hashgraph -- 3.7.2 Diagrammatic Representation -- 3.7.3 How Does Hashgraph Work? …”
Libro electrónico -
117Publicado 2013“…For centuries, Western culture looked to landscape and the pastoral in particular as a setting for the escapist desires to reconnect with the land and elements. More recently we looked to inner-city underbellies for the same romantic freedoms and wilderness. …”
Libro -
118Publicado 2020“…Finally, the book offers some elements to develop a vision of the role of education: what should be done in education to address the concerns that new communication technologies seem to pose more risks than opportunities for freedom and democracy."…”
Libro electrónico -
119por Felber, Christian. author“…With “democratic money conventions” in each municipality, where the elements of this new money system are discussed and decided on in a participatory manner, and a federal money covenant which then elaborates a template for a referendum about the future “money constitution”, a true “sovereign” could progressively convert money from a financial weapon into a democratic tool. …”
Publicado 2017
Libro electrónico -
120Publicado 2016“…Your journey to success starts here Why Winners Win identifies the crucial elements of business success and provides step-by-step guidance on getting there. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico