Добірка наукової літератури з теми "On the Operation of Daemons"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "On the Operation of Daemons".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "On the Operation of Daemons"

1

Lopera, Luis I. "Agents and Daemons, automating Data Quality Monitoring operations." Journal of Physics: Conference Series 396, no. 5 (December 13, 2012): 052050. http://dx.doi.org/10.1088/1742-6596/396/5/052050.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Acosta-Silva, C., A. Delgado Peris, J. Flix, J. Frey, J. M. Hernández, A. Pérez-Calero Yzquierdo, and T. Tannenbaum. "Exploitation of network-segregated CPU resources in CMS." EPJ Web of Conferences 251 (2021): 02020. http://dx.doi.org/10.1051/epjconf/202125102020.

Повний текст джерела
Анотація:
CMS is tackling the exploitation of CPU resources at HPC centers where compute nodes do not have network connectivity to the Internet. Pilot agents and payload jobs need to interact with external services from the compute nodes: access to the application software (CernVM-FS) and conditions data (Frontier), management of input and output data files (data management services), and job management (HTCondor). Finding an alternative route to these services is challenging. Seamless integration in the CMS production system without causing any operational overhead is a key goal. The case of the Barcelona Supercomputing Center (BSC), in Spain, is particularly challenging, due to its especially restrictive network setup. We describe in this paper the solutions developed within CMS to overcome these restrictions, and integrate this resource in production. Singularity containers with application software releases are built and pre-placed in the HPC facility shared file system, together with conditions data files. HTCondor has been extended to relay communications between running pilot jobs and HTCondor daemons through the HPC shared file system. This operation mode also allows piping input and output data files through the HPC file system. Results, issues encountered during the integration process, and remaining concerns are discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Emary, Clive. "Delayed feedback control in quantum transport." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 371, no. 1999 (September 28, 2013): 20120468. http://dx.doi.org/10.1098/rsta.2012.0468.

Повний текст джерела
Анотація:
Feedback control in quantum transport has been predicted to give rise to several interesting effects, among them quantum state stabilization and the realization of a mesoscopic Maxwell's daemon. These results were derived under the assumption that control operations on the system are affected instantaneously after the measurement of electronic jumps through it. In this contribution, I describe how to include a delay between detection and control operation in the master equation theory of feedback-controlled quantum transport. I investigate the consequences of delay for the state stabilization and Maxwell's daemon schemes. Furthermore, I describe how delay can be used as a tool to probe coherent oscillations of electrons within a transport system and how this formalism can be used to model finite detector bandwidth.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Chai, Wen Yan, Gang Fu, Ti Bai Xiao, and Qiao Yun Sun. "Construction of Virtual Petrochemical Enterprises Based on Virtual Reality Technology." Advanced Materials Research 739 (August 2013): 748–53. http://dx.doi.org/10.4028/www.scientific.net/amr.739.748.

Повний текст джерела
Анотація:
As petrochemical production equipment with a high degree of risk, on-site training of operating staff and management has brought a great deal of difficulty. Therefore, this paper introduces our research and development work based on virtual reality technology to construct a virtual environment of petrochemical enterprises for on-site training of operating staff and management. To establish the virtual petrochemical enterprises, we adopted 3DMAX as a modeling tool, the VRP (Virtual Reality Platform) as a virtual reality platform as an operation platform. First of all, we create the various sub-scene of the area of petrochemical plants and do model integration and processing to result in the virtual scene with the virtual reality software. Then, we set interactive interface, allowing users to interact with the platform, which makes operations easier. We built-in virtual cameras and pre-recorded screen video to help play the presentation of the video content automatically, so that without human interaction will require. Finally, the role of script will blend with the real three-dimensional scene, the 2D panel and the daemon in order to obtain the true visual display. Therefore, the developed virtual petrochemical enterprise platform has a good show with its real intuitive.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Thiong'o, Ngũgĩ Wa. "Power Daemons." World Literature Today 80, no. 5 (2006): 12. http://dx.doi.org/10.2307/40159181.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

BERNABEI, R., P. BELLI, F. CAPPELLA, R. CERULLI, A. D'ANGELO, F. EMILIANI, and A. INCICCHITTI. "SEARCH FOR DAEMONS WITH NEMESIS." Modern Physics Letters A 27, no. 08 (March 14, 2012): 1250031. http://dx.doi.org/10.1142/s0217732312500319.

Повний текст джерела
Анотація:
The DAEMONs (DArk Electric Matter Objects) have been suggested as a possible exotic component in cosmic rays able to contribute to the Dark Matter; they belong to the wide class of the Elementary Black Holes (EBH) deeply discussed in literature. A preliminary possible DAEMONs direct detection, at ≃3σ C.L., was originally suggested by the sea-level St. Petersburg experiment (SPb); a DAEMONs flux: (1.0±0.3) DAEMONs/(days m2 sr) can be derived. Here the results obtained by the sea-level NEMESIS experiment, which has exploited the same detection approach, are presented; they restrict the DAEMONs flux to be less than 0.32 DAEMONs/(days m2 sr) at 90% C.L.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Han, Sang-Won, Su-Kyung Sung, and Byeong-Seok Shin. "Virtual Reality Simulation of High Tibial Osteotomy for Medical Training." Mobile Information Systems 2022 (August 5, 2022): 1–9. http://dx.doi.org/10.1155/2022/3055898.

Повний текст джерела
Анотація:
The quality of surgical operation is very important for the patients’ safety and the reduction of aftereffects after surgery. To do this, practicing surgical operations is also increasingly important. Due to the development of hardware and simulation techniques such as virtual reality (VR), VR simulators have been developed as a method to train surgeons and medical students majoring in surgery. In addition, controllers that support various kinds of haptic feedback have also been developed for a more realistic and immersive user experience. In this study, we introduce a morphable haptic controller that provides geometric and tactile feedback to users and propose a VR simulation system using this controller. This system is designed to perform a high tibial osteotomy in a virtual environment. The morphable haptic controller attached to the system through the input mapping daemon provides the senses of multiple surgical instruments used in the simulation. As a result, the haptic controller achieves an outstanding result through an actual interaction between surgical tools and the surgical sites. We verified that this was effective in surgery training through orthopedic surgeons.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Drobyshevski, E. M. "In searches for daemons." Physics of Atomic Nuclei 63, no. 6 (June 2000): 1037–41. http://dx.doi.org/10.1134/1.855745.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Bonazzi, Mauro. "Daemons in the Cave." Mnemosyne 73, no. 1 (January 20, 2020): 63–86. http://dx.doi.org/10.1163/1568525x-12342588.

Повний текст джерела
Анотація:
Abstract The aim of the paper is to provide a unitary reading of Plutarch’s De genio Socratis by concentrating on the character of Epameinondas. Against those who claim that the philosophical speeches are the main theme of the dialogue, it is argued that Epameinondas, one of the speakers, also plays an active role in the liberation of Thebes. Against those who insist on the political action alone, it is shown that Epameinondas’ commitment is not the same as that of the other conspirators. His goal—like that of Plato and Socrates (as they are represented in the text)—is to take care of his fellow citizens, and lead them to moral virtue, in accordance with the divine order. This idea may appear piously unrealistic, but it clearly illustrates the merits and limits of Plato’s political philosophy.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hooper, Rowan. "Science, daemons and Dust." New Scientist 246, no. 3282 (May 2020): 26–27. http://dx.doi.org/10.1016/s0262-4079(20)30931-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "On the Operation of Daemons"

1

García, Chacón Alina. "The Complexity of angel-daemons and game isomorphism." Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/83905.

Повний текст джерела
Анотація:
The analysis of the computational aspects of strategic situations is a basic field in Computer Sciences. Two main topics related to strategic games have been developed. First, introduction and analysis of a class of games (so called angel/daemon games) designed to asses web applications, have been considered. Second, the problem of isomorphism between strategic games has been analysed. Both parts have been separately considered. Angel-Daemon Games A service is a computational method that is made available for general use through a wide area network. The performance of web-services may fluctuate; at times of stress the performance of some services may be degraded (in extreme cases, to the point of failure). In this thesis uncertainty profiles and Angel-Daemon games are used to analyse servicebased behaviours in situations where probabilistic reasoning may not be appropriate. In such a game, an angel player acts on a bounded number of ¿angelic¿ services in a beneficial way while a daemon player acts on a bounded number of ¿daemonic¿ services in a negative way. Examples are used to illustrate how game theory can be used to analyse service-based scenarios in a realistic way that lies between over-optimism and over-pessimism. The resilience of an orchestration to service failure has been analysed - here angels and daemons are used to model services which can fail when placed under stress. The Nash equilibria of a corresponding Angel-Daemon game may be used to assign a ¿robustness¿ value to an orchestration. Finally, the complexity of equilibria problems for Angel-Daemon games has been analysed. It turns out that Angel-Daemon games are, at the best of our knowledge, the first natural example of zero-sum succinct games. The fact that deciding the existence of a pure Nash equilibrium or a dominant strategy for a given player is Sp 2-complete has been proven. Furthermore, computing the value of an Angel-Daemon game is EXP-complete. Thus, matching the already known complexity results of the corresponding problems for the generic families of succinctly represented games with exponential number of actions. Game Isomorphism The question of whether two multi-player strategic games are equivalent and the computational complexity of deciding such a property has been addressed. Three notions of isomorphisms, strong, weak and local have been considered. Each one of these isomorphisms preserves a different structure of the game. Strong isomorphism is defined to preserve the utility functions and Nash equilibria. Weak isomorphism preserves only the player preference relations and thus pure Nash equilibria. Local isomorphism preserves preferences defined only on ¿close¿ neighbourhood of strategy profiles. The problem of the computational complexity of game isomorphism, which depends on the level of succinctness of the description of the input games but it is independent of the isomorphism to consider, has been shown. Utilities in games can be given succinctly by Turing machines, boolean circuits or boolean formulas, or explicitly by tables. Actions can be given also explicitly or succinctly. When the games are given in general form, an explicit description of actions and a succinct description of utilities have been assumed. It is has been established that the game isomorphism problem for general form games is equivalent to the circuit isomorphism when utilities are described by Turing Machines; and to the boolean formula isomorphism problem when utilities are described by formulas. When the game is given in explicit form, it is has been proven that the game isomorphism problem is equivalent to the graph isomorphism problem. Finally, an equivalence classes of small games and their graphical representation have been also examined.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Cardoso, Filho Carlos Antonio. "Máquinas, mônadas, daemons : uma breve história e filosofia da máquina universal de Turing." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/147078.

Повний текст джерела
Анотація:
A máquina universal, ideia proposta por Alan Turing em 1936, seria uma máquina capaz de computar e executar qualquer máquina computável, vindo a ser tomada como um dos modelos abstratos do computador. Colocamos como problema a questão de saber o que pode uma máquina universal. Propomos dois modos de abordar a constituição de um pensamento sobre máquinas universais. O primeiro modo será desenvolvido através da construção de redes, no sentido que lhes é dado pela Teoria Ator-Rede. Com as redes teceremos uma narrativa histórica da máquina universal, com o intuito de mostrar que não há uma máquina universal, mas uma multiplicidade de máquinas, cada uma ligada e produzida por determinados coletivos que agregam as mais diversas forças, alianças e controvérsias envolvendo atores humanos e não-humanos. Esta história será realizada, primeiro, no âmbito de lógica e da matemática, e posteriormente em sua relação com linguagens de programação, engenharia de software e software livre. O segundo modo de constituição de um pensamento acerca de máquinas universais será dado por dobras, entendidas como procedimentos pelos quais o tempo dobrado, aproximando problemas, temporalidades e conceitos. Nas dobras a máquina universal será problematizada primeiro em sua relação com o pensamento na obra de Turing, segundo com o problema da interação e seus paralelos com as mônadas fechadas e abertas e, em terceiro, na relação estabelecida com a subjetividade através da figura do daemon e da concepção de uma cognição estendida.
The idea of "universal machine" was proposed by Alan Turing in 1936. The universal machine would be a machine able of computing and executing any computable machine, being taken as one abstract model of the computer. As a problem, we put the question about what can a universal machine do. We propose two ways to approach the creation of a thought about universal machines. The first mode will be developed through the construction of networks, in the sense given to them by the Actor-Network Theory. With the networks we will weave a historical narrative of the universal machine, in order to show that there is not a universal machine, but a multitude of machines, each linked and produced by certain groups that congregate the most diverse forces, alliances and disputes involving human and nohuman actors. This history will be made, first, in the context of logic and mathematics, and later in its relation to programming languages, software engineering and open source software. The second mode of thinking about universal machines will be made through folds, understood them as procedures by which time is folded, approaching problems, concepts and temporality. In the folds the universal machine will be problematized first in its relationship with the thought in the work of Turing, second, with the problem of interaction and its parallels with the open and closed monads and, thirdly, the relationship established with the subjectivity through the daemon figure and the concept of extended cognition.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Julia, Anderson Anna Ansin. "Operation Information." Thesis, Linnéuniversitetet, Institutionen för hälso- och vårdvetenskap (HV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35077.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Woodhouse, Jennifer May. "Operation Belladonna." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15801/1/Jennifer_Woodhouse_Thesis.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Woodhouse, Jennifer May. "Operation Belladonna." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15801/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

West, David Reid. "Some cults of Greek goddesses and female daemons of oriental origin : especially in relation to the mythology of goddesses and demons in the Semitic world." Thesis, University of Glasgow, 1990. http://theses.gla.ac.uk/1263/.

Повний текст джерела
Анотація:
In Chapter One we discuss the evidence for Mycenaean trade and colonisation in the Orient, and for oriental trade and colonisation in the Aegean and Greece. We begin with such subjects as archaeological artefacts, artistic motifs and styles of architecture, then consider the linguistic evidence, such as toponyms, personal names and the LA tablets. The evidence for contact is overwhelming. In Chapter Two we consider the evidence for Semitic motifs in the iconography, mythology and names of Greek goddesses connected with nature. Thus Semitic influence is clear in the case of Artemis and Rhea as lion-goddesses, Britomartis as a `Mistress of the Beasts', Leto as a goddess of the sacred palm, and Demeter as a mare-goddess. Reha seems to be partly Anatolian. Chapter Three is concerned with the goddess Athena and other avian daemons. We begin (Section A) by discussing the oriental origins of Athena's owl, snake, aegis and Gorgon, relying mainly upon the evidence of iconography. Then (Section B) we consider three epithets of Athena which seem very Semitic. Finally (Section C) we discuss the sirens, which are avian demonesses somewhat reminiscent of Athena's chthonian character. In Chapter Four we first analyse (Section A) as much of the character of the goddess Hekate as possible, in both iconography and literature. It is clear that Hekate is a very demonic goddess. Then (Section B) we discuss various theories concerning the origin of Hekate. The Anatolian theories in particular are unconvincing. The Semitic origin of Hekate is tested (Section C) with reference to the character and motifs of both E-S and W-S demons and demonesses. It is concluded that Hekate is an evolute of Lamashtu. Finally (Section D) other Greek chthonian daemons (e.g. Mormo, Empousa, Gello) are compared with both Hekate and Lamashtu. Some (e.g. Mormo, Empousa) are Greek daemons with Semitic motifs in their characters. We conclude that Lamia is another evolute of Lamashtu, and that Gello is derived from the Mesopotamian Gallu demon.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Thornhill, Seth. "Budgeting facilities operation costs using the facilities operation model." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5612.

Повний текст джерела
Анотація:
Approved for public release; distribution is unlimited.
E) uses the FOM for the same purpose. It then compares the two processes against historical data from Fiscal Year 2007-2010 to study how the DoN could use the FOM within the Program Objectives Memorandum (POM) development process. The results show the Navy would be well advised to continue its current methods to develop the POMs. The FOM is still in the process of development, and the methods used by the Navy today are providing more accurate, consistent forecasts for facility operations.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Robinson, Dawn M. "Helping Veterans of Operation Enduring Freedom and Operation Iraqi Freedom." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6739.

Повний текст джерела
Анотація:
Operation Enduring Freedom (OEF) and Operation Iraqi Freedom (OIF) created multiple challenges for the mental health of soldiers who served there. The local facility in this study determined there was a gap in providing OEF/OIF veterans assistance with mental health issues. The practice-focused question explored whether a training module for nurses would assist in the identification of signs and symptoms of mental health issues in OEF/OIF veterans, such as posttraumatic stress disorder, anxiety, depression, addictions, and suicidal/homicidal ideations, to help ensure timely referral for services. The project used Kolcaba's comfort theory as the basis for the training module. A pretest, training module, and posttest were created and administered to the expert panel. Results showed the training module contained information to assist nurses in identifying the signs and symptoms of mental health issues as well as educated the nurses on various interventions that were available for the veterans. It was determined by the expert panel that the training module should be implemented to assist in decreasing the gap in care for OEF/OIF veterans. This training module might support positive social change by empowering nurses to assist veterans with coping skills overcome mental health issues and lead positive and productive lives.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Schneider, Ulrich Johannes. "Repräsentation und Operation." Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-149263.

Повний текст джерела
Анотація:
Den Begriff "Dispositiv" hat Foucault nicht viel länger als den des "Archivs" benutzt. Nach seinem eigenen Bekenntnis sind Begriffe nur "Werkzeuge" des Analysierens, einer methodologischen Fixierung war er grundsätzlich abhold und privilegierte lieber die Erfindung passender Kategorien im konkreten Zusammenhang historischer Forschungen. Vom Dispositiv spricht er am ausführlichsten im Zusammenhang mit seinem Spätwerk, der "Geschichte der Sexualität". Der Begriff ist jenseits dieses Verwendungszusammenhangs allerdings auch anderweitig erfolgreich benutzt worden, und kann auch im hier angesprochenen Zusammenhang eine gewisse Geltung beanspruchen. Als Dispositiv kann eine Bibliothek im Foucaultschen Sinne angesehen werden, wenn institutionelle, administrative und architektonische Gesichtspunkte im Sinne eines Ensembles oder eines Netzwerks rekonstruierbar sind. Dafür liegen in Wolfenbüttel jedenfalls eine Reihe von historischen Zeugnissen vor. Oie Bibliothek als Dispositiv zu verstehen, bedeutet weiterhin, das intellektuelle Unternehmen ihrer Anlage und Disposition, ihrer Vermehrung und ihrer Verfügbarkeit, im Zusammenhang mit administrativen, institutionellen Maßnahmen und allgemein einer Politik ihrer Handhabung zu sehen.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hultberg, Niklas. "Operation Rolling Thunder." Thesis, Försvarshögskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-4096.

Повний текст джерела
Анотація:
This paper provides an explanation of the concepts John A. Warden III describes regarding the use of air power and if this theory can be found, within the confines of an unconventional war. The U.S. ability to air power is overwhelming, however the right kind of warfare can force this great power to abandon their military and political objectives by exhausting its resources over time as it becomes increasingly costly, both economically, politically and morally, to wage war. The research deals with operation Rolling Thunder and John A. Warden IIIs theory in relation to this massive bombing campaign. Firstly, you will find an analysis of John. A. Warden III's works. Five concepts can be found: Airspace Control, center of gravity, air interdiction, the enemy as a system and parallel attack. Secondly, a content analysis of relevant literature in the context of a case study on Operation Rolling Thunder. Thirdly a comparative analysis between the two results with a subsequent discussion relating the main problem and an effort is made to determine the outcome of the investigation and if the purpose of this paper has been met. Within the implementation phases of Operation Rolling Thunder, it is possible to distinguish som of Wardens key concepts regarding air power utilization. Even though the four phases illustrate a continuous change in strategy, Wardens theory The Enemy as a system was never implemented.
Denna uppsats ger en förklaring av John A. Warden IIIs teori om nyttjande av luftmakt och de begrepp som utgör grunden för denna. Frågan om grundbegreppen går att återfinna inom ramarna för ett otraditionellt krig tas upp. USAs förmåga till luftmakt är stor, men med rätt sorts krigföring kan även denna makt tvingas överge sina militära och politiska mål genom utmattning över en längre tidsperiod eftersom det blir allt dyrare, både ekonomiskt, politiskt och moraliskt, att föra krig. Här avhandlas operationen Rolling Thunder och John A. Warden IIIs teoris anknytning till denna enorma bombkampanj. Inledningsvis återfinns en innehållsanalys av John. A. Warden IIIs litteratur, vilket utmynnar i fem begrepp: Luftrumskontroll, tyngdpunkter, flyganfall på djupet, fienden som ett system och parallell attack. Efter det följer en innehållsanalys av relevant litteratur inom ramen för en fallstudie om Rolling Thunder och slutligen påträffas en komparativ analys mellan de två resultaten och en efterföljande diskussion knyter an till problemformuleringen och försöker utröna resultatet av undersökningen och om syftet med uppsatsen uppfyllts. I genomförandefaserna av Operation Rolling Thunder är det möjligt att urskilja vissa av Wardens centrala begrepp och tankar om luftmaktens nyttjande, men hans teori som helhet går inte att återfinna i genomförandet av Rolling Thunder. Trots att de fyra faserna åskådliggör en upprepad förändring i strategi, användes aldrig Wardens teori om fienden som ett system.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "On the Operation of Daemons"

1

Sloman, Robert. The daemons. London: Titan Books, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bacon-Smith, Camille. Daemons, Inc. New York: Science Fiction Book Club, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gavin, Thorpe, ed. Chaos daemons. Nottingham: Games Workshop, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Bacon-Smith, Camille. Daemons, Inc. New York: Science Fiction Book Club, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Counter Daemons. Brooklyn, USA: Litmus Press, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Green, Simon R. Daemons Are Forever. New York: Penguin Group (USA), Inc., 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Green, Simon R. Daemons are forever. New York: Roc, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Some Mantic Daemons. New York, USA: Futurepoem Books, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Daemons are forever. London: Gollancz, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Copyright Paperback Collection (Library of Congress), ed. A legacy of daemons. New York: DAW Books, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "On the Operation of Daemons"

1

Edge, Charles, and Daniel O’Donnell. "Services, Daemons, and Processes." In Enterprise Mac Security, 29–48. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1712-2_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Cooper, Peter. "Networking, Sockets, and Daemons." In Beginning Ruby, 443–65. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2364-1_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Edge, Charles, William Barker, Beau Hunter, and Gene Sullivan. "Services, Daemons, and Processes." In Enterprise Mac Security, 29–47. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2731-1_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Vashurkin, Volodymyr. "Daemons at a Glance." In macOS Daemonology, 43–44. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7277-0_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Saif, Liana. "Celestial Souls and Cosmic Daemons." In The Arabic Influences on Early Modern Occult Philosophy, 172–94. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137399472_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Li, Hai-yan, and Xin-ming Li. "Embedded Operating System Design: The Resolved and Intelligent Daemon Approach." In Embedded Software and Systems, 412–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11535409_59.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hecht, Christine. "Porphyry’s daemons as a threat for the Christians." In Platonism and Christian Thought in Late Antiquity, 49–60. First [edition]. | New York : Routledge, 2019. | Series: Studies in philosophy and theology in late antiquity: Routledge, 2019. http://dx.doi.org/10.4324/9780429440465-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yu, Junchong. "Operation and Operation Analysis." In Marine Nuclear Power Technology, 361–78. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2894-1_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Wohlin, Claes, Per Runeson, Martin Höst, Magnus C. Ohlsson, Björn Regnell, and Anders Wesslén. "Operation." In Experimentation in Software Engineering, 117–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29044-2_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hinsch, Martin. "Operation." In ISO 9001:2015 for Everyday Operations, 35–47. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-25550-3_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "On the Operation of Daemons"

1

Briggs, Pamela, and Patrick L. Olivier. "Biometric daemons." In Proceeding of the twenty-sixth annual CHI conference extended abstracts. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1358628.1358699.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Song, Yantao, and Scott M. Pike. "Eventually k-Bounded Wait-Free Distributed Daemons." In 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07). IEEE, 2007. http://dx.doi.org/10.1109/dsn.2007.44.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Manadhata, Pratyusa, Jeannette Wing, Mark Flynn, and Miles McQueen. "Measuring the attack surfaces of two FTP daemons." In the 2nd ACM workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1179494.1179497.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Drobyshevski, Edward. "Detection and study of dark electric matter objects (daemons)." In International Workshop on Astroparticle and High Energy Physics. Trieste, Italy: Sissa Medialab, 2003. http://dx.doi.org/10.22323/1.010.0077.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

de Jong, P. "The Ubik configurator: A fusion of messages, daemons, and rules." In the 1988 ACM SIGPLAN workshop. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/67386.67443.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Holliday, M. A. "Reference history, page size, and migration daemons in local/remote architectures." In the third international conference. New York, New York, USA: ACM Press, 1989. http://dx.doi.org/10.1145/70082.68192.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

DROBYSHEVSKI, E. M. "DARK ELECTRIC MATTER OBJECTS (DAEMONs) AND SOME POSSIBILITIES OF THEIR DETECTION." In Proceedings of the First International Workshop on Particle Physics and the Early Universe. WORLD SCIENTIFIC, 1998. http://dx.doi.org/10.1142/9789814447263_0030.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Paolini, Christopher P., and Subrata Bhattacharjee. "The IGE Model: An Extension of the Ideal Gas Model to Include Chemical Composition as Part of the Equilibrium State." In ASME 2010 International Mechanical Engineering Congress and Exposition. ASMEDC, 2010. http://dx.doi.org/10.1115/imece2010-40762.

Повний текст джерела
Анотація:
The TEST (The Expert System for Thermodynamics, www.thermofluids.net) web portal is a comprehensive thermodynamic courseware consisting of multimedia problems and examples, an online solution manual for educators, traditional thermodynamic charts and tables, fifteen chapters of animations to illustrate thermodynamic systems and fundamental concepts, and a suite of thermodynamic calculators called daemons for evaluating thermodynamic properties and analyzing thermodynamic problems.. The state module offers Java applets for evaluation of thermodynamic states of different working substances grouped into several material models according to underlying assumptions. Gas mixtures are modeled by the perfect gas (PG) or ideal gas (IG) mixture models. In this work, we extend the IG model mixture model into an ideal gas equilibrium (IGE) mixture model by incorporating chemical equilibrium calculations as part of the state evaluation process. Through a simple graphical interface users can set the atomic composition of a gas mixture. In the state panel, the known thermodynamic properties are entered. For a given pressure and temperature, the mixture’s Gibbs function is minimized subject to atomic constraints and the equilibrium composition along with thermodynamic properties of the mixture are calculated and displayed. What is unique about this approach is that equilibrium computations are performed in the background, without requiring any major change in the familiar user interface used in other state daemons. Properties calculated by this equilibrium state daemon are compared with results from other established applications such as NASA CEA and STANJAN. Also, two different algorithms, an iterative approach and a direct approach based on minimizing different thermodynamic functions in different situation are compared.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hill, Mary C. "SMOOTH INTEGRATION OF MODELS AND DATA INTO UNCERTAINTY AND RISK ANALYSIS: ADVANTAGES PROVIDED BY REDUCING NUMERICAL DAEMONS." In GSA Annual Meeting in Denver, Colorado, USA - 2016. Geological Society of America, 2016. http://dx.doi.org/10.1130/abs/2016am-283332.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

De Almeida Souza, Gabriel, and José Jean-Paul Zanlucchi de Souza Tavares. "Battery Charge And Source Estimation As A Product Component." In Congresso Brasileiro de Automática - 2020. sbabra, 2020. http://dx.doi.org/10.48011/asba.v2i1.1620.

Повний текст джерела
Анотація:
This paper's goal is to present a low cost, non-conventional solution for battery state of charge estimation and external electrical input presence/absence for a commercial mobile, handheld device whose battery state of charge control is critical. This solution is based on treating and filtering a time series in real-time software, using the battery pack characteristic discharge curve and time series statistical features. The time series is composed of data that is sampled embedded in hardware, communicating directly with the machine's BIOS. The system processes this data and outputs a value that indirectly relates to state of charge, needing further processing to insure accuracy. The data stream is treated in a process that directly relates the output time series with state of charge through a transfer function, effectively treating intermediary conversions as black boxes to simplify analysis and implementation. This process can also detect if an external source is connected/disconnected by exploiting pre-detected features in the time series. This approachadvantages are its low cost and simplicity, reducing hardware complexity and expenses; small dimensional footprint; mostly software-based; and centralization into the main hardware as low computational cost daemons, simplifying data consumption.
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "On the Operation of Daemons"

1

Tran, Nhan V. Angles and Daemons: Spin Correlations at the LHC. Office of Scientific and Technical Information (OSTI), September 2011. http://dx.doi.org/10.2172/1248349.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Mason, Gerald A. Operation Starvation. Fort Belvoir, VA: Defense Technical Information Center, February 2002. http://dx.doi.org/10.21236/ada420650.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Meade, Roger. Operation Greenhouse. Office of Scientific and Technical Information (OSTI), July 2021. http://dx.doi.org/10.2172/1805714.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Meade, Roger. Operation Ivy. Office of Scientific and Technical Information (OSTI), September 2021. http://dx.doi.org/10.2172/1821343.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Meade, Roger. Operation Castle. Office of Scientific and Technical Information (OSTI), September 2021. http://dx.doi.org/10.2172/1822703.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Meade, Roger. Operation Teapot. Office of Scientific and Technical Information (OSTI), February 2022. http://dx.doi.org/10.2172/1846889.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Meade, Roger. Operation Plumbbob. Office of Scientific and Technical Information (OSTI), May 2022. http://dx.doi.org/10.2172/1870610.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Meade, Roger. Operation Redwing. Office of Scientific and Technical Information (OSTI), June 2022. http://dx.doi.org/10.2172/1872321.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Meade, Roger. Operation Dominic. Office of Scientific and Technical Information (OSTI), September 2022. http://dx.doi.org/10.2172/1889954.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Meade, Roger. Operation Fishbowl. Office of Scientific and Technical Information (OSTI), October 2022. http://dx.doi.org/10.2172/1896391.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії