Browse Results

Showing 23,226 through 23,250 of 53,912 results

Super Mario Bros: Le Battute & I Meme Più Divertenti

by Hiddenstuff Entertainment

Ottieni l’accesso istantaneo alle battute più divertenti su Super Mario Bros! Scoprirai le battute più divertenti di sempre su Super Mario Bros. Questo libro è composto con alcune delle battute più esilaranti su Super Mario Bros. Scopri i personaggi più popolari della Nintendo con battute e meme stupidi, ridicoli e semplicemente meravigliosi su di loro! Scarica la tua copia adesso! Compra oggi la tua copia e scopri tutte le battute più popolari su Super Mario Bros!

Cómo liberar a Roku

by Jonathan Gates

Descripción del libro Es una guía paso a paso del cómo ejecutar Kodi en todos los aparatos Roku Si no es una de las mejores características de los aparatos Roku es que puedes ejecutar Kodi en ellos. Esto te permitirá tener acceso a cualuier contenido que quieras tales como shows de TV, Música, y Películas .

How To Get Back Links: 10 Extremely Powerful Backlinks Sources To Building Website Backlinks And Exploding Your Traffic

by Brian Graves

Over 60 website examples where you can find these 10 different back linking types, ranging from PR4-PR9.You also get strategies for each link type that you can use to increase website traffic.

CompTIA Network+ Study Guide: Exam N10-007

by Todd Lammle

Todd Lammle's bestselling CompTIA Network+ Study Guide for the N10-007 exam! CompTIA's Network+ certification tells the world you have the skills to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. First, however, you have to pass the exam! This detailed CompTIA Authorized study guide by networking guru Todd Lammle has everything you need to prepare for the CompTIA Network+ Exam N10-007. Todd covers all exam objectives, explains key topics, offers plenty of practical examples, and draws upon his own invaluable 30 years of networking experience to help you learn. The Study Guide prepares you for Exam N10-007, the new CompTIA Network+ Exam: • Covers all exam objectives including network technologies, network installation and configuration, network media and topologies, security, and much more • Includes practical examples review questions, as well as access to practice exams and flashcards to reinforce learning • Networking guru and expert author Todd Lammle offers valuable insights and tips drawn from real-world experience Plus, receive one year of FREE access to a robust set of online interactive learning tools, including hundreds of sample practice questions, a pre-assessment test, bonus practice exams, and over 100 electronic flashcards. Prepare for the exam and enhance your career—starting now!

Cyprus and its Conflicts: Representations, Materialities, and Cultures

by Vaia Doudaki Nico Carpentier

The Mediterranean island of Cyprus is the site of enduring political, military, and economic conflict. This interdisciplinary collection takes Cyprus as a geographical, cultural and political point of reference for understanding how conflict is mediated, represented, reconstructed, experienced, and transformed. Through methodologically diverse case studies of a wide range of topics—including public art, urban spaces, and print, broadcast and digital media—it assembles an impressively multifaceted perspective, one that provides broad insights into the complex interplay of culture, conflict, and identity.

Bioinformatics with Python Cookbook - Second Edition

by Tiago Antao

This book is for Data Scientists, Bioinformatics analysts, researchers, and Python developers who want to address intermediate-to-advanced common biological and bioinformatics problems with the recipe-based approach. Working knowledge of Python programming language is expected.

The Modern C# Challenge: Become an expert C# programmer by solving interesting programming problems

by Rod Stephens

Learn advanced C# concepts and techniques such as building caches, cryptography, and parallel programming by solving interesting programming challengesKey FeaturesGain useful insights on advanced C# programming topics and APIsUse locking and cached values to solve parallel problemsTake advantage of .NET's cryptographic tools to encrypt and decrypt stringsBook DescriptionC# is a multi-paradigm programming language. The Modern C# Challenge covers with aspects of the .NET Framework such as the Task Parallel Library (TPL) and CryptoAPI. It also encourages you to explore important programming trade-offs such as time versus space or simplicity. There may be many ways to solve a problem and there is often no single right way, but some solutions are definitely better than others. This book has combined these solutions to help you solve real-world problems with C#.In addition to describing programming trade-offs, The Modern C# Challenge will help you build a useful toolkit of techniques such as value caching, statistical analysis, and geometric algorithms.By the end of this book, you will have walked through challenges in C# and explored the .NET Framework in order to develop program logic for real-world applications.What you will learnPerform statistical calculations such as finding the standard deviationFind combinations and permutationsSearch directories for files matching patterns using LINQ and PLINQFind areas of polygons using geometric operationsRandomize arrays and lists with extension methodsExplore the filesystem to find duplicate filesSimulate complex systems and implement equality in a classUse cryptographic techniques to encrypt and decrypt strings and filesWho this book is forThe Modern C# Challenge is for all C# developers of different abilities wanting to solve real-world problems. There are problems for everyone at any level of expertise in C#

Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II (Lecture Notes in Computer Science #11273)

by Steven Galbraith Thomas Peyrin

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Ambient Assisted Living: Italian Forum 2017 (Lecture Notes in Electrical Engineering #540)

by Niccolò Casiddu Claudia Porfirione Andrea Monteriù Filippo Cavallo

This book documents the state of the art in the field of ambient assisted living (AAL), highlighting the impressive potential of novel methodologies and technologies to enhance well-being and promote active ageing. It covers a broad range of topics, with sections on technological sensors and platforms, social robotics for assistance, assistance and care applications, health and medical support methodologies and technologies, as well as the analysis, modelling and design of AAL services. <P><P> The book comprises a selection of the best papers presented at the 8th Italian Forum on Ambient Assisted Living (ForitAAL 2017), which was held in Genoa, Italy, in June 2017 and brought together researchers, technology teams and professional associations, as well as representatives of the Italian regions and advisors to the Italian Ministry of Education, University and Research, with the goal of developing a consensus on how to improve provisions for the elderly and impaired. The respective contributions offer valuable insights into how the latest advances can help address the needs of the elderly and those with chronic health conditions. They also underscore the need for AAL to continue moving toward multidisciplinary integration, so as to embrace the various disciplines that place the user of services at the centre of the design process.

Distributed Autonomous Robotic Systems: The 10th International Symposium (Springer Proceedings in Advanced Robotics #83)

by Nikolaus Correll Mac Schwager Michael Otte

This volume of the SPAR series brings the proceedings of the fourteen edition of the DARS symposium on Distributed Autonomous Robotic Systems, whose proceedings have been published within SPAR since the past edition. This symposium took place in Boulder, CO from October 15th to 17th, 2018. The volume edited by Nikolaus Correll and Mac Schwager contains 36 scientific contributions cutting across planning, control, design, perception, networking, and optimization, all united through the common thread of distributed robotic systems.

Data Matters: Ethics, Data, And International Research Collaboration In A Changing World: Proceedings Of A Workshop

by National Academies of Sciences Engineering Medicine

In an increasingly interconnected world, perhaps it should come as no surprise that international collaboration in science and technology research is growing at a remarkable rate. As science and technology capabilities grow around the world, U.S.-based organizations are finding that international collaborations and partnerships provide unique opportunities to enhance research and training. International research agreements can serve many purposes, but data are always involved in these collaborations. The kinds of data in play within international research agreements varies widely and may range from financial and consumer data, to Earth and space data, to population behavior and health data, to specific project-generated data—this is just a narrow set of examples of research data but illustrates the breadth of possibilities. The uses of these data are various and require accounting for the effects of data access, use, and sharing on many different parties. Cultural, legal, policy, and technical concerns are also important determinants of what can be done in the realms of maintaining privacy, confidentiality, and security, and ethics is a lens through which the issues of data, data sharing, and research agreements can be viewed as well. A workshop held on March 14-16, 2018, in Washington, DC explored the changing opportunities and risks of data management and use across disciplinary domains. The third workshop in a series, participants gathered to examine advisory principles for consideration when developing international research agreements, in the pursuit of highlighting promising practices for sustaining and enabling international research collaborations at the highest ethical level possible. The intent of the workshop was to explore, through an ethical lens, the changing opportunities and risks associated with data management and use across disciplinary domains—all within the context of international research agreements. This publication summarizes the presentations and discussions from the workshop.

Fundamentals of Computer Architecture and Design

by Ahmet Bindal

This textbook provides semester-length coverage of computer architecture and design, providing a strong foundation for students to understand modern computer system architecture and to apply these insights and principles to future computer designs. It is based on the author’s decades of industrial experience with computer architecture and design, as well as with teaching students focused on pursuing careers in computer engineering. Unlike a number of existing textbooks for this course, this one focuses not only on CPU architecture, but also covers in great detail in system buses, peripherals and memories. This book teaches every element in a computing system in two steps. First, it introduces the functionality of each topic (and subtopics) and then goes into “from-scratch design” of a particular digital block from its architectural specifications using timing diagrams. The author describes how the data-path of a certain digital block is generated using timing diagrams, a method which most textbooks do not cover, but is valuable in actual practice. In the end, the user is ready to use both the design methodology and the basic computing building blocks presented in the book to be able to produce industrial-strength designs.

A New Platform for Edge Mode Manipulations in the Quantum Hall Effect (Springer Theses)

by Yonatan Cohen

In the last several decades, the quantum Hall effect has provided a remarkable platform for manipulating one-dimensional electronic modes and investigating fundamental physical phenomena. However, certain limitations make it difficult for various kinds of interesting modes structures to be formed using this platform. One example is the so called helical mode structure, in which two one-dimensional, counter propagating modes have opposite spins and thus spin and momentum are locked. Such helical modes have lately attracted significant interest, since, when coupled to a conventional superconductor, they are expected to manifest topological superconductivity and host Majorana zero modes. Even more interesting are fractional helical modes, which open the way for realizing generalized parafermionic zero modes. Possessing non-abelian exchange statistics, these quasiparticles may serve as building blocks in topological quantum computing. Here we present a new platform for manipulating integer and fractional quantum Hall edge modes, which allows the formation of robust one-dimensional helical as well as fractional helical modes. The platform is based on a carefully designed double-quantum-well structure in a GaAs based system hosting two electronic sub-bands in the quantum Hall effect regime. By electrostatic gating of different areas of the structure, counter-propagating integer, as well as fractional, edge modes with opposite spins are formed and their spin protection is verified. Beyond the formation of helical modes, the new platform can serve as a rich playground for new research. Some new possibilities include the artificial induction of compounded fractional edge modes and the construction of new edge mode-based interferometers.

GIScience Teaching and Learning Perspectives (Advances in Geographic Information Science)

by Shivanand Balram James Boxall

This volume uniquely links educational theories and the practice of GIScience in higher education contexts to guide classroom practice, present effective practical implementations from peers, and provide resources and strategies for effective teaching methods. The book offers a comprehensive exploration of GIScience education, including current trends and future educational needs in GIScience, and will act as a resource to prepare learners for a world that demands more intensive investment in present-day education and technological literacy. Additionally, the indirect benefit of merging the fragmented literature on GIScience literacy will provide a basis to examine common techniques and enable a new wave of research more rooted in learning theories. In ten chapters, the book is designed to attract an audience from geographic information systems science, geomatics, spatial information science, cartography, information technology, and educational technology as focus disciplines.

Computer and Computing Technologies in Agriculture X: 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China, October 19–21, 2016, Proceedings (IFIP Advances in Information and Communication Technology #509)

by Daoliang Li

This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications.

Model-Driven Engineering and Software Development: 6th International Conference, MODELSWARD 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science #991)

by Slimane Hammoudi Luís Ferreira Pires Bran Selic

This book constitutes thoroughly revised and selected papers from the 6th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2018, held in Funchal, Madeira, Portugal, in January 2018. The 22 thoroughly revised and extended papers presented in this volume were carefully reviewed and selected from 101 submissions. They contribute to the development of highly relevant research trends in model-driven engineering and software development such as innovative methods for MDD-based development and testing of web-based applications and user interfaces, support for development of Domain-Specific Languages (DSLs), MDD-based application development on multiprocessor platforms, advances in MDD tooling, formal semantics and behaviour modelling, and MDD-based product-line engineering.

Mastering Kali Linux for Advanced Penetration Testing - Third Edition

by Vijay Kumar Velu

Penetration Testers, Ethical Hackers, IT professionals or security consultants who want to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.

Ageing and Digital Technology: Designing and Evaluating Emerging Technologies for Older Adults

by Barbara Barbosa Neves Frank Vetere

This book brings together Sociologists, Computer Scientists, Applied Scientists and Engineers to explore the design, implementation and evaluation of emerging technologies for older people. It offers an innovative and comprehensive overview, not only of the rapidly developing suite of current digital technologies and platforms, but also of perennial theoretical, methodological and ethical issues. As such, it offers support for researchers and professionals who are seeking to understand and/or promote technology use among older adults. The contributions presented here offer theoretical and methodological frameworks for understanding age-based digital inequalities, participation, digital design and socio-gerontechnology. They include ethical and practical reflections on the design and evaluation of emerging technologies for older people, as well as guidelines for ethical, participatory, professional and cross-disciplinary research and practice. In addition, they feature state-of-the-art, international empirical research on communication technologies, games, assistive technology and social media. As the first truly multidisciplinary book on technology use among ageing demographics, and intended for students, researchers, applied researchers, practitioners and professionals in a variety of fields, it will provide these readers with insights, guidelines and paradigms for practice that transcend specific technologies, and lay the groundwork for future research and new directions in innovation.

Drones as Cyber-Physical Systems: Concepts And Applications For The 4th Industrial Revolution

by Jung-Sup Um

This book introduces the concept of using drones as a teaching tool to explore the fundamental principles, technology and applications of Cyber-Physical Systems (CPS). A short introduction sets CPS in the context of the 4th industrial revolution, and describes various CPS technologies including self-driving cars, commercial intelligent drones and mobile robots, in which artificial intelligence routinely supports smarter decision-making. The core of the book then focuses on commercially available drones, the only available system offering the advantage of cyber-physical bridging through 3D autonomous dynamic flying in classroom conditions. Chapters describe drone technology, including location sensors and imaging systems. CPS theory is explained through typical drone flying procedures and do-it-yourself (DIY) aerial photography in which communication between sensors, actuators and controllers occurs through cyber-physical bi-directional bridging. This book opens new possibilities in fostering 4th industrial revolution literacy, introducing relevant examples from readily available equipment, making core elements of cyber-physical bridging accessible. It is aimed primarily at those students who have an interest in CPS, drones and those from disciplines that are concerned with spatial information.

MultiMedia Modeling: 25th International Conference, MMM 2019, Thessaloniki, Greece, January 8–11, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11296)

by Ioannis Kompatsiaris Benoit Huet Vasileios Mezaris Cathal Gurrin Wen-Huang Cheng Stefanos Vrochidis

The two-volume set LNCS 11295 and 11296 constitutes the thoroughly refereed proceedings of the 25th International Conference on MultiMedia Modeling, MMM 2019, held in Thessaloniki, Greece, in January 2019. Of the 172 submitted full papers, 49 were selected for oral presentation and 47 for poster presentation; in addition, 6 demonstration papers, 5 industry papers, 6 workshop papers, and 6 papers for the Video Browser Showdown 2019 were accepted. All papers presented were carefully reviewed and selected from 204 submissions.

Software Technologies: 11th International Joint Conference, ICSOFT 2016, Lisbon, Portugal, July 24-26, 2016, Revised Selected Papers (Communications in Computer and Information Science #743)

by Marten Van Sinderen Leszek A. Maciaszek André Ludwig Jorge Cardoso Enrique Cabello

This book constitutes the thoroughly refereed proceedings of the 11th International Joint Conference on Software Technologies, ICSOFT 2016, held in Lisbon, Portugal, in July 2016. The 13 revised full papers together with 3 short papers presented were carefully reviewed and selected from 84 submissions. The papers selected to be included in this book contribute to the understanding of relevant trends of current research on software technologies, including: Modelling for mobile devices Software and system testing Model-driven software development Reengineering systems for multi-tenancy Embedded and real-time systems reconguration Domain-specic languages and modelling Software and systems quality Context-aware and dynamically adapting software systems

Advances in Systematic Creativity: Creating and Managing Innovations

by Mikael Collan Leonid Chechurin

This book presents a collection of the most current research into systemic creativity and TRIZ, engendering discussion and the exchange of new discoveries in the field. With chapters on idea generation, decision making, creativity support tools, artificial intelligence and literature based discovery, it will include a number of instruments of inventive design automation. Consisting of 15-20 chapters written by leading experts in the theory for inventive problem solving (TRIZ) and adjacent fields focused upon heuristics, the contributions will add to the method of inventive design, dialogue with other tools and methods, and teaching creativity in management education through real-life case studies.

The Intelligent Marketer’s Guide to Data Privacy: The Impact of Big Data on Customer Trust

by Robert W. Palmatier Kelly D. Martin

Firms are collecting and analyzing customer data at an ever increasing rate in response to evidence that data analytics (precision targeting, improved selling) generates a positive return. Yet efforts often ignore customers’ privacy concerns and feelings of vulnerability with long-term effects on customers’ trust, relationships, and ultimately financial performance. Big data, privacy, and cybersecurity often is relegated to IT and legal teams with minimal regard for customer relationships. This book fills the void by taking a customer-centric approach to privacy. It offers both defensive and offensive marketing-based privacy strategies that strongly position firms in today’s data-intensive landscape. The book also helps managers anticipate future consumer and legislative trends. Drawing from the authors’ own work and extant research, this book offers a compelling guide for building and implementing big data- and privacy-informed business strategies. Specifically, the book: · -Describes the consumer psychology of privacy · -Deconstructs relevant legal and regulatory issues · - Offers defensive privacy strategies · - Describes offensive privacy strategies · Provides an executive summary with the Six Tenets for Effective Privacy Marketing This book will be useful to managers, students, or the casual reader who is interested in how and why big data and consumer privacy are transforming business. Moving beyond summary privacy insights, the book also offers a detailed and compelling action plan for improving performance by protecting against privacy threats as well as developing and implementing offensive privacy strategy. In the future, many firms will be competing through an integrated, customer-centric big data privacy strategy and this book will guide managers in this journey.

The Future of Digital Democracy: An Interdisciplinary Approach (Lecture Notes in Computer Science #11300)

by Pierluigi Contucci Andrea Omicini Danilo Pianini Alina Sîrbu

Digital democracy is a hot topic nowadays, its relevance growing along with the impact of computational platforms on our(political) life. Communication is the basal fabric on which society is defined, and it appears obvious that the civic organisation and politics itself should take the opportunities the "digital revolution" offers. Institutional inertia, nevertheless, causes large delays in updating and adapting. Therefore, the balance between participation and delegated representation is now facing a crisis. A thorough understanding of the factors involved in participation is a first step towards providing solutions. Using the Internet to fill the gap and build a digital democracy provides an opportunity, along with several risks that need to be carefully analysed. It needs to be implemented using a fully inter- and trans-disciplinary perspective. The six contributions included in this State-of-the Art Survey present research in the field of social sciences as well as mathematics and computer science and aim at contributing to a better understanding of the potential and dangers of digital democracy, helping readers go beyond the misunderstandings, the misconceptions,and the conceptual and practical abuses that the very notion of democracy is undergoing during this age of technological revolution and social turmoils.

MultiMedia Modeling: 25th International Conference, MMM 2019, Thessaloniki, Greece, January 8–11, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11295)

by Ioannis Kompatsiaris Benoit Huet Vasileios Mezaris Cathal Gurrin Wen-Huang Cheng Stefanos Vrochidis

The two-volume set LNCS 11295 and 11296 constitutes the thoroughly refereed proceedings of the 25th International Conference on MultiMedia Modeling, MMM 2019, held in Thessaloniki, Greece, in January 2019.Of the 172 submitted full papers, 49 were selected for oral presentation and 47 for poster presentation; in addition, 6 demonstration papers, 5 industry papers, 6 workshop papers, and 6 papers for the Video Browser Showdown 2019 were accepted. All papers presented were carefully reviewed and selected from 204 submissions.

Refine Search

Showing 23,226 through 23,250 of 53,912 results