Search Results - "virtualization"
Suggested Topics within your search.
Suggested Topics within your search.
- Virtual reality 108
- Social aspects 61
- Computer networks 51
- Information technology 46
- Management 44
- Human-computer interaction 42
- Data processing 40
- Virtual computer systems 38
- methods 31
- Computer simulation 29
- Internet 28
- Research 25
- Virtual work teams 24
- Computer graphics 23
- Computer-assisted instruction 22
- Design 20
- Technological innovations 20
- Computer network resources 18
- Teams in the workplace 18
- Distance education 17
- Electronic reference services (Libraries) 17
- Information society 17
- Internet in education 17
- Methodology 17
- Computer games 16
- Effect of technological innovations on 16
- Virtual reality in management 16
- Libraries 15
- diagnosis 15
- Congresses 14
-
501
Intertextuality and the med from genre to everyday li
Published 2000Table of Contents: “…Wulff --Creator spiritus: virtual texts in everyday life -- Ben Bachmair -- Text as the punctuation of semiosis: pulling at some of the threads -- Gunther Kress…”
Click Here to View Status and Holdings.
Unknown -
502
Systems Performance Enterprise And The Cloud
Published 2014Click Here to View Status and Holdings.
Manuscript Book -
503
Improved access to information portals, content selection, and digital information
Published 2003Table of Contents: “…/ Alice Prochaska -- Portals and the human factor : bringing virtual services to the life of the mind or the scholarly stargate / Barbara I. …”
Click Here to View Status and Holdings.
Unknown -
504
Modern Management CONCEPTS AND SKILLS
Published 2016Table of Contents: “…Stress, Conflict, and Virtuality 12. Influencing and Communication 13. Leadership 14. …”
Click Here to View Status and Holdings.
Book -
505
Cinema beyond film media epistemology in the modern era
Published 2010Table of Contents: “…Introduction to an epistemology of viewing and listening dispositives ; The 1900 episteme / François Albera and Maria Tortajada -- Projected cinema : a hypothesis on the cinema's imagination ; The case for an epistemography of montage : the Marey moment / François Albera -- The 'cinematographic snapshot' : rereading Etienne-Jules Marey ; The cinematograph versus photography, or cyclists and time in the work of Alfred Jarry / Maria Tortajada -- Dynamic paths of thought : exhibition design, photography and circulation in the work of Herbert Bayer ; The lecture : Le Corbusier's use of the word, drawing and projection / Olivier Lugon -- Dancing dolls and mechanical eyes : tracking an obsessive motive from balet to cinema / Laurent Guido -- From broadcast performance to virtual show : television's tennis dispositive / Laurent Guido -- The lecturer, the image, the machine and the audio-spectator : the voice as a component part of audiovisual dispositives / Alain Boillat -- On the singular status of the human voice : Tomorrow's eve and the cultural series of talking machines / Alain Boillat…”
Click Here to View Status and Holdings.
Unknown -
506
Data Communications and Networking
Published 2013Table of Contents: “…Network models -- Introduction to physical layer -- Digital transmission -- Analog transmission -- Bandwidth utilization : Multiplexing and spectrum spreading -- Transmission media -- Introduction to data-link layer -- Error detection and correction -- Data Link Control (DLC) -- Media Access Control (MAC) -- Wired LANs : Ethernet -- Other wired networks -- Connecting devices and virtual LANs -- Introduction to network layer -- Network-layer protocols -- Unicast routing -- Multicast routing -- Next generation IP -- Introduction to transport layer -- Transport-layer protocols -- Introduction to application layer -- Standard client-server protocols -- Network management -- Multimedia -- Peer-to-peer paradigm -- Quality of service -- Cryptography and network security -- Internet security. …”
Click Here to View Status and Holdings.
Manuscript Book -
507
Research design Donald Campbell's legacy
Published 2000Table of Contents: “…McCleary. ch. 7. Real evaluations in virtual worlds using program evaluation tools to assess the validity of computer simulations / Richard A. …”
Click Here to View Status and Holdings.
Book -
508
Cultures of Participation Arts, Digital Media and Cultural Institutions
Published 2021Table of Contents: “…Reframing the participative edge of virtual reality Chapter Seven: Photo-sharing as participatory surveillance Chapter Eight: Medialities of participation in sound art Chapter Nine: The participatory patient: Exploring the platformed multivalence and public value of cancer storytelling on social media Part III: Cultural policy and institutions Chapter Ten: The "problem" of participation in cultural policy Chapter Eleven: Public participation and agency in art museums Chapter Twelve: Reordering and re-performing: Re-placing cultural participation and re-viewing well-being measures Chapter Thirteen: Diving into the archive: Google Cultural Institute & the cultural politics of participation…”
Click Here to View Status and Holdings.
Book -
509
REIMAGINING COMMUNICATION EXPERIENCE
Published 2020Table of Contents: “…Kreuz -- Synchronicity, or not : on the temporal relations between journalism and politics / Henrik Bødker -- Reimagining memory : digital media and a new polyphony of memory / Christian Schwarzenegger, Christine Lohmeier -- Virtual space : Palestinians negotiate a lost homeland in film / Hania Nashef -- Mediatization / Frédérick Bastien -- Reimagining audiences in the age of datafication / Pille Pruulmann-Vengerfeldt, Hanna Meyer zu Hörste -- Youth media consumption and privacy risks in the digital era / Wonsun Shin -- Fan cultures as analytic nexus of media audiences and industries / Elena Maris -- From the ashes of ubiquity : selfie culture as a new communication frontier / Jessica Maddox, Steven Holiday, and Yuanwei Lyu -- Receiving the stranger through the exposed heart / Ozum Ucok-Sayrak.…”
Click Here to View Status and Holdings.
Book -
510
Radiology in Forensic Medicine from Identification to Post-mortem Imaging
Published 2020Table of Contents: “…A brief history of forensic radiology -- Strenghts and limits of conventional forensic medicine -- Medico-Legal aspects of forensic radiology -- Imaging techniques for forensic radiology in living -- Imaging techniques for postmortem forensic radiology -- Radiology in archeology: fundamentals and perspective -- Interpretation of diagnostic imaging for medico-legal issues -- Forensic Anthropology: Personal identification in living individuals -- Radiological age estimation: methods and applications -- Traffic accidents -- Violence and abuse part 1: battered child -- Violence and abuse part 2: domestic abuse -- Violence and abuse part 3: elderly abuse syndrome -- Penetrating and non penetrating trauma -- Imaging for ballistic trauma -- Body Packing -- Occupational Diseases -- Lie Detection Technology in the era of functional Magnetic Resonance Imaging -- Forensic Anthropology: post-mortem personal identification -- Conventional Radiology for post-mortem imaging -- Post-mortem Computed Tomography: from acquisition to reporting -- Post-mortem Magnetic Resonance: from acquisition to reporting -- Technical perspectives in post-mortem imaging -- Imaging for forensic thanatology -- Postmortem imaging in mass disasters -- Postmortem imaging in drowning -- Imaging in sudden unexpected natural deaths -- Foetal Postmortem imaging -- Brain imaging in post-mortem forensic radiology -- Pitfalls on Postmortem Imaging: the need of blending conventional and virtual autopsy -- Bioethical aspects on Postmortem Imaging.…”
Click Here to View Status and Holdings.
Book -
511
Paediatric bronchoscopy
Published 2010Table of Contents: “…. -- Rigid bronchoscopy / Hitter, A. ... [et al.] -- Virtual bronchoscopy and other three-dimensional imaging methods / Anthracopoulos, M.B.; Alexopoulou, E.; Kagadis, G.C. -- Normal anatomy / Wallis, C. -- Congenital and acquired abnormalities of the upper airways / Eber, E. -- Congenital and acquired abnormalities of the lower airways / Pohunek, P.; Boogaard, R.; Merkus, P. -- Bronchial asthma /Barbato, A. ... …”
Click Here to View Status and Holdings.
Book -
512
Musicians and their Audiences Performance, Speech and Mediation
Published 2017Table of Contents: “…Andrew Pace - Refiguring Maltese Heritage through Musical Performance: Audience Complicity and the Role of Venues in Etnika's Stage ShowsPART III: TECHNOLOGICAL MEDIATIONS: THE VIRTUAL AND THE MATERIALHillegonda C. Rietveld - Authenticity and Liveness in Digital DJ PerformanceRichard Osborne - That's Me in the Spotlight: Audiences and Musicians on ScreenIoannis Tsioulakis - `Soon You'll Wish They Would Shut Up!'…”
Click Here to View Status and Holdings.
Musical Score Book -
513
DATA AND COMPUTER COMMUNICATIONS
Published 2014Table of Contents: “…Preface About the Author Chapter 0 Guide for Readers and Instructors 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards UNIT ONE FUNDAMENTALS OF DATA COMMUNICATIONS AND NETWORKING PART ONE OVERVIEW Chapter 1 Data Communications, Data Networks, and the Internet 1.1 Data Communications and Networking for Today's Enterprise 1.2 A Communications Model 1.3 Data Communications 1.4 Networks 1.5 The Internet 1.6 An Example Configuration Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications 2.1 The Need for a Protocol Architecture 2.2 A Simple Protocol Architecture 2.3 The TCP/IP Protocol Architecture 2.4 Standardization within a Protocol Architecture 2.5 Traditional Internet-Based Applications 2.6 Multimedia 2.7 Sockets Programming 2.7 Recommended Reading 2.8 Key Terms, Review Questions, and Problems Appendix 2A The Trivial File Transfer Protocol PART TWO DATA COMMUNICATIONS Chapter 3 Data Transmission 3.1 Concepts and Terminology 3.2 Analog and Digital Data Transmission 3.3 Transmission Impairments 3.4 Channel Capacity 3.5 Recommended Reading 3.6 Key Terms, Review Questions, and Problems Appendix 3A Decibels and Signal Strength Chapter 4 Transmission Media 4.1 Guided Transmission Media 4.2 Wireless Transmission 4.3 Wireless Propagation 4.4 Line-of-Sight Transmission 4.5 Recommended Reading 4.6 Key Terms, Review Questions, and Problems Chapter 5 Signal Encoding Techniques 5.1 Digital Data, Digital Signals 5.2 Digital Data, Analog Signals 5.3 Analog Data, Digital Signals 5.4 Recommended Reading 5.5 Key Terms, Review Questions, and Problems Chapter 6 Error Detection and Correction 6.1 Types of Errors 6.2 Error Detection 6.3 Parity Check 6.4 The Internet Checksum 6.5 Cyclic Redundancy Check (CRC) 6.6 Forward Error Correction 6.7 Recommended Reading 6.8 Key Terms, Review Questions, and Problems Chapter 7 Data Link Control Protocols 7.1 Flow Control 7.2 Error Control 7.3 High-Level Data Link Control (HDLC) 7.4 Recommended Reading 7.5 Key Terms, Review Questions, and Problems Appendix 7A Performance Issues Chapter 8 Multiplexing 8.1 Frequency-Division Multiplexing 8.2 Synchronous Time-Division Multiplexing 8.3 Cable Modems 8.4 Asymmetric Digital Subscriber Line 8.5 xDSL 8.6 Multiple Channel Access 8.7 Recommended Reading 8.8 Key Terms, Review Questions, and Problems PART THREE WIDE AREA NETWORKS Chapter 9 WAN Technology and Protocols 9.1 Switched Communications Networks 9.2 Circuit Switching Networks 9.3 Circuit Switching Concepts 9.4 Softswitch Architecture 9.5 Packet-Switching Principles 9.6 Asynchronous Transfer Mode 9.7 Recommended Reading 9.8 Key Terms, Review Questions, and Problems Chapter 10 Cellular Wireless Networks 10.1 Principles of Cellular Networks 10.2 Cellular Network Generations 10.3 LTE-Advanced 10.4 Recommended Reading 10.5 Key Terms, Review Questions, and Problems PART FOUR LOCAL AREA NETWORKS Chapter 11 Local Area Network Overview 11.1 Bus and Tree Topologies 11.2 LAN Protocol Architecture 11.3 Bridges 11.4 Hubs and Switches 11.5 Virtual LANs 11.6 Recommended Reading 11.7 Key Terms, Review Questions, and Problems Chapter 12 Ethernet 12.1 Traditional Ethernet 12.2 High-Speed Ethernet 12.3 IEEE 802.1Q VLAN Standard 12.4 Recommended Reading 12.5 Key Terms, Review Questions, and Problems Appendix 12A Digital Signal Encoding for LANs Appendix 12B Scrambling Chapter 13 Wireless LANs 13.1 Overview 13.2 IEEE 802.11 Architecture and Services 13.3 IEEE 802.11 Medium Access Control 13.4 IEEE 802.11Physical Layer 13.5 Gigabit Wi-Fi 13.6 IEEE 802.11 Security Considerations 13.7 Recommended Reading 13.8 Key Terms, Review Questions, and Problems PART FIVE INTERNET AND TRANSPORT LAYERS Chapter 14 The Internet Protocol 14.1 Principles of Internetworking 14.2 Internet Protocol Operation 14.3 Internet Protocol 14.4 IPv6 14.5 Virtual Private Networks and IP Security 14.6 Recommended Reading 14.7 Key Terms, Review Questions, and Problems Chapter 15 Transport Protocols 15.1 Connection-Oriented Transport Protocol Mechanisms 15.2 TCP 15.3 UDP 15.4 Recommended Reading 15.5 Key Terms, Review Questions, and Problems UNIT TWO ADVANCED TOPICS IN DATA COMMUNICATIONS AND NETWORKING PART SIX DATA COMMUNICATIONS AND WIRELESS NETWORKSChapter 16 Advanced Data Communications Topics 16.1 Analog Data, Analog Signals 16.2 Forward Error Correction Codes 16.3 ARQ Performance Issues 16.4 Recommended Reading 16.5 Key Terms, Review Questions, and Problems Chapter 17 Wireless Transmission Techniques 17.1 MIMO Antennas 17.2 OFDM, OFDMA, and SC-FDMA 17.3 Spread Spectrum 17.4 Direct Sequence Spread Spectrum 17.5 Code-Division Multiple Access 17.6 Recommended Reading 17.7 Key Terms, Review Questions, and Problems Chapter 18 Wireless Networks 18.1 Fixed Broadband Wireless Access 18.2 WiMAX/IEEE 802.16 18.3 Bluetooth Overview 18.4 Bluetooth Radio Specification 18.5 Bluetooth Baseband Specification 18.6 Bluetooth Logical Link Control and Adaptation Protocol 18.7 Recommended Reading 18.8 Key Terms, Review Questions, and Problems PART SEVEN INTERNETWORKING Chapter 19 Routing 19.1 Routing in Packet-Switching Networks 19.2 Examples: Routing in ARPANET 19.3 Internet Routing Protocols 19.4 Least-Cost Algorithms 19.5 Recommended Reading 19.6 Key Terms, Review Questions, and Problems Chapter 20 Congestion Control 20.1 Effects of Congestion 20.2 Congestion Control 20.3 Traffic Management 20.4 Congestion Control in Packet-Switching Networks 20.5 TCP Congestion Control 20.6 Datagram Congestion Control Protocol 20.7 Recommended Reading 20.8 Key Terms, Review Questions, and Problems Chapter 21 Internetwork Operation 21.1 Multicasting 21.2 Software Defined Networks 21.3 OpenFlow 21.4 Mobile IP 21.5 Recommended Reading 21.6 Key Terms, Review Questions, and Problems Chapter 22 Internetwork Quality of Service 22.1 QoS Architectural Framework 22.2 Integrated Services Architecture 22.3 Resource Reservation Protocol 22.4 Differentiated Services 22.5 Service Level Agreements 22.6 IP Performance Metrics 22.7 Recommended Reading 22.8 Key Terms, Review Questions, and Problems Chapter 23 Multiprotocol Label Switching 23.1 The Role of MPLS 23.2 Background 23.3 MPLS Operation 23.4 Labels 23.5 FECs, LSPs, and Labels 23.6 Label Distribution 23.7 Traffic Engineering 23.8 Virtual Private Networks 23.9 Recommended Reading 23.10 Key Terms, Review Questions, and Problems PART EIGHT INTERNET APPLICATIONS Chapter 24 Electronic Mail, DNS, and HTTP 24.1 Electronic Mail: SMTP and MIME 24.2 Internet Directory Service: DNS 24.3 Web Access: HTTP 24.4 Recommended Reading 24.5 Key Terms, Review Questions, and Problems Chapter 25 Internet Multimedia Support 25.1 Real-Time Traffic 25.2 Voice Over IP 25.3 Session Initiation Protocol 25.4 Real-Time Transport Protocol 25.5 Recommended Reading 25.6 Key Terms, Review Questions, and Problems APPENDICES Appendix A Fourier Analysis A.1 Fourier Series Representation of Periodic Signals A.2 Fourier Transform Representation of Aperiodic Signals A.3 Recommended Reading Appendix B Projects and Other Student Exercises for Teaching Data and Computer Communications B.1 Animations and Animation Projects B.2 Practical Exercises B.3 Sockets Projects B.4 Wireshark Projects B.5 Simulation and Modeling Projects B.6 Performance Modeling B.7 Research Projects B.8 Reading/Report Assignments B.9 Writing Assignments B.10 Discussion TopicsReferences Index ONLINE CHAPTERS AND APPENDICES[1] PART NINE NETWORK SECURITY Chapter 26 Computer and Network Security Threats 26.1 Computer Security Concepts 26.2 Threats, Attacks, and Assets 26.3 Intruders 26.4 Malicious Software Overview 26.5 Viruses, Worms, and Bots 26.6 Recommended Reading 26.7 Key Terms, Review Questions, and Problems Chapter 27 Computer and Network Security Techniques 27.1 Virtual Private Networks and IPsec 27.2 SSL and TLS 27.3 Wi-Fi Protected Access 27.4 Intrusion Detection 27.5 Firewalls 27.6 Malware Defense 27.7 Recommended Reading 27.8 Key Terms, Review Questions, and Problems Appendix C Standards Organizations Appendix D Asynchronous and Synchronous TransmissionAppendix E The OSI Model Appendix F The International Reference Alphabet Appendix G Proof of the Sampling Theorem Appendix H Ones Complement Representation and AdditionAppendix I Statistical TDM Appendix J The Spanning Tree AlgorithmAppendix K LAN Performance IssuesAppendix L Matrix Multiplication and Determinants Appendix M Queuing Effects Appendix N Orthogonality, Correlation, and…”
Click Here to View Status and Holdings.
Manuscript Book -
514
Social Media The Academic Library Perspective
Published 2019Table of Contents: “…Pinterest -- 11.1 Case study 1: Extending the library's presence into the virtual space using Pinterest / Brandy R. Horne…”
Click Here to View Status and Holdings.
Book -
515
-
516
-
517
Implementing digital reference services setting standards and making it real
Published 2003Click Here to View Status and Holdings.
Conference Proceeding Book -
518
-
519
-
520