Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 525
- Historia 396
- Development 246
- Management 243
- Economic conditions 206
- Social aspects 189
- Application software 167
- Història 167
- Data processing 161
- Politics and government 151
- Engineering & Applied Sciences 149
- Business & Economics 144
- Education 140
- Economic policy 134
- Economic aspects 127
- Economics 122
- Social conditions 121
- Emigration and immigration 117
- Leadership 113
- Computer networks 110
- Editing 107
- Motion pictures 107
- Research & information: general 107
- Energy 105
- Sustainable development 105
- Technology: general issues 105
- Employment 102
- Government policy 101
- Cloud computing 99
- Design 98
-
11381Publicado 2010Tabla de Contenidos: “…-- 10.2 Operations Systems -- 10.3 TMN Conceptual Model -- 10.4 TMN Standards -- 10.5 TMN Architecture -- 10.5.1 Functional Architecture -- 10.5.2 Physical Architecture -- 10.5.3 Information Architecture -- 10.6 TMN Management Service Architecture -- 10.7 TMN Integrated View -- 10.8 TMN Implementation -- 10.8.1 OMNI Point -- 10.8.2 eTOM -- Summary -- Exercises -- Chapter 11: Network Management Applications -- 11.1 Configuration Management -- 11.1.1 Network Provisioning -- 11.1.2 Inventory Management -- 11.1.3 Network Topology -- 11.2 Fault Management -- 11.2.1 Fault Detection -- 11.2.2 Fault Location and Isolation Techniques -- 11.3 Performance Management -- 11.3.1 Performance Metrics -- 11.3.2 Data Monitoring -- 11.3.3 Problem Isolation -- 11.3.4 Performance Statistics -- 11.4 Event Correlation Techniques -- 11.4.1 Rule-Based Reasoning -- 11.4.2 Model-Based Reasoning -- 11.4.3 Case-Based Reasoning -- 11.4.4 Codebook Correlation Model -- 11.4.5 State Transition Graph Model -- 11.4.6 Finite State Machine Model -- 11.5 Security Management -- 11.5.1 Policies and Procedures -- 11.5.2 Resources to Prevent Security Breaches -- 11.5.3 Firewalls -- 11.5.4 Cryptography -- 11.5.5 Authentication and Authorization -- 11.5.6 Client-Server Authentication Systems -- 11.5.7 Message Transfer Security -- 11.5.8 Network Protection from Virus Attacks -- 11.6 Accounting Management -- 11.7 Report Management -- 11.8 Policy-Based Management -- 11.9 Service Level Management -- Summary -- Exercises -- Part IV: Broadband Network Management -- Chapter 12: Broadband Network Management: WAN -- 12.1 Broadband Network and Services -- 12.2 ATM Technology -- 12.2.1 Virtual Path-Virtual Circuit -- 12.2.2 ATM Packet Size -- 12.2.3 Integrated Service -- 12.2.4 WAN/SONET -- 12.2.5 ATM LAN Emulation…”
Libro electrónico -
11382Publicado 2010Tabla de Contenidos: “…Alignment -- 7.2 Unions -- 7.3 Enumerated Values -- 7.3.1 Enumerated Types -- 7.3.2 Enum Properties -- 7.4 Alias -- 7.5 Parameterized Scopes with template -- 7.5.1 Eponymous templates -- 7.6 Injecting Code with mixin templates -- 7.6.1 Symbol Lookup inside a mixin -- 7.7 Summary and Reference -- 8 Type Qualifiers -- 8.1 The immutable Qualifier -- 8.1.1 Transitivity -- 8.2 Composing with immutable -- 8.3 Immutable Parameters and Methods -- 8.4 Immutable Constructors -- 8.5 Conversions involving immutable -- 8.6 The const Qualifier -- 8.7 Interaction between const and immutable -- 8.8 Propagating a Qualifier from Parameter to Result -- 8.9 Summary -- 9 Error Handling -- 9.1 Throwing and catching -- 9.2 Types -- 9.3 Finally clauses -- 9.4 Nothrow Functions and the Special Nature of Throwable -- 9.5 Collateral Exceptions -- 9.6 Stack Unwinding and Exception-Safe Code -- 9.7 Uncaught Exceptions -- 10 Contract Programming -- 10.1 Contracts -- 10.2 Assertions -- 10.3 Preconditions -- 10.4 Postconditions -- 10.5 Invariants -- 10.6 Skipping Contract Checks. …”
Libro electrónico -
11383Publicado 2013Tabla de Contenidos: “…4.4.6 BOR constraints for non-singular expressions -- 4.4.7 Cause-effect graphs and predicate testing -- 4.4.8 Fault propagation -- 4.4.9 Predicate testing in practice -- 4.5 Tests Using Basis Paths -- 4.6 Scenarios and Tests -- Summary -- Exercises -- Chapter 5: Test Generation from Finite State Models -- 5.1 Software Design and Testing -- 5.2 Finite State Machines -- 5.2.1 Excitation using an input sequence -- 5.2.2 Tabular representation -- 5.2.3 Properties of FSM -- 5.3 Conformance Testing -- 5.3.1 Reset inputs -- 5.3.2 The testing problem -- 5.4 A Fault Model -- 5.4.1 Mutants of FSMs -- 5.4.2 Fault coverage -- 5.5 Characterization Set -- 5.5.1 Construction of the k-equivalence partitions -- 5.5.2 Deriving the characterization set -- 5.5.3 Identification sets -- 5.6 The W-method -- 5.6.1 Assumptions -- 5.6.2 Maximum number of states -- 5.6.3 Computation of the transition cover set -- 5.6.4 Constructing Z -- 5.6.5 Deriving a test set -- 5.6.6 Testing using the W-method -- 5.6.7 The error detection process -- 5.7 The Partial W-method -- 5.7.1 Testing using the Wp-method for m - n -- 5.7.2 Testing using the Wp-method for m>n -- 5.8 The UIO-Sequence Method -- 5.8.1 Assumptions -- 5.8.2 UIO sequences -- 5.8.3 Core and non-core behavior -- 5.8.4 Generation of UIO sequences -- 5.8.5 Explanation of gen-uio -- 5.8.6 Distinguishing signatures -- 5.8.7 Test generation -- 5.8.8 Test optimization -- 5.8.9 Fault detection -- 5.9 Automata Theoretic Versus Control-Flow Based Techniques -- 5.9.1 n-switch-cover -- 5.9.2 Comparing automata theoretic methods -- 5.10 Tools -- Summary -- Exercises -- Chapter 6: Test Generation from Combinatorial Designs -- 6.1 Combinatorial Designs -- 6.1.1 Test configuration and test set -- 6.1.2 Modeling the input and configuration spaces -- 6.2 A Combinatorial Test Design Process -- 6.3 Fault Model -- 6.3.1 Fault vectors…”
Libro electrónico -
11384por Lal Kishore, K.Tabla de Contenidos: “…Chapter 6: DC and AC Bridges -- 6.1 Introduction -- 6.2 DC Bridges -- 6.3 Wheatstone Bridge -- 6.3.1 Operation -- 6.3.2 Measurement Errors -- 6.3.3 Thevenin's Equivalent Circuit -- 6.4 Kelvin Bridge -- 6.4.1 Kelvin Double Bridge -- 6.4.2 Applications -- 6.5 Strain Gauge Bridge Circuit -- 6.6 AC Bridges -- 6.6.1 General Form of Bridge Circuit -- 6.7 Maxwell Bridge -- 6.7.1 Phasor Diagram for the Maxwell Bridge -- 6.8 Hay Bridge -- 6.8.1 Phasor Diagram for Hay Bridge -- 6.9 Schering Bridge -- 6.9.1 Phasor Diagram for a Schering Bridge -- 6.10 Wien Bridge -- 6.10.1 Phasor Diagram for the Wien Bridge -- 6.11 Anderson Bridge -- 6.12 Resonance Bridge -- 6.13 Similar Angle Bridge -- 6.14 Radio Frequency Bridge (Subtitution Technique) -- 6.15 Wagner's Ground Connection -- 6.16 Twin-T Null Network -- 6.17 Bridged-T Network -- 6.18 Detectors for AC Bridges -- 6.19 Phasor Diagrams -- 6.20 Recorders -- 6.20.1 Introduction -- 6.21 Strip-Chart Recorders -- 6.21.1 Galvanometric Recorders -- 6.21.2 Sensitivity -- 6.21.3 Transient Response -- 6.22 Pen-Driving Mechanism -- 6.23 Other Features -- 6.24 Servorecorders -- 6.25 Servobalancing Potentiometric Recorder -- 6.26 Characteristics of Typical Servorecorders -- 6.27 Oscillographic Recorders -- 6.28 Magnetic Tape Recorders -- 6.28.1 Direct AM Recording -- 6.28.2 Frequency Modulation Recording -- 6.29 Recorders (Contd.) -- 6.29.1 X-Y Recorders -- 6.29.2 Self-Balancing Potentiometers -- 6.29.3 Working of a Servotype Motor -- 6.29.4 Chopper -- 6.29.5 Servotype X-Y Recorders -- 6.29.6 Y-Scale -- 6.30 Galvonometer Oscillographs -- 6.30.1 Applications -- 6.31 Summary -- Points to Remember -- Objective-type Questions -- Review Questions -- Unsolved Problems -- Chapter 7: Transducers -- 7.1 Introduction -- 7.1.1 Examples -- 7.2 Classification of Transducers -- 7.3 Active and Passive Transducers…”
Publicado 2009
Libro electrónico -
11385por Hassler, MarcoTabla de Contenidos: “…Cloud -- 3.2 Rechtliche Überlegungen zur Datenspeicherung -- 3.2.1 Allgemeine Datenschutz-Bestimmungen -- 3.2.2 Bedeutung für Analytics-Systeme -- 3.2.3 Spezialfall IP-Adresse -- 3.2.4 Spezialfall Cookie -- 3.2.5 Einwilligung -- 3.2.6 Best Practice für Analytics-Datenspeicherung -- Kapitel 4: Datenauswertung und Präsentation -- 4.1 Auswertungsinterface -- 4.1.1 Standard-Grafiken und Datentabellen -- 4.1.2 Dashboards und konfigurierte Auswertungen -- 4.1.3 E-Mail-Reports und Exporte -- 4.2 Browser-Overlay -- 4.3 Weitere Schnittstellen -- Teil 2: Metriken analysieren und interpretieren -- Kapitel 5: Einführung in die Welt der Metriken -- 5.1 Metriken und wie sie zustande kommen -- 5.2 Hits - und ihre Bedeutungslosigkeit -- 5.3 Seitenaufrufe - die Standard-Metrik schlechthin -- 5.3.1 Wie Sie es nutzen sollten -- 5.3.2 Was es zu beachten gilt -- 5.4 Ereignisse - Nutzer-Interaktionen -- 5.4.1 Wie Sie es nutzen sollten -- 5.4.2 Was es zu beachten gilt -- 5.5 Besuche - Website-Sitzungen -- 5.5.1 Wie Sie es nutzen sollten -- 5.5.2 Was es zu beachten gilt -- 5.6 Besucher - die Person hinter dem Website-Besuch -- 5.6.1 Wie Sie es nutzen sollten -- 5.6.2 Was es zu beachten gilt -- 5.7 Mit Messungenauigkeiten leben und arbeiten -- 5.8 Weitere Metriken und Dimensionen -- Kapitel 6: Traffic-Quellen -- 6.1 Direktzugriffe und Lesezeichen -- 6.1.1 Was gemessen werden kann -- 6.1.2 Wie Sie es nutzen sollten -- 6.1.3 Was es zu beachten gilt -- 6.2 Verweisende Websites und URLs -- 6.2.1 Was gemessen werden kann -- 6.2.2 Wie Sie es nutzen sollten -- 6.2.3 Was es zu beachten gilt -- 6.3 Suchmaschinen -- 6.3.1 Was gemessen wird -- 6.3.2 Wie Sie es nutzen sollten -- 6.3.3 Was es zu beachten gilt -- 6.4 Suchmaschinen-Keywords…”
Publicado 2023
Libro electrónico -
11386
-
11387Publicado 2021Tabla de Contenidos: “…8.2.3 Unsupervised domain adaptation techniques -- 8.2.3.1 Domain adversarial adaptation -- 8.2.3.2 Generative-based adaptation -- 8.2.3.3 Classifier discrepancy -- 8.2.3.4 Self-supervised learning -- Self-training -- Entropy minimization -- 8.2.3.5 Multitasking -- 8.3 Continual learning -- 8.3.1 Continual learning problem formulation -- 8.3.2 Continual learning setups in semantic segmentation -- 8.3.3 Incremental learning techniques -- 8.3.3.1 Knowledge distillation -- 8.3.3.2 Parameter freezing -- 8.3.3.3 Geometrical feature-level regularization -- 8.3.3.4 New directions -- 8.4 Conclusion -- Acknowledgment -- References -- Biographies -- 9 Visual tracking -- 9.1 Introduction -- 9.1.1 Problem definition -- 9.1.2 Challenges in tracking -- 9.1.3 Motivation of the setting -- 9.1.4 Historical development -- 9.2 Template-based methods -- 9.2.1 The basics -- 9.2.2 Performance measures -- 9.2.3 Normalized cross correlation -- 9.2.4 Phase-only matched filter -- 9.3 Online-learning-based methods -- 9.3.1 The MOSSE filter -- 9.3.2 Discriminative correlation filters -- 9.3.3 Suitable features for DCFs -- 9.3.4 Scale space tracking -- 9.3.5 Spatial and temporal weighting -- 9.4 Deep learning-based methods -- 9.4.1 Deep features in DCFs -- 9.4.2 Adaptive deep features -- 9.4.3 End-to-end learning DCFs -- 9.5 The transition from tracking to segmentation -- 9.5.1 Video object segmentation -- 9.5.2 A generative VOS method -- 9.5.3 A discriminative VOS method -- 9.6 Conclusions -- Acknowledgment -- References -- Biographies -- 10 Long-term deep object tracking -- 10.1 Introduction -- 10.1.1 Challenges in video object tracking -- 10.1.1.1 Visual challenges in tracking -- 10.1.1.2 Learning challenges in tracking -- 10.1.1.3 Engineering challenges in tracking -- 10.2 Short-term visual object tracking -- 10.2.1 Shallow trackers -- 10.2.2 Deep trackers…”
Libro electrónico -
11388por Mathur, Aditya P.Tabla de Contenidos: “…Computation of the transition cover set -- 3.6.4. Constructing Z -- 3.6.5. …”
Publicado 2010
Libro electrónico -
11389Publicado 2017“…Providing both quantifiable metrics and policy measures for the transition, it is a much needed addition to the literature on Chinese energy policy. …”
Libro electrónico -
11390Publicado 2002“…This is a space crossed by three major political dynamics: strong national affirmations to compensate for an often precarious state legitimacy, mobilization of ethnicity within existing political groups, transnational organization of identities in favour of development. diasporas and the rise of immigration. …”
Libro electrónico -
11391Publicado 2019“…With over 500 participants, the conference was co-hosted by the Management Science Department of National Natural Science Foundation of China, the Chinese Society of Energy Economics and Management, and Renmin University of China on the subject area of “Energy Transition of China: Opportunities and Challenges”. …”
Libro electrónico -
11392Publicado 2020“…Contributors also reflect on the implications of transitions between varied material forms and media cultures. …”
Libro electrónico -
11393Publicado 2019“…While we are governed by transnational structures of rule, a systematic analysis of how this operates and how it can be resisted remains to be developed. …”
Libro electrónico -
11394Publicado 2022“…The main aims of Oxford Open Energy are to identify key topical challenges, help to provide relevant solutions for decarbonizing energy systems as part of the global energy transition, and to deliver content with wide societal impact. …”
Revista digital -
11395Publicado 2020“…Nevertheless, structural inequalities and persistent biases both on the supply of and demand for finance for women-driven companies still hinder the transition to a more balanced, more accessible and ultimately better functioning funding environment. …”
Libro electrónico -
11396por Organisation for Economic Co-operation and Development.“…It has to improve income equality in the context of a severe demographic transition. Such a transition, from one of the youngest populations in the OECD at present to the second oldest by 2050, may boost the need for public spending and slow economic growth. …”
Publicado 2013
Libro electrónico -
11397Banking on Democracy The Political Economy of International Private Bank Lending in Emerging Marketspor Rodríguez, Javier“…Do they reward democratic transitions as well as policy and political stability? …”
Publicado 2007
Capítulo de libro electrónico -
11398Publicado 2017“…Following a remarkable transformation in the past century in research and innovation, in particular through the development of new technologies and processes in sectors such as oil and gas, shipbuilding and also fisheries and aquaculture, Norway is today increasingly facing a “triple transition imperative” in which it needs, first, to shift toward a more diversified and robust economy; second, to move to a more competitive, effective and efficient innovation system; and third, to support research and innovation activities that can confront an array of societal challenges (climate change, food security, aging, health and so on). …”
Libro electrónico -
11399
Libro electrónico -
11400Publicado 1972“…Their involvement is a story of transition from wonder and optimism about the new medium to a gradual disenchantment and a growing tendency to regard cinema as a destructive rival rather than a creative partner. …”
Libro electrónico