Literatura académica sobre el tema "Algorithmes de passage en message"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Algorithmes de passage en message".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Algorithmes de passage en message"

1

Odorico, Paolo. "Le backgammon de Kékaumenos. À propos d’un passage peu clair et d’une bataille peu connue." Zbornik radova Vizantoloskog instituta, no. 50-1 (2013): 423–31. http://dx.doi.org/10.2298/zrvi1350423o.

Texto completo
Resumen
The Strat?gikon of Cecaumenus tells the story of Basil Pediadites, who has suffered the ironic attacks of the emperor for having played tavla during his mission in Sicily. The message, rather strange, is explained in a different way: in the imperial message the issue was a pun, concerning tavla and a locality in the plain, which could be identified with current Piano Tavola near Catania.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Samet, Nili. "How Deterministic is Qohelet? A New Reading of the Appendix to the Catalogue of Times." Zeitschrift für die alttestamentliche Wissenschaft 131, no. 4 (2019): 577–91. http://dx.doi.org/10.1515/zaw-2019-4004.

Texto completo
Resumen
Abstract This paper examines the message of Qohelet’s Catalogue of Times and its interpretive appendix. Scholars disagree on the extent to which this unit deviates from the traditional free-will theology of the Bible. The paper presents a fresh reading of the passage, which sheds new light on the problem of determinism in Qohelet. Beginning by a novel delineation for the unit, it then suggests fresh solutions for the main exegetical cruxes of the passage (3:14, 15, 17), and finally presents an innovative, somewhat radical, understanding of Qohelet’s approach towards the problem of free will.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

FUJII, SEIJI. "Political Shirking – Proposition 13 vs. Proposition 8." Japanese Journal of Political Science 10, no. 2 (2009): 213–37. http://dx.doi.org/10.1017/s1468109909003533.

Texto completo
Resumen
AbstractThis paper considers the efficiency of the political market in the California State legislature. I analyzed the property tax limitation voter initiative, Proposition 13. I found that districts which supported Proposition 13 more strongly were more likely to oppose the incumbents regardless of whether the incumbents had the different preferences for property taxes from their districts. I also studied how legislators voted on the bills adopted after the passage of Proposition 13 to finance local governments. I found that legislators tended to follow the constituents’ will after they rece
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Rotman, Marco. "The “Others” Coming to John the Baptist and the Text of Josephus." Journal for the Study of Judaism 49, no. 1 (2018): 68–83. http://dx.doi.org/10.1163/15700631-12491167.

Texto completo
Resumen
Abstract Josephus’s passage on John the Baptist (Ant. 18.116-119) contains a much-discussed crux interpretum: who are the “others” that are inspired by John’s words and ready to do everything he said (§118), and who are distinguished from those who gave heed to his message and were baptized (§117)? After a brief discussion of the textual witnesses, text, and translation of the passage in question, various interpretations of “the others” are discussed, none of which is entirely satisfactory. In this article a case will be made for accepting the conjecture originally proposed by Benedikt Niese,
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Zorn, Jean-François. "Exégèse, herméneutique et actualisation : étapes successives ou interaction dynamique ? La notion d'exégèse homilétique." Études théologiques et religieuses 75, no. 4 (2000): 549–63. http://dx.doi.org/10.3406/ether.2000.3620.

Texto completo
Resumen
The use of a step by step method is necessary for the preparation of a sermon. One method suggests that every serious preacher needs to follow a three-step process : Exegesis, Interpretation, and Application. With the help of research done by experts in semiotics and homiletics, J.-F. Zorn shows how this method neglects the preacher who reads the Bible passage as well as the audience who listens to his sermon. When these two factors are taken into consideration during the preparation of a sermon, these three steps are viewed differently. They become interactive operations that are capable of r
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Garrett, Thomas More. "The Message to the Merchants in James 4:13–17 and Its Relevance for Today." Journal of Theological Interpretation 10, no. 2 (2016): 299–315. http://dx.doi.org/10.2307/26373919.

Texto completo
Resumen
ABSTRACT This article highlights the contemporary significance of Jas 4:13–17 to business and commercial pursuits. The first part summarizes modern biblical and theological scholarship on the scriptural passage. The discussion highlights areas of convergence within different Christian traditions by examining the work of commentators writing from a variety of Christian backgrounds. The second part offers a treatment of the passage within the wider context of the epistle. Drawing from modern commentary, this part of the essay also elaborates on the relationship between faith and secular pursuits
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Garrett, Thomas More. "The Message to the Merchants in James 4:13–17 and Its Relevance for Today." Journal of Theological Interpretation 10, no. 2 (2016): 299–315. http://dx.doi.org/10.2307/jtheointe.10.2.0299.

Texto completo
Resumen
ABSTRACT This article highlights the contemporary significance of Jas 4:13–17 to business and commercial pursuits. The first part summarizes modern biblical and theological scholarship on the scriptural passage. The discussion highlights areas of convergence within different Christian traditions by examining the work of commentators writing from a variety of Christian backgrounds. The second part offers a treatment of the passage within the wider context of the epistle. Drawing from modern commentary, this part of the essay also elaborates on the relationship between faith and secular pursuits
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Schmidl, Martina. "Ad astra: Graphic Signalling in the Acrostic Hymn of Nebuchadnezzar II (BM 55469)." Altorientalische Forschungen 48, no. 2 (2021): 318–26. http://dx.doi.org/10.1515/aofo-2021-0021.

Texto completo
Resumen
Abstract This article examines two orthographic features in the Acrostic Hymn of Nebuchadnezzar II. It aims to show that the text makes use of the possibilities of the cuneiform writing system to create various levels of meaning. The first example clarifies structure and content with regard to a difficult passage in the fourth and last stanza of the text, in which a possible change of actors is indicated by an orthographic feature. The second example shows how orthography is used in the first stanza of the text to augment its message. These examples demonstrate how structural elements and micr
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Cauchie, Jean-François, Patrice Corriveau, and Alexandre Pelletier-Audet. "Le suicide de jeunes québécois.es : une analyse communicationnelle de 138 lettres d’adieu (1940-1970)1." Reflets 28, no. 1 (2023): 93–120. http://dx.doi.org/10.7202/1100221ar.

Texto completo
Resumen
Notre article porte sur les lettres d’adieu de 72 Québécois.es entre 20 et 30 ans qui se sont enlevé la vie durant les années 1940-1970. Les 138 lettres étudiées, qui proviennent des Archives du Coroner du district judiciaire de la ville de Montréal, sont approchées dans une perspective que nous qualifions de communicationnelle. Après avoir dégagé cinq idéaux-types selon que le sens du message est de type introspectif ou dyadique par rapport au passage à l’acte, nous mettons en évidence le foisonnement et la multidirectionnalité des thèmes que les individus investissent pour établir leur moi p
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Vatta, Francesca, Alessandro Soranzo, Massimiliano Comisso, Giulia Buttazzoni та Fulvio Babich. "A Survey on Old and New Approximations to the Function ϕ(x) Involved in LDPC Codes Density Evolution Analysis Using a Gaussian Approximation". Information 12, № 5 (2021): 212. http://dx.doi.org/10.3390/info12050212.

Texto completo
Resumen
Low Density Parity Check (LDPC) codes are currently being deeply analyzed through algorithms that require the capability of addressing their iterative decoding convergence performance. Since it has been observed that the probability distribution function of the decoder’s log-likelihood ratio messages is roughly Gaussian, a multiplicity of moderate entanglement strategies to this analysis has been suggested. The first of them was proposed in Chung et al.’s 2001 paper, where the recurrent sequence, characterizing the passage of messages between variable and check nodes, concerns the function ϕ(x
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Algorithmes de passage en message"

1

Taftaf, Ala. "Développements du modèle adjoint de la différentiation algorithmique destinés aux applications intensives en calcul." Thesis, Université Côte d'Azur (ComUE), 2017. http://www.theses.fr/2017AZUR4001/document.

Texto completo
Resumen
Le mode adjoint de la Différentiation Algorithmique (DA) est particulièrement intéressant pour le calcul des gradients. Cependant, ce mode utilise les valeurs intermédiaires de la simulation d'origine dans l'ordre inverse à un coût qui augmente avec la longueur de la simulation. La DA cherche des stratégies pour réduire ce coût, par exemple en profitant de la structure du programme donné. Dans ce travail, nous considérons d'une part le cas des boucles à point-fixe pour lesquels plusieurs auteurs ont proposé des stratégies adjointes adaptées. Parmi ces stratégies, nous choisissons celle de B. C
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

De, Bacco Caterina. "Decentralized network control, optimization and random walks on networks." Thesis, Paris 11, 2015. http://www.theses.fr/2015PA112164/document.

Texto completo
Resumen
Dans les dernières années, plusieurs problèmes ont été étudiés à l'interface entre la physique statistique et l'informatique. La raison étant que, souvent, ces problèmes peuvent être réinterprétés dans le langage de la physique des systèmes désordonnés, où un grand nombre de variables interagit à travers champs locales qui dépendent de l'état du quartier environnant. Parmi les nombreuses applications de l'optimisation combinatoire le routage optimal sur les réseaux de communication est l'objet de la première partie de la thèse. Nous allons exploiter la méthode de la cavité pour formuler des al
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Barbier, Jean. "Statistical physics and approximate message-passing algorithms for sparse linear estimation problems in signal processing and coding theory." Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCC130.

Texto completo
Resumen
Cette thèse s’intéresse à l’application de méthodes de physique statistique des systèmes désordonnés ainsi que de l’inférence à des problèmes issus du traitement du signal et de la théorie du codage, plus précisément, aux problèmes parcimonieux d’estimation linéaire. Les outils utilisés sont essentiellement les modèles graphiques et l’algorithme approximé de passage de messages ainsi que la méthode de la cavité (appelée analyse de l’évolution d’état dans le contexte du traitement de signal) pour son analyse théorique. Nous aurons également recours à la méthode des répliques de la physique des
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Aubin, Benjamin. "Mean-field methods and algorithmic perspectives for high-dimensional machine learning." Thesis, université Paris-Saclay, 2020. http://www.theses.fr/2020UPASP083.

Texto completo
Resumen
À une époque où l'utilisation des données a atteint un niveau sans précédent, l'apprentissage machine, et plus particulièrement l'apprentissage profond basé sur des réseaux de neurones artificiels, a été responsable de très importants progrès pratiques. Leur utilisation est désormais omniprésente dans de nombreux domaines d'application, de la classification d'images à la reconnaissance vocale en passant par la prédiction de séries temporelles et l'analyse de texte. Pourtant, la compréhension de nombreux algorithmes utilisés en pratique est principalement empirique et leur comportement reste di
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Sahin, Serdar. "Advanced receivers for distributed cooperation in mobile ad hoc networks." Thesis, Toulouse, INPT, 2019. http://www.theses.fr/2019INPT0089.

Texto completo
Resumen
Les réseaux ad hoc mobiles (MANETs) sont des systèmes de communication sans fil rapidement déployables et qui fonctionnent avec une coordination minimale, ceci afin d'éviter les pertes d'efficacité spectrale induites par la signalisation. Les stratégies de transmissions coopératives présentent un intérêt pour les MANETs, mais la nature distribuée de tels protocoles peut augmenter le niveau d'interférence avec un impact autant plus sévère que l'on cherche à pousser les limites des efficacités énergétique et spectrale. L'impact de l'interférence doit alors être réduit par l'utilisation d'algorit
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Saade, Alaa. "Spectral inference methods on sparse graphs : theory and applications." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE024/document.

Texto completo
Resumen
Face au déluge actuel de données principalement non structurées, les graphes ont démontré, dans une variété de domaines scientifiques, leur importance croissante comme language abstrait pour décrire des interactions complexes entre des objets complexes. L’un des principaux défis posés par l’étude de ces réseaux est l’inférence de propriétés macroscopiques à grande échelle, affectant un grand nombre d’objets ou d’agents, sur la seule base des interactions microscopiquesqu’entretiennent leurs constituants élémentaires. La physique statistique, créée précisément dans le but d’obtenir les lois mac
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Diaconu, Raluca. "Passage à l'échelle pour les mondes virtuels." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066090.

Texto completo
Resumen
La réalité mixe, les jeux en ligne massivement multijoueur (MMOGs), les mondes virtuels et le cyberespace sont des concepts extrêmement attractifs. Mais leur déploiement à large échelle reste difficile et il est en conséquence souvent évité.La contribution principale de la thèse réside dans le système distribué Kiwano, qui permet à un nombre illimité d'avatars de peupler et d'interagir simultanément dans un même monde contigu. Dans Kiwano nous utilisons la triangulation de Delaunay pour fournir à chaque avatar un nombre constant de voisins en moyenne, indépendamment de leur densité ou distribu
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Diaconu, Raluca. "Passage à l'échelle pour les mondes virtuels." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066090/document.

Texto completo
Resumen
La réalité mixe, les jeux en ligne massivement multijoueur (MMOGs), les mondes virtuels et le cyberespace sont des concepts extrêmement attractifs. Mais leur déploiement à large échelle reste difficile et il est en conséquence souvent évité.La contribution principale de la thèse réside dans le système distribué Kiwano, qui permet à un nombre illimité d'avatars de peupler et d'interagir simultanément dans un même monde contigu. Dans Kiwano nous utilisons la triangulation de Delaunay pour fournir à chaque avatar un nombre constant de voisins en moyenne, indépendamment de leur densité ou distribu
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Kurisummoottil, Thomas Christo. "Sparse Bayesian learning, beamforming techniques and asymptotic analysis for massive MIMO." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS231.

Texto completo
Resumen
Des antennes multiples du côté de la station de base peuvent être utilisées pour améliorer l'efficacité spectrale et l'efficacité énergétique des technologies sans fil de nouvelle génération. En effet, le multi-entrées et sorties multiples massives (MIMO) est considéré comme une technologie prometteuse pour apporter les avantages susmentionnés pour la norme sans fil de cinquième génération, communément appelée 5G New Radio (5G NR). Dans cette monographie, nous explorerons un large éventail de sujets potentiels dans Multi-userMIMO (MU-MIMO) pertinents pour la 5G NR,• Conception de la formation
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Adjiman, Philippe. "Raisonnement pair-à-pair en logique propositionnelle : algorithmes, passage à l'échelle et applications." Paris 11, 2006. http://www.theses.fr/2006PA112128.

Texto completo
Resumen
Dans un système d'inférence pair-à-pair, chaque pair peut raisonner localement mais peut également solliciter son voisinage constitué des pairs avec lesquels il partage une partie de son vocabulaire. Une caractéristique importante des systèmes d'inférence pair-à-pair est que la théorie globale (l'union des théories de tous les pairs) n'est pas connue. La première contribution majeure de cette thèse est de proposer le premier algorithme de calcul de conséquence dans un environnement pair-à-pair : DeCA. L'algorithme calcul les conséquences graduellement en partant des pairs sollicités jusqu'aux
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Algorithmes de passage en message"

1

Laurent, Xavier William. Message Pour un Passage. Lulu Press, Inc., 2017.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Wilson, Walter T. The Gospel of Matthew. Wm. B. Eerdmans Publishing Co., 2022. http://dx.doi.org/10.5040/bci-0013.

Texto completo
Resumen
What was the original purpose of the Gospel of Matthew? For whom was it written? In this magisterial two-volume commentary, Walter Wilson interprets Matthew as a catechetical work that expresses the ideological and institutional concerns of a faction of disaffected Jewish followers of Jesus in the late first century CE. Wilson’s compelling thesis frames Matthew’s Gospel as not only a continuation of the biblical story but also as a didactic narrative intended to shape the commitments and identity of a particular group that saw itself as a beleaguered, dissident minority. Thus, the text clarifi
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Wilson, Walter T. The Gospel of Matthew. Wm. B. Eerdmans Publishing Co., 2022. http://dx.doi.org/10.5040/bci-0014.

Texto completo
Resumen
What was the original purpose of the Gospel of Matthew? For whom was it written? In this magisterial two-volume commentary, Walter Wilson interprets Matthew as a catechetical work that expresses the ideological and institutional concerns of a faction of disaffected Jewish followers of Jesus in the late first century CE. Wilson’s compelling thesis frames Matthew’s Gospel as not only a continuation of the biblical story but also as a didactic narrative intended to shape the commitments and identity of a particular group that saw itself as a beleaguered, dissident minority. Thus, the text clarifi
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Algorithmes de passage en message"

1

Soron, Antony. "Le Message d’Andrée Chedid ou la condition sine qua non du « bon passage »." In Le Bon Passage. Presses Universitaires de Bordeaux, 2016. http://dx.doi.org/10.4000/books.pub.15446.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Mclay, Mark. "The end? Poverty politics and the ‘Reagan Revolution’, 1977–81." In The Republican Party and the War on Poverty: 1964-1981. Edinburgh University Press, 2021. http://dx.doi.org/10.3366/edinburgh/9781474475525.003.0008.

Texto completo
Resumen
This chapter explores the impact of the ‘Reagan Revolution’ on the anti-poverty policies. It begins by charting Reagan’s path to the White House and how this was helped by a political environment that was turning away from government solutions to social problems. It shows how Reagan had been the War on Poverty’s chief opponent throughout his political career and that he was successful in continuing to prosecute his anti-welfare message during the 1980 election against Jimmy Carter. The heart of the chapter then shows how Reagan was able to put his anti-poverty message into policy, through the passage of the Omnibus Budget and Reconciliation Act (OBRA). In doing so, Reagan demonstrated his talent as a party leader and his skill as a communicator.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Katz, Wendy Jean. "Conclusion." In A True American. Fordham University Press, 2022. http://dx.doi.org/10.5422/fordham/9780823298563.003.0008.

Texto completo
Resumen
The conclusion considers the fate of the Walcutt’s portrait of Commodore Perry during the Colonial Revival of the early twentieth century, when Progressive-era elites turned to the colonial past to reassert cultural control. The 1928 bronze reproduction of Walcutt’s statue for the Capitol of Rhode Island was a sign of the recurrence of nativism in this later period, which saw the passage of stringent and racist immigration laws. But Walcutt’s “fiery” portrait style continued to carry Young America’s message of expanded rights for ordinary people. Rhode Island, a bastion of “old stock” rule, was transitioning to less restricted voting requirements, which for the first time permitted its Catholic majority to have a voice. So too Walcutt’s affiliation with the Taft family in Ohio reflects both the strength of nativism within the Republican party and internationalists’ reaction against it.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Murphy, Mary-Elizabeth B. "Introduction." In Jim Crow Capital. University of North Carolina Press, 2018. http://dx.doi.org/10.5149/northcarolina/9781469646725.003.0001.

Texto completo
Resumen
This introduction contextualizes black women’s politics within the historical and social landscape of political culture in black Washington. While African American women’s political activism stretched back to the seventeenth century, it was during the 1920s and 1930s that their political campaigns gained more visibility, and Washington, D.C. was a key location for this process. Inspired by the passage of the Nineteenth Amendment and emboldened by World War I’s message of democracy, black women formed partisan organizations, testified in Congress, weighed in on legislation, staged protest parades, and lobbied politicians. But in addition to their formal political activities, black women also waged informal politics by expressing workplace resistance, self-defense toward violence, and performances of racial egalitarianism, democracy, and citizenship in a city that very often denied them all of these rights. Jim Crow Capital connects black women’s formal and informal politics to illustrate the complexity of their activism.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Fleegler, Robert L. "Dukakis’s Triumph." In Brutal Campaign. University of North Carolina PressChapel Hill, NC, 2023. http://dx.doi.org/10.5149/northcarolina/9781469673370.003.0004.

Texto completo
Resumen
Abstract This chapter shows how Michael Dukakis’s staying power allowed him to win the Democratic nomination over a diverse field that included Paul Simon, Dick Gephardt, Al Gore, and Jesse Jackson. More of the major trends of modern politics became clear. Gephardt rode to victory in Iowa using a populist antitrade message that previewed a generation of politicians that would propose protectionist politics to appeal to working-class white voters. In addition, Jesse Jackson’s success created a brief moment where—for the first time-- it appeared a black candidate had an opportunity to win a major party nomination. Though Jackson fell short, his campaign represented a key middle point between the passage of the Voting Rights of 1965 and the election of Barack Obama in 2008. Eventually, Dukakis defeated Gore—who was trying to run as a more moderate Democrat—in New York to seal his victory.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Wu, Chuan-Kun. "Key Management." In IT Policy and Ethics. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2919-6.ch033.

Texto completo
Resumen
In secure communications, key management is not as simple as metal key management which is supposed to be in a key ring or simply put in a pocket. Suppose Alice wants to transmit some confidential information to Bob over the public networks such as the Internet, Alice could simply encrypt the message using a known cipher such as AES, and then transmit the ciphertext to Bob. However, in order to enable Bob to decrypt the ciphertext to get the original message, in traditional cipher system, Bob needs to have the encryption key. How to let Alice securely and efficiently transmit the encryption key to Bob is a problem of key management. An intuitive approach would be to use a secure channel for the key transmission; this worked in earlier years, but is not a desirable solution in today’s electronic world. Since the invention of public key cryptography, the key management problem with respect to secret key transmission has been solved, which can either employ the Diffie-Hellman key agreement scheme or to use a public key cryptographic algorithm to encrypt the encryption key (which is often known as a session key). This approach is secure against passive attacks, but is vulnerable against active attacks (more precisely the man-in-the-middle attacks). So there must be a way to authenticate the identity of the communication entities. This leads to public key management where the public key infrastructure (PKI) is a typical set of practical protocols, and there is also a set of international standards about PKI. With respect to private key management, it is to prevent keys to be lost or stolen. To prevent a key from being lost, one way is to use the secret sharing, and another is to use the key escrow technique. Both aspects have many research outcomes and practical solutions. With respect to keys being stolen, another practical solution is to use a password to encrypt the key. Hence, there are many password-based security protocols in different applications. This chapter presents a comprehensive description about how each aspect of the key management works. Topics on key management covered by this chapter include key agreement, group-based key agreement and key distribution, the PKI mechanisms, secret sharing, key escrow, password associated key management, and key management in PGP and UMTS systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Brescia, Ray. "Introduction." In The Future of Change. Cornell University Press, 2020. http://dx.doi.org/10.7591/cornell/9781501748110.003.0001.

Texto completo
Resumen
This introductory chapter details the story of the passage of the G.I. Bill, revealing how an adaptive grassroots network utilized all the media technologies available to it at the time in creative ways—from the mail and the telegraph to the radio and the cinema—to promote a positive, inclusive message and bring about social change. Innovation in communications technologies created an opportunity for the American Legion; it had at its disposal a vast array of tools to not just communicate with but also coordinate the efforts of its vast network of local chapters to promote adoption of the program. This connection between communications technology and a social movement is not accidental. U.S. history reveals the deep relationship between social change and innovation in the means of communication. Thus, this book examines the link between, on the one hand, innovations in communications technology and methods and, on the other, social movements that appear to have emerged in their wake. It also identifies the components of the successes and failures of these same movements that seem to have a symbiotic relationship to the technology that fuels them.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Krupa, Natalia. "Konserwacja jedwabnego obicia ze ścian kapitularza Archiwum Krakowskiej Kapituły Katedralnej – strategia zarządzania projektem ochrony." In Studia z dziejów katedry na Wawelu. Ksiegarnia Akademicka Publishing, 2023. http://dx.doi.org/10.12797/9788381389211.23.

Texto completo
Resumen
The primary protected values of historic objects include authenticity, integrity, andlegibility of historical communication. By analyzing a monument’s state of preservation,we can interpret the passage of time through the traces of its use, patina, ordamage. The protection of a monument must be preceded by a thorough understandingof its historical message and by defining the values it carries, as well as byidentifying the role of the object within a broader contextual framework. Only inthis manner can the value of the object be determined, along with its features andelements requiring protection.The implementation of the conservation project for the silk wall hanging from theChapter House of the Cracow Cathedral Chapter’s Archive provides a background fordiscussing the main principles of the preservation process management strategy, basedon the identification of threats, care plans, and monitoring of the risk of deteriorationof the monument. A proper preservation strategy for the accumulated material assetsentails responsibility for the quality of work and research aimed at reconstructinghistorical facts and narratives. This responsibility takes on particular significance in thedays of ongoing debate within relevant communities regarding the current position onthe contemporary heritage conservation model.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Stein, Michael D., and Sandro Galea. "The Downside of Drinking." In Pained. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197510384.003.0060.

Texto completo
Resumen
This chapter addresses five potential reasons as to why alcohol, an ancient substance, seems to have become newly hazardous. First, the alcohol industry continues to be powerful and savvy. Industry advertising never says that alcohol is not addictive; rather, the message is “use responsibly,” which implies that alcohol’s use—unlike the use of drugs—is controllable. Second, although the proportion of Americans drinking has remained steady at about two in three people over the past 70 years, Americans are drinking more, and more easily. Third, during this decade of economic expansion, many Americans have more income. In contrast to the stereotype, affluent people are more likely to drink than low-income people. Fourth, binge-drinking is now a rite of passage in college. With women a growing percentage of collegiate heavy drinkers, and with alcohol-makers targeting women with sweeter and fizzier products, health risks accumulate among women, who generally experience greater alcohol effects at lower doses than men. Fifth, Americans have become complacent about driving under the influence, because seatbelts and safer cars have lowered alcohol-related fatalities. Yet, paradoxically, alcohol-related traffic accidents are on the rise. Consuming less alcohol in total or on a per-occasion basis would probably improve the health of most people. That is a credible and reasonable public health goal.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Koch, Christof. "Computing with Neurons: A Summary." In Biophysics of Computation. Oxford University Press, 1998. http://dx.doi.org/10.1093/oso/9780195104912.003.0027.

Texto completo
Resumen
We now have arrived at the end of the book. The first 16 chapters dealt with linear and nonlinear cable theory, voltage-dependent ionic currents, the biophysical origin of spike initiation and propagation, the statistical properties of spike trains and neural coding, bursting, dendritic spines, synaptic transmission and plasticity, the types of interactions that can occur among synaptic inputs in a passive or active dendritic arbor, and the diffusion and buffering of calcium and other ions. We attempted to weave these disparate threads into a single tapestry in Chaps. 17-19, demonstrating how these elements interact within a single neuron. The penultimate chapter dealt with various unconventional biophysical and biochemical mechanisms that could instantiate computations at the molecular and the network levels. It is time to summarize. What have we learned about the way brains do or do not compute? The brain has frequently been compared to a universal Turing machine (for a very lucid account of this, see Hofstadter, 1979). A Turing machine is a mathematical abstraction meant to clarify what is meant by algorithm, computation, and computable. Think of it as a machine with a finite number of internal states and an infinite tape that can read messages composed with a finite alphabet, write an output, and store intermediate results as memory. A universal Turing machine is one that can mimic any arbitrary Turing machine. We are here not interested in the renewed debate as to whether or not the brain can, in principle, be treated as such a machine (Lucas, 1964; Penrose, 1989), but whether this is a useful way to conceptualize nervous systems in this manner. Because brains have limited precision, only finite amounts of memory and do not live forever, they cannot possibly be like “real” Turing machines. It is therefore more appropriate to ask: to what extent can brains be treated as finite state machines or automata! Such a machine only has finite computational and memory resources (Hopcroft and Ullman, 1979). The answer has to be an ambiguous “it depends.”
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Algorithmes de passage en message"

1

Wanderley, Juan B. V., and Carlos Levi. "Free Surface Viscous Flow Around a Ship Model." In 25th International Conference on Offshore Mechanics and Arctic Engineering. ASMEDC, 2006. http://dx.doi.org/10.1115/omae2006-92165.

Texto completo
Resumen
The present stage of viscous flow numerical analysis combined with computer technology latest advances made viable the mathematical treatment of many robust and complex engineering problems of practical interest. Some numerical problems which solutions would be just unthinkable not more than ten years ago may be now dealt with in a reliable and fairly accurate manner. A truly example of this kind of problem would be the calculation of hydrodynamic loads acting on yawing ships. The solution of such a problem raises practical interest due to applications, for instance, as in the case of stationa
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Chen, J. P., and W. R. Briley. "A Parallel Flow Solver for Unsteady Multiple Blade Row Turbomachinery Simulations." In ASME Turbo Expo 2001: Power for Land, Sea, and Air. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/2001-gt-0348.

Texto completo
Resumen
A parallel flow solver has been developed to provide a turbomachinery flow simulation tool that extends the capabilities of a previous single–processor production code (TURBO) for unsteady turbomachinery flow analysis. The code solves the unsteady Reynolds-averaged Navier-Stokes equations with a k–ε turbulence model. The parallel code now includes most features of the serial production code, but is implemented in a portable, scalable form for distributed–memory parallel computers using MPI message passing. The parallel implementation employs domain decomposition and supports general multiblock
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Ji, Shanhong, and Feng Liu. "Computation of Flutter of Turbomachinery Cascades Using a Parallel Unsteady Navier-Stokes Code." In ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-043.

Texto completo
Resumen
A quasi-three-dimensional multigrid Navier-Stokes solver on single and multiple passage domains is presented for solving unsteady flows around oscillating turbine and compressor blades. The conventional “direct store” method is used for applying the phase-shifted periodic boundary condition over a single blade passage. A parallel version of the solver using the Message Passing Interface (MPI) standard is developed for multiple passage computations. In the parallel multiple passage computations, the phase-shifted periodic boundary condition is converted to simple in-phase periodic condition. Eu
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Esperanc¸a, Paulo T., Juan B. V. Wanderley, and Carlos Levi. "Validation of a Three-Dimensional Large Eddy Simulation Finite Difference Method to Study Vortex Induced Vibration." In 25th International Conference on Offshore Mechanics and Arctic Engineering. ASMEDC, 2006. http://dx.doi.org/10.1115/omae2006-92367.

Texto completo
Resumen
Two-dimensional numerical simulations of Vortex Induced Vibration have been failing to duplicate accurately the corresponding experimental data. One possible explanation could be 3D effects present in the real problem that are not modeled in two-dimensional simulations. A three-dimensional finite difference method was implemented using Large Eddy Simulation (LES) technique and Message Passage Interface (MPI) and can be run in a cluster with an arbitrary number of computers. The good agreement with other numerical and experimental data obtained from the literature shows the good quality of the
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Mašat, Milan, and Adéla Štěpánková. "A few notes on the book “Call me by your name” by André Aciman." In 7th International e-Conference on Studies in Humanities and Social Sciences. Center for Open Access in Science, Belgrade, 2021. http://dx.doi.org/10.32591/coas.e-conf.07.02011m.

Texto completo
Resumen
In the article we deal with the interpretation and analysis of selected topics and motives in the narrative of André Aciman’s publication Call me by your name. After a summary of the story, we take a closer look at the genesis of the two men’s relationships in the context of their Jewish faith. We also depict the transformation of their animal sexual relationship into a loving relationship associated with psychic harmony. The final passage of the article is devoted to the conclusion of the book, in which the message of the publication is anchored, which to a certain extent goes beyond the incl
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Zhou, F. B., M. D. Duta, M. P. Henry, S. Baker, and C. Burton. "Remote Condition Monitoring for Railway Point Machine." In ASME/IEEE 2002 Joint Rail Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/rtd2002-1646.

Texto completo
Resumen
This paper presents the research work carried out at Oxford University on condition monitoring of railway point machines. The developed condition monitoring system includes a variety of sensors for acquiring trackside data related to different parameters. Key events to be logged include time stamping of points operation, opening and closing of case cover associated with a points machine, insertion and removal of a hand-crank, loss of supply current and the passage of a train. The system also has built-in Web functions. This allows a remote operator using Internet Explorer to observe the condit
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!