Academic literature on the topic 'On the Operation of Daemons'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'On the Operation of Daemons.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "On the Operation of Daemons"

1

Lopera, Luis I. "Agents and Daemons, automating Data Quality Monitoring operations." Journal of Physics: Conference Series 396, no. 5 (December 13, 2012): 052050. http://dx.doi.org/10.1088/1742-6596/396/5/052050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Acosta-Silva, C., A. Delgado Peris, J. Flix, J. Frey, J. M. Hernández, A. Pérez-Calero Yzquierdo, and T. Tannenbaum. "Exploitation of network-segregated CPU resources in CMS." EPJ Web of Conferences 251 (2021): 02020. http://dx.doi.org/10.1051/epjconf/202125102020.

Full text
Abstract:
CMS is tackling the exploitation of CPU resources at HPC centers where compute nodes do not have network connectivity to the Internet. Pilot agents and payload jobs need to interact with external services from the compute nodes: access to the application software (CernVM-FS) and conditions data (Frontier), management of input and output data files (data management services), and job management (HTCondor). Finding an alternative route to these services is challenging. Seamless integration in the CMS production system without causing any operational overhead is a key goal. The case of the Barcelona Supercomputing Center (BSC), in Spain, is particularly challenging, due to its especially restrictive network setup. We describe in this paper the solutions developed within CMS to overcome these restrictions, and integrate this resource in production. Singularity containers with application software releases are built and pre-placed in the HPC facility shared file system, together with conditions data files. HTCondor has been extended to relay communications between running pilot jobs and HTCondor daemons through the HPC shared file system. This operation mode also allows piping input and output data files through the HPC file system. Results, issues encountered during the integration process, and remaining concerns are discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Emary, Clive. "Delayed feedback control in quantum transport." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 371, no. 1999 (September 28, 2013): 20120468. http://dx.doi.org/10.1098/rsta.2012.0468.

Full text
Abstract:
Feedback control in quantum transport has been predicted to give rise to several interesting effects, among them quantum state stabilization and the realization of a mesoscopic Maxwell's daemon. These results were derived under the assumption that control operations on the system are affected instantaneously after the measurement of electronic jumps through it. In this contribution, I describe how to include a delay between detection and control operation in the master equation theory of feedback-controlled quantum transport. I investigate the consequences of delay for the state stabilization and Maxwell's daemon schemes. Furthermore, I describe how delay can be used as a tool to probe coherent oscillations of electrons within a transport system and how this formalism can be used to model finite detector bandwidth.
APA, Harvard, Vancouver, ISO, and other styles
4

Chai, Wen Yan, Gang Fu, Ti Bai Xiao, and Qiao Yun Sun. "Construction of Virtual Petrochemical Enterprises Based on Virtual Reality Technology." Advanced Materials Research 739 (August 2013): 748–53. http://dx.doi.org/10.4028/www.scientific.net/amr.739.748.

Full text
Abstract:
As petrochemical production equipment with a high degree of risk, on-site training of operating staff and management has brought a great deal of difficulty. Therefore, this paper introduces our research and development work based on virtual reality technology to construct a virtual environment of petrochemical enterprises for on-site training of operating staff and management. To establish the virtual petrochemical enterprises, we adopted 3DMAX as a modeling tool, the VRP (Virtual Reality Platform) as a virtual reality platform as an operation platform. First of all, we create the various sub-scene of the area of petrochemical plants and do model integration and processing to result in the virtual scene with the virtual reality software. Then, we set interactive interface, allowing users to interact with the platform, which makes operations easier. We built-in virtual cameras and pre-recorded screen video to help play the presentation of the video content automatically, so that without human interaction will require. Finally, the role of script will blend with the real three-dimensional scene, the 2D panel and the daemon in order to obtain the true visual display. Therefore, the developed virtual petrochemical enterprise platform has a good show with its real intuitive.
APA, Harvard, Vancouver, ISO, and other styles
5

Thiong'o, Ngũgĩ Wa. "Power Daemons." World Literature Today 80, no. 5 (2006): 12. http://dx.doi.org/10.2307/40159181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

BERNABEI, R., P. BELLI, F. CAPPELLA, R. CERULLI, A. D'ANGELO, F. EMILIANI, and A. INCICCHITTI. "SEARCH FOR DAEMONS WITH NEMESIS." Modern Physics Letters A 27, no. 08 (March 14, 2012): 1250031. http://dx.doi.org/10.1142/s0217732312500319.

Full text
Abstract:
The DAEMONs (DArk Electric Matter Objects) have been suggested as a possible exotic component in cosmic rays able to contribute to the Dark Matter; they belong to the wide class of the Elementary Black Holes (EBH) deeply discussed in literature. A preliminary possible DAEMONs direct detection, at ≃3σ C.L., was originally suggested by the sea-level St. Petersburg experiment (SPb); a DAEMONs flux: (1.0±0.3) DAEMONs/(days m2 sr) can be derived. Here the results obtained by the sea-level NEMESIS experiment, which has exploited the same detection approach, are presented; they restrict the DAEMONs flux to be less than 0.32 DAEMONs/(days m2 sr) at 90% C.L.
APA, Harvard, Vancouver, ISO, and other styles
7

Han, Sang-Won, Su-Kyung Sung, and Byeong-Seok Shin. "Virtual Reality Simulation of High Tibial Osteotomy for Medical Training." Mobile Information Systems 2022 (August 5, 2022): 1–9. http://dx.doi.org/10.1155/2022/3055898.

Full text
Abstract:
The quality of surgical operation is very important for the patients’ safety and the reduction of aftereffects after surgery. To do this, practicing surgical operations is also increasingly important. Due to the development of hardware and simulation techniques such as virtual reality (VR), VR simulators have been developed as a method to train surgeons and medical students majoring in surgery. In addition, controllers that support various kinds of haptic feedback have also been developed for a more realistic and immersive user experience. In this study, we introduce a morphable haptic controller that provides geometric and tactile feedback to users and propose a VR simulation system using this controller. This system is designed to perform a high tibial osteotomy in a virtual environment. The morphable haptic controller attached to the system through the input mapping daemon provides the senses of multiple surgical instruments used in the simulation. As a result, the haptic controller achieves an outstanding result through an actual interaction between surgical tools and the surgical sites. We verified that this was effective in surgery training through orthopedic surgeons.
APA, Harvard, Vancouver, ISO, and other styles
8

Drobyshevski, E. M. "In searches for daemons." Physics of Atomic Nuclei 63, no. 6 (June 2000): 1037–41. http://dx.doi.org/10.1134/1.855745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bonazzi, Mauro. "Daemons in the Cave." Mnemosyne 73, no. 1 (January 20, 2020): 63–86. http://dx.doi.org/10.1163/1568525x-12342588.

Full text
Abstract:
Abstract The aim of the paper is to provide a unitary reading of Plutarch’s De genio Socratis by concentrating on the character of Epameinondas. Against those who claim that the philosophical speeches are the main theme of the dialogue, it is argued that Epameinondas, one of the speakers, also plays an active role in the liberation of Thebes. Against those who insist on the political action alone, it is shown that Epameinondas’ commitment is not the same as that of the other conspirators. His goal—like that of Plato and Socrates (as they are represented in the text)—is to take care of his fellow citizens, and lead them to moral virtue, in accordance with the divine order. This idea may appear piously unrealistic, but it clearly illustrates the merits and limits of Plato’s political philosophy.
APA, Harvard, Vancouver, ISO, and other styles
10

Hooper, Rowan. "Science, daemons and Dust." New Scientist 246, no. 3282 (May 2020): 26–27. http://dx.doi.org/10.1016/s0262-4079(20)30931-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "On the Operation of Daemons"

1

García, Chacón Alina. "The Complexity of angel-daemons and game isomorphism." Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/83905.

Full text
Abstract:
The analysis of the computational aspects of strategic situations is a basic field in Computer Sciences. Two main topics related to strategic games have been developed. First, introduction and analysis of a class of games (so called angel/daemon games) designed to asses web applications, have been considered. Second, the problem of isomorphism between strategic games has been analysed. Both parts have been separately considered. Angel-Daemon Games A service is a computational method that is made available for general use through a wide area network. The performance of web-services may fluctuate; at times of stress the performance of some services may be degraded (in extreme cases, to the point of failure). In this thesis uncertainty profiles and Angel-Daemon games are used to analyse servicebased behaviours in situations where probabilistic reasoning may not be appropriate. In such a game, an angel player acts on a bounded number of ¿angelic¿ services in a beneficial way while a daemon player acts on a bounded number of ¿daemonic¿ services in a negative way. Examples are used to illustrate how game theory can be used to analyse service-based scenarios in a realistic way that lies between over-optimism and over-pessimism. The resilience of an orchestration to service failure has been analysed - here angels and daemons are used to model services which can fail when placed under stress. The Nash equilibria of a corresponding Angel-Daemon game may be used to assign a ¿robustness¿ value to an orchestration. Finally, the complexity of equilibria problems for Angel-Daemon games has been analysed. It turns out that Angel-Daemon games are, at the best of our knowledge, the first natural example of zero-sum succinct games. The fact that deciding the existence of a pure Nash equilibrium or a dominant strategy for a given player is Sp 2-complete has been proven. Furthermore, computing the value of an Angel-Daemon game is EXP-complete. Thus, matching the already known complexity results of the corresponding problems for the generic families of succinctly represented games with exponential number of actions. Game Isomorphism The question of whether two multi-player strategic games are equivalent and the computational complexity of deciding such a property has been addressed. Three notions of isomorphisms, strong, weak and local have been considered. Each one of these isomorphisms preserves a different structure of the game. Strong isomorphism is defined to preserve the utility functions and Nash equilibria. Weak isomorphism preserves only the player preference relations and thus pure Nash equilibria. Local isomorphism preserves preferences defined only on ¿close¿ neighbourhood of strategy profiles. The problem of the computational complexity of game isomorphism, which depends on the level of succinctness of the description of the input games but it is independent of the isomorphism to consider, has been shown. Utilities in games can be given succinctly by Turing machines, boolean circuits or boolean formulas, or explicitly by tables. Actions can be given also explicitly or succinctly. When the games are given in general form, an explicit description of actions and a succinct description of utilities have been assumed. It is has been established that the game isomorphism problem for general form games is equivalent to the circuit isomorphism when utilities are described by Turing Machines; and to the boolean formula isomorphism problem when utilities are described by formulas. When the game is given in explicit form, it is has been proven that the game isomorphism problem is equivalent to the graph isomorphism problem. Finally, an equivalence classes of small games and their graphical representation have been also examined.
APA, Harvard, Vancouver, ISO, and other styles
2

Cardoso, Filho Carlos Antonio. "Máquinas, mônadas, daemons : uma breve história e filosofia da máquina universal de Turing." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/147078.

Full text
Abstract:
A máquina universal, ideia proposta por Alan Turing em 1936, seria uma máquina capaz de computar e executar qualquer máquina computável, vindo a ser tomada como um dos modelos abstratos do computador. Colocamos como problema a questão de saber o que pode uma máquina universal. Propomos dois modos de abordar a constituição de um pensamento sobre máquinas universais. O primeiro modo será desenvolvido através da construção de redes, no sentido que lhes é dado pela Teoria Ator-Rede. Com as redes teceremos uma narrativa histórica da máquina universal, com o intuito de mostrar que não há uma máquina universal, mas uma multiplicidade de máquinas, cada uma ligada e produzida por determinados coletivos que agregam as mais diversas forças, alianças e controvérsias envolvendo atores humanos e não-humanos. Esta história será realizada, primeiro, no âmbito de lógica e da matemática, e posteriormente em sua relação com linguagens de programação, engenharia de software e software livre. O segundo modo de constituição de um pensamento acerca de máquinas universais será dado por dobras, entendidas como procedimentos pelos quais o tempo dobrado, aproximando problemas, temporalidades e conceitos. Nas dobras a máquina universal será problematizada primeiro em sua relação com o pensamento na obra de Turing, segundo com o problema da interação e seus paralelos com as mônadas fechadas e abertas e, em terceiro, na relação estabelecida com a subjetividade através da figura do daemon e da concepção de uma cognição estendida.
The idea of "universal machine" was proposed by Alan Turing in 1936. The universal machine would be a machine able of computing and executing any computable machine, being taken as one abstract model of the computer. As a problem, we put the question about what can a universal machine do. We propose two ways to approach the creation of a thought about universal machines. The first mode will be developed through the construction of networks, in the sense given to them by the Actor-Network Theory. With the networks we will weave a historical narrative of the universal machine, in order to show that there is not a universal machine, but a multitude of machines, each linked and produced by certain groups that congregate the most diverse forces, alliances and disputes involving human and nohuman actors. This history will be made, first, in the context of logic and mathematics, and later in its relation to programming languages, software engineering and open source software. The second mode of thinking about universal machines will be made through folds, understood them as procedures by which time is folded, approaching problems, concepts and temporality. In the folds the universal machine will be problematized first in its relationship with the thought in the work of Turing, second, with the problem of interaction and its parallels with the open and closed monads and, thirdly, the relationship established with the subjectivity through the daemon figure and the concept of extended cognition.
APA, Harvard, Vancouver, ISO, and other styles
3

Julia, Anderson Anna Ansin. "Operation Information." Thesis, Linnéuniversitetet, Institutionen för hälso- och vårdvetenskap (HV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Woodhouse, Jennifer May. "Operation Belladonna." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15801/1/Jennifer_Woodhouse_Thesis.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Woodhouse, Jennifer May. "Operation Belladonna." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15801/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

West, David Reid. "Some cults of Greek goddesses and female daemons of oriental origin : especially in relation to the mythology of goddesses and demons in the Semitic world." Thesis, University of Glasgow, 1990. http://theses.gla.ac.uk/1263/.

Full text
Abstract:
In Chapter One we discuss the evidence for Mycenaean trade and colonisation in the Orient, and for oriental trade and colonisation in the Aegean and Greece. We begin with such subjects as archaeological artefacts, artistic motifs and styles of architecture, then consider the linguistic evidence, such as toponyms, personal names and the LA tablets. The evidence for contact is overwhelming. In Chapter Two we consider the evidence for Semitic motifs in the iconography, mythology and names of Greek goddesses connected with nature. Thus Semitic influence is clear in the case of Artemis and Rhea as lion-goddesses, Britomartis as a `Mistress of the Beasts', Leto as a goddess of the sacred palm, and Demeter as a mare-goddess. Reha seems to be partly Anatolian. Chapter Three is concerned with the goddess Athena and other avian daemons. We begin (Section A) by discussing the oriental origins of Athena's owl, snake, aegis and Gorgon, relying mainly upon the evidence of iconography. Then (Section B) we consider three epithets of Athena which seem very Semitic. Finally (Section C) we discuss the sirens, which are avian demonesses somewhat reminiscent of Athena's chthonian character. In Chapter Four we first analyse (Section A) as much of the character of the goddess Hekate as possible, in both iconography and literature. It is clear that Hekate is a very demonic goddess. Then (Section B) we discuss various theories concerning the origin of Hekate. The Anatolian theories in particular are unconvincing. The Semitic origin of Hekate is tested (Section C) with reference to the character and motifs of both E-S and W-S demons and demonesses. It is concluded that Hekate is an evolute of Lamashtu. Finally (Section D) other Greek chthonian daemons (e.g. Mormo, Empousa, Gello) are compared with both Hekate and Lamashtu. Some (e.g. Mormo, Empousa) are Greek daemons with Semitic motifs in their characters. We conclude that Lamia is another evolute of Lamashtu, and that Gello is derived from the Mesopotamian Gallu demon.
APA, Harvard, Vancouver, ISO, and other styles
7

Thornhill, Seth. "Budgeting facilities operation costs using the facilities operation model." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5612.

Full text
Abstract:
Approved for public release; distribution is unlimited.
E) uses the FOM for the same purpose. It then compares the two processes against historical data from Fiscal Year 2007-2010 to study how the DoN could use the FOM within the Program Objectives Memorandum (POM) development process. The results show the Navy would be well advised to continue its current methods to develop the POMs. The FOM is still in the process of development, and the methods used by the Navy today are providing more accurate, consistent forecasts for facility operations.
APA, Harvard, Vancouver, ISO, and other styles
8

Robinson, Dawn M. "Helping Veterans of Operation Enduring Freedom and Operation Iraqi Freedom." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6739.

Full text
Abstract:
Operation Enduring Freedom (OEF) and Operation Iraqi Freedom (OIF) created multiple challenges for the mental health of soldiers who served there. The local facility in this study determined there was a gap in providing OEF/OIF veterans assistance with mental health issues. The practice-focused question explored whether a training module for nurses would assist in the identification of signs and symptoms of mental health issues in OEF/OIF veterans, such as posttraumatic stress disorder, anxiety, depression, addictions, and suicidal/homicidal ideations, to help ensure timely referral for services. The project used Kolcaba's comfort theory as the basis for the training module. A pretest, training module, and posttest were created and administered to the expert panel. Results showed the training module contained information to assist nurses in identifying the signs and symptoms of mental health issues as well as educated the nurses on various interventions that were available for the veterans. It was determined by the expert panel that the training module should be implemented to assist in decreasing the gap in care for OEF/OIF veterans. This training module might support positive social change by empowering nurses to assist veterans with coping skills overcome mental health issues and lead positive and productive lives.
APA, Harvard, Vancouver, ISO, and other styles
9

Schneider, Ulrich Johannes. "Repräsentation und Operation." Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-149263.

Full text
Abstract:
Den Begriff "Dispositiv" hat Foucault nicht viel länger als den des "Archivs" benutzt. Nach seinem eigenen Bekenntnis sind Begriffe nur "Werkzeuge" des Analysierens, einer methodologischen Fixierung war er grundsätzlich abhold und privilegierte lieber die Erfindung passender Kategorien im konkreten Zusammenhang historischer Forschungen. Vom Dispositiv spricht er am ausführlichsten im Zusammenhang mit seinem Spätwerk, der "Geschichte der Sexualität". Der Begriff ist jenseits dieses Verwendungszusammenhangs allerdings auch anderweitig erfolgreich benutzt worden, und kann auch im hier angesprochenen Zusammenhang eine gewisse Geltung beanspruchen. Als Dispositiv kann eine Bibliothek im Foucaultschen Sinne angesehen werden, wenn institutionelle, administrative und architektonische Gesichtspunkte im Sinne eines Ensembles oder eines Netzwerks rekonstruierbar sind. Dafür liegen in Wolfenbüttel jedenfalls eine Reihe von historischen Zeugnissen vor. Oie Bibliothek als Dispositiv zu verstehen, bedeutet weiterhin, das intellektuelle Unternehmen ihrer Anlage und Disposition, ihrer Vermehrung und ihrer Verfügbarkeit, im Zusammenhang mit administrativen, institutionellen Maßnahmen und allgemein einer Politik ihrer Handhabung zu sehen.
APA, Harvard, Vancouver, ISO, and other styles
10

Hultberg, Niklas. "Operation Rolling Thunder." Thesis, Försvarshögskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-4096.

Full text
Abstract:
This paper provides an explanation of the concepts John A. Warden III describes regarding the use of air power and if this theory can be found, within the confines of an unconventional war. The U.S. ability to air power is overwhelming, however the right kind of warfare can force this great power to abandon their military and political objectives by exhausting its resources over time as it becomes increasingly costly, both economically, politically and morally, to wage war. The research deals with operation Rolling Thunder and John A. Warden IIIs theory in relation to this massive bombing campaign. Firstly, you will find an analysis of John. A. Warden III's works. Five concepts can be found: Airspace Control, center of gravity, air interdiction, the enemy as a system and parallel attack. Secondly, a content analysis of relevant literature in the context of a case study on Operation Rolling Thunder. Thirdly a comparative analysis between the two results with a subsequent discussion relating the main problem and an effort is made to determine the outcome of the investigation and if the purpose of this paper has been met. Within the implementation phases of Operation Rolling Thunder, it is possible to distinguish som of Wardens key concepts regarding air power utilization. Even though the four phases illustrate a continuous change in strategy, Wardens theory The Enemy as a system was never implemented.
Denna uppsats ger en förklaring av John A. Warden IIIs teori om nyttjande av luftmakt och de begrepp som utgör grunden för denna. Frågan om grundbegreppen går att återfinna inom ramarna för ett otraditionellt krig tas upp. USAs förmåga till luftmakt är stor, men med rätt sorts krigföring kan även denna makt tvingas överge sina militära och politiska mål genom utmattning över en längre tidsperiod eftersom det blir allt dyrare, både ekonomiskt, politiskt och moraliskt, att föra krig. Här avhandlas operationen Rolling Thunder och John A. Warden IIIs teoris anknytning till denna enorma bombkampanj. Inledningsvis återfinns en innehållsanalys av John. A. Warden IIIs litteratur, vilket utmynnar i fem begrepp: Luftrumskontroll, tyngdpunkter, flyganfall på djupet, fienden som ett system och parallell attack. Efter det följer en innehållsanalys av relevant litteratur inom ramen för en fallstudie om Rolling Thunder och slutligen påträffas en komparativ analys mellan de två resultaten och en efterföljande diskussion knyter an till problemformuleringen och försöker utröna resultatet av undersökningen och om syftet med uppsatsen uppfyllts. I genomförandefaserna av Operation Rolling Thunder är det möjligt att urskilja vissa av Wardens centrala begrepp och tankar om luftmaktens nyttjande, men hans teori som helhet går inte att återfinna i genomförandet av Rolling Thunder. Trots att de fyra faserna åskådliggör en upprepad förändring i strategi, användes aldrig Wardens teori om fienden som ett system.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "On the Operation of Daemons"

1

Sloman, Robert. The daemons. London: Titan Books, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bacon-Smith, Camille. Daemons, Inc. New York: Science Fiction Book Club, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gavin, Thorpe, ed. Chaos daemons. Nottingham: Games Workshop, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bacon-Smith, Camille. Daemons, Inc. New York: Science Fiction Book Club, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Counter Daemons. Brooklyn, USA: Litmus Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Green, Simon R. Daemons Are Forever. New York: Penguin Group (USA), Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Green, Simon R. Daemons are forever. New York: Roc, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Some Mantic Daemons. New York, USA: Futurepoem Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Daemons are forever. London: Gollancz, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Copyright Paperback Collection (Library of Congress), ed. A legacy of daemons. New York: DAW Books, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "On the Operation of Daemons"

1

Edge, Charles, and Daniel O’Donnell. "Services, Daemons, and Processes." In Enterprise Mac Security, 29–48. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1712-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cooper, Peter. "Networking, Sockets, and Daemons." In Beginning Ruby, 443–65. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2364-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Edge, Charles, William Barker, Beau Hunter, and Gene Sullivan. "Services, Daemons, and Processes." In Enterprise Mac Security, 29–47. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2731-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vashurkin, Volodymyr. "Daemons at a Glance." In macOS Daemonology, 43–44. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7277-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saif, Liana. "Celestial Souls and Cosmic Daemons." In The Arabic Influences on Early Modern Occult Philosophy, 172–94. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137399472_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Hai-yan, and Xin-ming Li. "Embedded Operating System Design: The Resolved and Intelligent Daemon Approach." In Embedded Software and Systems, 412–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11535409_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hecht, Christine. "Porphyry’s daemons as a threat for the Christians." In Platonism and Christian Thought in Late Antiquity, 49–60. First [edition]. | New York : Routledge, 2019. | Series: Studies in philosophy and theology in late antiquity: Routledge, 2019. http://dx.doi.org/10.4324/9780429440465-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Junchong. "Operation and Operation Analysis." In Marine Nuclear Power Technology, 361–78. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2894-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wohlin, Claes, Per Runeson, Martin Höst, Magnus C. Ohlsson, Björn Regnell, and Anders Wesslén. "Operation." In Experimentation in Software Engineering, 117–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29044-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hinsch, Martin. "Operation." In ISO 9001:2015 for Everyday Operations, 35–47. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-25550-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "On the Operation of Daemons"

1

Briggs, Pamela, and Patrick L. Olivier. "Biometric daemons." In Proceeding of the twenty-sixth annual CHI conference extended abstracts. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1358628.1358699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Song, Yantao, and Scott M. Pike. "Eventually k-Bounded Wait-Free Distributed Daemons." In 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07). IEEE, 2007. http://dx.doi.org/10.1109/dsn.2007.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Manadhata, Pratyusa, Jeannette Wing, Mark Flynn, and Miles McQueen. "Measuring the attack surfaces of two FTP daemons." In the 2nd ACM workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1179494.1179497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Drobyshevski, Edward. "Detection and study of dark electric matter objects (daemons)." In International Workshop on Astroparticle and High Energy Physics. Trieste, Italy: Sissa Medialab, 2003. http://dx.doi.org/10.22323/1.010.0077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

de Jong, P. "The Ubik configurator: A fusion of messages, daemons, and rules." In the 1988 ACM SIGPLAN workshop. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/67386.67443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Holliday, M. A. "Reference history, page size, and migration daemons in local/remote architectures." In the third international conference. New York, New York, USA: ACM Press, 1989. http://dx.doi.org/10.1145/70082.68192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

DROBYSHEVSKI, E. M. "DARK ELECTRIC MATTER OBJECTS (DAEMONs) AND SOME POSSIBILITIES OF THEIR DETECTION." In Proceedings of the First International Workshop on Particle Physics and the Early Universe. WORLD SCIENTIFIC, 1998. http://dx.doi.org/10.1142/9789814447263_0030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Paolini, Christopher P., and Subrata Bhattacharjee. "The IGE Model: An Extension of the Ideal Gas Model to Include Chemical Composition as Part of the Equilibrium State." In ASME 2010 International Mechanical Engineering Congress and Exposition. ASMEDC, 2010. http://dx.doi.org/10.1115/imece2010-40762.

Full text
Abstract:
The TEST (The Expert System for Thermodynamics, www.thermofluids.net) web portal is a comprehensive thermodynamic courseware consisting of multimedia problems and examples, an online solution manual for educators, traditional thermodynamic charts and tables, fifteen chapters of animations to illustrate thermodynamic systems and fundamental concepts, and a suite of thermodynamic calculators called daemons for evaluating thermodynamic properties and analyzing thermodynamic problems.. The state module offers Java applets for evaluation of thermodynamic states of different working substances grouped into several material models according to underlying assumptions. Gas mixtures are modeled by the perfect gas (PG) or ideal gas (IG) mixture models. In this work, we extend the IG model mixture model into an ideal gas equilibrium (IGE) mixture model by incorporating chemical equilibrium calculations as part of the state evaluation process. Through a simple graphical interface users can set the atomic composition of a gas mixture. In the state panel, the known thermodynamic properties are entered. For a given pressure and temperature, the mixture’s Gibbs function is minimized subject to atomic constraints and the equilibrium composition along with thermodynamic properties of the mixture are calculated and displayed. What is unique about this approach is that equilibrium computations are performed in the background, without requiring any major change in the familiar user interface used in other state daemons. Properties calculated by this equilibrium state daemon are compared with results from other established applications such as NASA CEA and STANJAN. Also, two different algorithms, an iterative approach and a direct approach based on minimizing different thermodynamic functions in different situation are compared.
APA, Harvard, Vancouver, ISO, and other styles
9

Hill, Mary C. "SMOOTH INTEGRATION OF MODELS AND DATA INTO UNCERTAINTY AND RISK ANALYSIS: ADVANTAGES PROVIDED BY REDUCING NUMERICAL DAEMONS." In GSA Annual Meeting in Denver, Colorado, USA - 2016. Geological Society of America, 2016. http://dx.doi.org/10.1130/abs/2016am-283332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

De Almeida Souza, Gabriel, and José Jean-Paul Zanlucchi de Souza Tavares. "Battery Charge And Source Estimation As A Product Component." In Congresso Brasileiro de Automática - 2020. sbabra, 2020. http://dx.doi.org/10.48011/asba.v2i1.1620.

Full text
Abstract:
This paper's goal is to present a low cost, non-conventional solution for battery state of charge estimation and external electrical input presence/absence for a commercial mobile, handheld device whose battery state of charge control is critical. This solution is based on treating and filtering a time series in real-time software, using the battery pack characteristic discharge curve and time series statistical features. The time series is composed of data that is sampled embedded in hardware, communicating directly with the machine's BIOS. The system processes this data and outputs a value that indirectly relates to state of charge, needing further processing to insure accuracy. The data stream is treated in a process that directly relates the output time series with state of charge through a transfer function, effectively treating intermediary conversions as black boxes to simplify analysis and implementation. This process can also detect if an external source is connected/disconnected by exploiting pre-detected features in the time series. This approachadvantages are its low cost and simplicity, reducing hardware complexity and expenses; small dimensional footprint; mostly software-based; and centralization into the main hardware as low computational cost daemons, simplifying data consumption.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "On the Operation of Daemons"

1

Tran, Nhan V. Angles and Daemons: Spin Correlations at the LHC. Office of Scientific and Technical Information (OSTI), September 2011. http://dx.doi.org/10.2172/1248349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mason, Gerald A. Operation Starvation. Fort Belvoir, VA: Defense Technical Information Center, February 2002. http://dx.doi.org/10.21236/ada420650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meade, Roger. Operation Greenhouse. Office of Scientific and Technical Information (OSTI), July 2021. http://dx.doi.org/10.2172/1805714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meade, Roger. Operation Ivy. Office of Scientific and Technical Information (OSTI), September 2021. http://dx.doi.org/10.2172/1821343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meade, Roger. Operation Castle. Office of Scientific and Technical Information (OSTI), September 2021. http://dx.doi.org/10.2172/1822703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Meade, Roger. Operation Teapot. Office of Scientific and Technical Information (OSTI), February 2022. http://dx.doi.org/10.2172/1846889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Meade, Roger. Operation Plumbbob. Office of Scientific and Technical Information (OSTI), May 2022. http://dx.doi.org/10.2172/1870610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Meade, Roger. Operation Redwing. Office of Scientific and Technical Information (OSTI), June 2022. http://dx.doi.org/10.2172/1872321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Meade, Roger. Operation Dominic. Office of Scientific and Technical Information (OSTI), September 2022. http://dx.doi.org/10.2172/1889954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meade, Roger. Operation Fishbowl. Office of Scientific and Technical Information (OSTI), October 2022. http://dx.doi.org/10.2172/1896391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography