Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • HU Berlin  (35)
  • Alice Salomon HS  (1)
  • Electronic books  (19)
  • Konferenzschrift  (17)
Medientyp
Sprache
Region
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    Tokyo :Springer Japan,
    UID:
    almahu_9949602152602882
    Umfang: 1 online resource (225 pages)
    Ausgabe: 1st ed.
    ISBN: 9784431566236
    Serie: Science for Sustainable Societies Series
    Anmerkung: Intro -- Preface: From "Vision 2050" to "New Vision 2050" -- Preface (1): Turning Point of Human History -- Twenty-First Century Is a Special Era -- Various Issues -- Global Warming and Abnormal Weather -- Is Capitalism Sustainable? -- Preface (2): The Latest Report -- Human Race Is Navigating in the Right Direction (1): SDGs -- Human Race Is Navigating in the Right Direction (2): COP21 -- IEA Report -- Japan's Experiences as a Leading Country in Resolving Societal Problems -- Essence of the Era of Saturation -- Saturation of the Population -- Saturation of Man-Made Objects -- Saturation of Minerals -- World in 2050 -- Preface (3): A Society We Are Aiming At -- Creation of a New Society and Values by Resolving Issues -- "Platinum Society": A Vision in the Twenty-First Century -- Essential Factors for a Platinum Society -- A Vision That Can be Realized -- Preface (4): Image of a Platinum Society Has Begun to Appear -- Creative Demand -- Low-Carbon Society -- Energy-Creating Houses and Zero-Energy Buildings -- From Eco-Cars, Eco-Factories, and Cars to Cars, and Zero CO2 -- Diversifying Means of Transportation -- Energy Conservation Is the Best Policy -- Urban Mines -- Renewable Energy -- Japan Will Become a Resource Self-Sufficient Society -- The World Will Become a Sustainable Recycling-Oriented Society -- Harmony with Nature -- Macro-Level Viewpoint of Harmony with Nature -- Health Support and Self-Reliance Support Are Important Industries -- Participation of Active Seniors Is Indispensable -- Various Options -- Free Participation -- Education of Information Technology Nurtures the Next Generation -- Society with Employment -- Society Where Children Will Be Born -- Knowledge Structuring Will Lead to Solutions -- How to Expand and Develop More Successful Examples -- Challenging the Issue Through Knowledge Structuring and Action. , Innovations from Mega-Cities -- Viable Business Ensures Sustainability -- A Society of Lifelong Learning -- Developed Countries Can Achieve Economic Growth -- GDP and IWI -- Platinum Industry and Economic Growth -- Developing Countries Aim at a Platinum Society Together -- Social Disparity and Social Security, the State and the Market -- A System for Innovations -- Twenty-First Century Is a Turning Point -- Platinum Society Network -- References -- Contents -- Chapter 1: The Message in "Vision 2050" -- 1.1 Behind the Birth of Vision 2050 -- 1.1.1 The Need for a "Macro" Vision -- 1.1.2 An Affluent Lifestyle for All -- 1.1.3 Why a Low-Carbon Society? -- 1.1.4 The Threat of Global Warming -- 1.2 What Is Vision 2050? -- 1.2.1 The Vision for 2050 -- 1.2.2 A Happy Low-Carbon Society Is Achievable -- 1.2.3 Saturation of Man-Made Objects and the Material-­Circulating System -- 1.2.4 Tripling Energy Efficiency -- 1.2.5 Doubling the Amount of Renewable Energy -- 1.2.6 Increases in Both Comfort and Economic Performance -- 1.2.7 Premises Consequent on Being a Realistic Vision -- Chapter 2: Progress on Vision 2050 Since 1995 -- 2.1 Saturation of Man-Made Objects and the Material-­Circulating System -- 2.1.1 Saturation of Population -- 2.1.2 Saturation of Man-Made Objects -- 2.1.3 Saturated Demand for Substances and Materials: Cement -- 2.1.4 Saturated Demand for Substances and Materials: Iron -- 2.1.5 Hope for a Circulating Society -- 2.2 Energy Saving and Renewable Energy -- 2.2.1 Further Development Achieved in Energy Saving -- 2.2.2 Putting Renewable Energy at the Core of Energy Investments -- 2.3 Vision 2050 as a Happy Vision -- 2.3.1 The Industrial Structure of Japan as a "Leading Country in Resolving Societal Problems" and Energy -- 2.3.2 Certainly Japan Led the World -- 2.3.3 The World Is Making Progress toward Achieving Vision 2050 -- Bibliography. , Chapter 3: Technology to Support Low-Carbon Society (Using Energy) -- 3.1 Direction of Improvement in Energy Efficiency -- 3.1.1 "Daily Living" and "Monozukuri" -- 3.2 Low Carbon Technologies in the Transportation Sector -- 3.2.1 Shipment Does Not Consume Energy? -- 3.2.2 Energy-Efficient Cars Appear One after Another -- 3.2.3 Car Energy Efficiency Increases Eightfold -- 3.2.4 A Rich Car Life with Diverse Eco Cars -- 3.2.5 Modal Shift in Movement -- 3.3 Low Carbon Technologies in the Home and Business Sectors -- 3.3.1 Promotion of Energy Saving Is Economically Advantageous -- 3.3.2 Energy Conservation Will Be a Business Opportunity -- 3.3.3 Household Energy Consumption Is Consolidated into Electricity -- 3.3.4 Eco Houses Are Also Friendly to Their Occupants -- 3.3.5 The Latest Heat Pump Situation -- 3.3.6 Domestic Fuel Cells Packed with Japanese Technologies -- 3.3.7 Globalize Japanese Environmental Technologies -- 3.4 Low-Carbon Technologies for Monozukuri -- 3.4.1 Shift from Blast Furnaces to Electric Furnaces -- 3.4.2 Aluminum Is an Excellent Material in Terms of Recycling -- 3.4.3 Achieving Material Cycling of Rare Metals -- 3.4.4 Expectations for Dissemination of Industrial Heat Pumps -- Bibliography -- Chapter 4: Technology to Support Low-Carbon Society (Utilizing Energy) -- 4.1 Future Image of Renewable Energy -- 4.1.1 Rethinking the Value of Renewable Energy -- 4.1.2 The Future Image of Solar Cells and Storage Batteries -- 4.1.3 Importance of Balance Between Future Cost and Investment -- 4.1.4 Which Storage Battery Will Be Playing the Leading Role in 2050? -- 4.1.5 Promising Markets Where Various Uses Can Be Considered -- 4.1.6 Dissemination of Hydropower Generation by Region -- 4.1.7 The Potential of Biomass -- 4.1.8 Hydrogen as a Partner of Renewable Energy -- 4.2 Innovations Emerging from Theory and IT. , 4.2.1 Pursuing Efficiency to the Utmost Limit -- 4.2.2 Enhance Efficiency with an Energy Management System -- 4.2.3 Japan Should Compete with High-Added-Value Items -- 4.2.4 Increased Sophistication of Demand Forecasting by Utilizing Big Data -- 4.2.5 The Possibility of Carbon Pricing -- Bibliography -- Chapter 5: Low-Carbon Society in 2050 -- 5.1 Low Carbon Power Supply Systems in 2050 -- 5.1.1 Means to Achieve Low Carbonization -- 5.1.2 80% Reduction and Power Generation Costs -- 5.1.3 Consideration of the Best Power Supply Configuration -- 5.2 Reducing Carbon in Major Fields -- 5.2.1 Value-Added Industry and Low Carbon -- 5.2.2 The Ideal State of the Steel Industry -- 5.3 Reducing CO2 Emissions by 80% Across Japan -- 5.3.1 Low Carbonization by Sector in 2050 -- 5.3.2 Value-Added by Industry and CO2 Emissions in 2050 -- 5.3.3 Image of CO2 Emissions and Changes in GDP in all Industries -- Chapter 6: Platinum Industry and a New Society -- 6.1 What Is a Platinum Society? -- 6.1.1 Per Capita GDP and Average Life Expectancy -- 6.1.2 From Quantitative Sufficiency to Qualitative Sufficiency -- 6.1.3 An Island (Ama-cho) that Increased the Number of Children Attending School Despite a Declining Birthrate -- 6.1.4 Contributing to Lowering Carbon in Asia from Actual Experiences (Kitakyushu) -- 6.1.5 Leadership that Achieved a Miracle (Yanedan) -- 6.1.6 Realizing a Vision in a Megalopolis (Futakotamagawa) -- 6.2 Towards Becoming a Nation Self-Sufficient in Resources -- 6.2.1 Making a Self-Sufficiency Rate of 70% a Reality with Vision 2050 -- 6.2.2 A Scenario for Reviving Forestry -- 6.3 Coexisting in Harmony with Beautiful Nature -- 6.3.1 A World that Is Comfortable for All Living Things -- 6.3.2 Initiatives by Corporations for Living in Harmony with Nature -- 6.4 Good Health and Self-Reliance for a Fulfilling Life. , 6.4.1 The Wisdom of Seniors Is a Social Resource -- 6.4.2 Making Use of the Knowledge and Experience of Seniors for the Next Generation -- 6.5 Diverse Options and Freedom of Participation -- 6.5.1 Why Are Bonds Being Sought After Now? -- 6.5.2 Freedom of Mobility Induces Changes to Work Styles -- 6.5.3 Spread of Multi-habitation -- 6.5.4 Tokyo Work Styles and Countermeasures for Declining Birthrates -- 6.6 New Industries Created in a Platinum Society -- 6.6.1 Marunouchi Platinum University - Thinking About Regional Issues in a Big City -- 6.6.2 Developing Human Resources for Realizing the Platinum Society -- 6.6.3 Education Changing Through ICT -- 6.6.4 Adult Education as a New Industry -- 6.6.5 Developing Leaders Who can Carve Out a Path to a New Era -- 6.6.6 Questioning Anew the Importance of Education -- 6.7 The Platinum Society Becomes More Visible -- 6.7.1 How to Promote a Platinum Society -- 6.7.2 The Platinum Network Society and the Platinum Vision Award -- 6.7.3 Creating the Platinum Society Handbook -- 6.8 The Platinum Society and Vision 2050 -- Bibliography -- Interview -- Interview 1: Toyota Environmental Challenge 2050 -- Challenges Unachievable Following the Lines Laid Before -- The Impact of Climate Change -- "Let's Do What We Have to Do." -- Parts Manufacturers Have a Major Presence -- Mid-To-Long-Term Targets for Clearing Regulations -- Interview 2: Regional Revitalization and New Work Styles -- Local Activation for Stronger Competitiveness -- Japanese Factories Are Competitive -- Relocation of Some Head Office Functions, 3.2 Times More Children -- Retirees Teaching Science to Young Children -- Interview 3: Considering Ways to Solve Social Problems -- There Is Much Room for Innovation of the Social System -- The Notion that a Decline in the Population Means the Economy will Falter Is Faulty. , It Is Innovation for Being Used at the Site.
    Weitere Ausg.: Print version: Komiyama, Hiroshi New Vision 2050 Tokyo : Springer Japan,c2018 ISBN 9784431566229
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9948177900502882
    Umfang: 194 p. ; , 20 x 27cm.
    ISBN: 9789264083554
    Serie: Radioactive Waste Management,
    Inhalt: These workshop proceedings highlight the significant amount of work accomplished over the past decade in delivering transparent, proportionate regulation for geological disposal, and identify important differences between national regulations even if these are not in contradiction with international guidance. They also underline the importance of R&D carried out on behalf of the regulator. In addition to the contributed papers, these proceedings trace the numerous discussions that formed an integral part of the workshop. They constitute an important and unique documentary basis for researchers and radioactive waste management specialists. Themes addressed include duties to future generations, timescales for regulation, stepwise decision making, roles of optimisation and best available techniques (BAT), multiple lines of reasoning, safety and performance indicators, recognition of uncertainties and the importance of stakeholder interactions.
    Anmerkung: Main Findings: Lessons to be Learnt -- Human Actions -- List of Participants -- Introduction -- Fundamental Concepts and Evolution of International Guidance -- What Was Heard so Far: The View from Outside -- Establishing Regulatory Criteria that Account for the Inherent Difficulties Associated with the Long-times Frames for Protection -- Stocktaking and Closure of the Meeting -- Optimisation, BAT and Related Topics -- Regulatory Research and Development Activities -- Foreword -- Factual Summary of Papers, Presentations and Discussions.
    Sprache: Englisch
    Schlagwort(e): Konferenzschrift ; Konferenzschrift ; Konferenzschrift ; Aufsatzsammlung
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9949301482702882
    Umfang: 1 online resource (263 pages)
    ISBN: 9781430265726
    Anmerkung: Intro -- Contents at a Glance -- Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Cyber Security in the Mobile Age -- Three Pillars of Mobile Computing -- Power Efficiency -- Internet Connectivity -- Security -- BYOD -- Incident Case Study -- eBay Data Breach -- Target Data Breach -- OpenSSL Heartbleed -- Key Takeaways -- Strong Authentication -- Network Management -- Boot Integrity -- Hardware-Based Protection -- Open-Source Software Best Practice -- Third-Party Software Best Practice -- Security Development Lifecycle -- Assessment -- Architecture -- Design -- Implementation -- Deployment -- Interface Testing -- Penetration Testing -- CVSS -- Limitations -- References -- Chapter 2: Intel's Embedded Solutions: from Management to Security -- Management Engine vs. Intel AMT -- Intel AMT vs. Intel vPro Technology -- Management Engine Overview -- Hardware -- Overlapped I/O -- Firmware -- Software -- Platform and System Management -- Software Solutions -- Hardware Solutions -- In-Band Solutions -- Out-of-Band Solutions -- Intel AMT Overview -- BIOS Extension -- Local Management Service and Tray Icon -- Remote Management -- The Engine's Evolvement: from Management to Security -- Embedded System as Security Solution -- Security Applications at a Glance -- EPID -- PAVP -- IPT -- Boot Guard -- Virtual Security Core: ARM TrustZone -- Secure Mode and Nonsecure Mode -- Memory Isolation -- Bus Isolation -- Physical Isolation vs. Virtual Isolation -- References -- Chapter 3: Building Blocks of the Security and Management Engine -- Random Number Generation -- Message Authentication -- Hash with Multiple Calls -- Symmetric-Key Encryption -- AES -- DES/3DES -- Asymmetric-Key Encryption: RSA -- Key Pair Generation and Validation -- Encryption and Decryption -- Digital Signature -- RSA -- ECDSA. , Key Pair Generation and Validation -- Scalar Multiplication -- Window Method -- Dual Scalar Multiplication -- Hardware Acceleration -- Other Cryptography Functions -- Secure Storage -- Debugging -- Debug Messaging -- Special Production-Signed Firmware Based on Unique Part ID -- Secure Timer -- Host-Embedded Communication Interface -- Direct Memory Access to Host Memory -- References -- Chapter 4: The Engine: Safeguarding Itself before Safeguarding Others -- Access to Host Memory -- Communication with the CPU -- Triggering Power Flow -- Security Requirements -- Confidentiality -- Integrity -- Availability -- Threat Analysis and Mitigation -- Load Integrity -- Memory Integrity -- Memory Encryption -- Task Isolation -- Asset Protection -- Memory Manager -- Thread Manager -- Memory Protection Control -- Loader -- Inter-Task Call Management -- Exception Handler -- Nonprivileged Tasks -- Firmware Update and Downgrade -- Published Attacks -- "Introducing Ring -3 Rootkits " -- References -- Chapter 5: Privacy at the Next Level: Intel's Enhanced Privacy Identification (EPID) Technology -- Redefining Privacy for the Mobile Age -- Passive Anonymity -- Active Anonymity -- Processor Serial Number -- EPID -- Key Structures and Provisioning -- Revocation -- Private Key-Based Revocation -- Signature-Based Revocation -- Group-Based Revocation -- Signature Generation and Verification -- Signature Generation -- Base Name -- Signature Verification -- SIGMA -- Verifier's Certificate -- Messages Breakdown -- Implementation of EPID -- Key Recovery -- Attack Mitigation -- Applications of EPID -- Next Generation of EPID -- Two-way EPID -- Optimization -- References -- Chapter 6: Boot with Integrity, or Don't Boot -- Boot Attack -- Evil Maid -- BIOS and UEFI -- BIOS Alteration -- Software Replacement -- Jailbreaking -- Trusted Platform Module (TPM). , Platform Configuration Register -- Field Programmable Fuses -- Field Programmable Fuses vs. Flash Storage -- Field Programmable Fuse Task -- Intel Boot Guard -- Operating System Requirements for Boot Integrity -- OEM Configuration -- Measured Boot -- Verified Boot -- Manifests -- Verification Flow -- References -- Chapter 7: Trust Computing, Backed by the Intel Platform Trust Technology -- TPM Overview -- Cryptography Subsystem -- Storage -- Endorsement Key -- Attestation -- Binding and Sealing -- Intel Platform Trust Technology -- Cryptography Algorithms -- Endorsement Key Storage -- Endorsement Key Revocation -- Endorsement Certificate -- Supporting Security Firmware Applications -- Integrated vs. Discrete TPM -- References -- Chapter 8: Unleashing Premium Entertainment with Hardware-Based Content Protection Technology -- Rights Protection -- DRM Schemes -- Device Key Management -- Rights Management -- Playback -- UltraViolet -- End-to-End Content Protection -- Content Server -- License Server -- Software Stack -- External Display -- Weak Points -- Intel's Hardware-Based Content Protection -- Protected Audio and Video Path (PAVP) -- Device Key Provisioning -- Rights Management -- Intel Wireless Display -- Authentication and Key Exchange -- Content Protection on TrustZone -- References -- Chapter 9: Breaking the Boundaries with Dynamically Loaded Applications -- Closed-Door Model -- DAL Overview -- DAL Architecture -- Loading an Applet -- Secure Timer -- Host Storage Protection -- Security Considerations -- Reviewing and Signing Process -- References -- Chapter 10: Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft -- One-Time Password -- HOTP -- TOTP -- Transaction Signing -- OTP Tokens -- Embedded OTP and OCRA -- Token Installation -- TOTP and OCRA Generation -- Highlights and Lowlights. , Protected Transaction Display -- Drawing a Sprite -- Gathering the User's PIN Input -- Firmware Architecture -- Embedded PKI and NFC -- References -- Chapter 11: Looking Ahead: Tomorrow's Innovations Built on Today's Foundation -- Isolated Computing Environment -- Security-Hardening Measures -- Basic Utilities -- Anonymous Authentication and Secure Session Establishment -- Protected Input and Output -- Dynamic Application Loader -- Summary of Firmware Ingredients -- Software Guard Extensions -- More Excitement to Come -- References -- Index.
    Weitere Ausg.: Print version: Ruan, Xiaoyu Platform Embedded Security Technology Revealed Berkeley, CA : Apress L. P.,c2014 ISBN 9781430265719
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books ; Electronic books. ; Electronic books.
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almahu_9948028271702882
    Umfang: XXIV, 371 p. 133 illus., 67 illus. in color. , online resource.
    ISBN: 9783030044978
    Serie: Lecture Notes in Artificial Intelligence ; 11289
    Inhalt: The two-volume set LNAI 11288 and 11289 constitutes the proceedings of the 17th Mexican International Conference on Artificial Intelligence, MICAI 2018, held in Guadalajara, Mexico, in October 2018. The total of 62 papers presented in these two volumes was carefully reviewed and selected from 149 submissions. The contributions are organized in topical as follows: Part I: evolutionary and nature-inspired intelligence; machine learning; fuzzy logic and uncertainty management. Part II: knowledge representation, reasoning, and optimization; natural language processing; and robotics and computer vision.
    Anmerkung: Knowledge Representation, Reasoning, and Optimization -- Coding 3D connected regions with F26 chain code -- Finding optimal farming practices to increase crop yield through Global-best Harmony Search and predictive models, a data-driven approach -- On the Modelling of the Energy System of a Country for Decision Making Using Bayesian Artificial Intelligence { A case study for Mexico -- Natural Language Processing -- Enhancement of performance of document clustering in the authorship identification problem with a weighted cosine similarity -- Exploring the Context of Lexical Functions -- Towards a Natural Language Compiler -- Comparative analysis and implementation of semantic-based classifiers -- Best Paper award, second place: Topic-Focus Articulation: A Third Pillar of Automatic Evaluation of Text Coherence -- A Multilingual Study of Compressive Cross-Language Text Summarization -- WiSeBE: Window-based Sentence Boundary Evaluation -- Readability Formula for Russian Texts: a Modified Version -- Timed automaton RVT-grammar for workflow translating -- Extraction of Typical Client Requests from Bank Chat Logs -- A Knowledge-based Methodology for Building a Conversational Chatbot as an Intelligent Tutor -- Top-k Context-Aware Tour Recommendations for Groups -- A Knowledge-based Weighted kKNN for Detecting Irony in Twitter -- Model for Personality Detection based on Text Analysis -- Analysis of Emotions through Speech Using the Combination of Multiple Input Sources with Deep Convolutional and LSTM Networks -- Robustness of LSTM Neural Networks for the Enhancement of Spectral Parameters in Noisy Speech Signals -- Tensor Decomposition for Imagined Speech Discrimination in EEG -- Robotics and Computer Vision -- A new software library for mobile sensing using FIWARE technologies -- Free model task space controller based on adaptive gain for robot manipulator using Jacobian estimation -- Design and Equilibrium Control of a Force-Balanced One-Leg Mechanism -- An Adaptive Robotic Assistance Platform for Neurorehabilitation Therapy of Upper Limb -- ROBMMOR: An experimental robotic manipulator for motor rehabilitation of knee -- A Bio-inspired Cybersecurity Scheme to Protect a Swarm of Robots -- Chaos optimization applied to a beamforming algorithm for source location -- Data Augmentation in Deep Learning-based Obstacle Detection System for Autonomous Navigation on Aquatic Surfaces -- Best Paper award, third place: Combining Deep Learning and RGBD SLAM for Monocular Indoor Autonomous Flight.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783030044961
    Weitere Ausg.: Printed edition: ISBN 9783030044985
    Sprache: Englisch
    Schlagwort(e): Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Northampton, MA :Edward Elgar Pub.,
    UID:
    almahu_9948265329002882
    Umfang: 1 online resource (3 v. (2,608 p.)) ; , cm.
    ISBN: 9781785360589 (e-book)
    Serie: International library of critical writings in economics ; 327
    Inhalt: This extensive research review discusses more than one hundred of the very best and most influential scholarly articles on the sovereign debt of central governments around the world. It examines discussions of the debt of many emerging nations as well as the largest sovereign debtors in the world thus providing a thorough understanding of sovereign debt as seen by the best economists from around the world. This research review is an essential tool to libraries, academic institutions, economic scholars and students alike.
    Anmerkung: The recommended readings are available in the print version, or may be available via the link to your library's holdings. , Recommended readings (Machine generated): Robert J. Barro (1974), 'Are Government Bonds Net Wealth?', Journal of Political Economy, 82 (6), November-December, 1095-117 -- Robert J. Barro (1979), 'On the Determination of the Public Debt', Journal of Political Economy, 87 (5, Part 1), October, 940-71 -- Martin Feldstein (1985), 'Debt and Taxes in the Theory of Public Finance', Journal of Public Economics, 28 (2), November, 233-45 -- Jonathan Eaton and Mark Gersovitz (1981), 'Debt with Potential Repudiation: Theoretical and Empirical Analysis', Review of Economic Studies, XLVII (2), April, 289-309 -- Jonathan Eaton, Mark Gersovitz and Joseph E. Stiglitz (1986), 'The Pure Theory of Country Risk', European Economic Review, 30 (3), June, 481-513 -- Herschel I. Grossman and John B. Van Huyck, (1988), 'Sovereign Debt as a Contingent Claim: Excusable Default, Repudiation, and Reputation', American Economic Review, 78 (5), December, 1088-97 -- Jeremy Bulow and Kenneth Rogoff (1989), 'Sovereign Debt: Is to Forgive to Forget?', American Economic Review, 79 (1), March, 43-50 -- Jeremy Bulow and Kenneth Rogoff (1989), 'A Constant Recontracting Model of Sovereign Debt', Journal of Political Economy, 97 (1), February, 155-78 -- Harold L. Cole and Patrick J. Kehoe (1998), 'Models of Sovereign Debt: Partial Versus General Reputations', International Economic Review, 39 (1), February, 55-70 -- Kenneth M. Kletzer and Brian D. Wright (2000), 'Sovereign Debt as Intertemporal Barter', American Economic Review, 90 (3), June, 621-39 -- John M. Veitch (1986), 'Repudiations and Confiscations by the Medieval State', Journal of Economic History, 46 (1), March, 31-6 -- J. Bradford De Long and Andrei Shleifer (1993), 'Princes and Merchants: European City Growth Before the Industrial Revolution', Journal Of Law and Economics, XXXVI (2), October, 671-702 -- James Conklin (1998), 'The Theory of Sovereign Debt and Spain under Philip II', Journal of Political Economy, 106 (3), June, 483-513 -- Mauricio Drelichman and Hans-Joachim Voth (2010), 'The Sustainable Debts of Philip II: A Reconstruction of Castile's Fiscal Position, 1566-1596', Journal of Economic History, 70 (4), December, 813-42 -- Mauricio Drelichman and Hans-Joachim Voth (2011), 'Lending to the Borrower from Hell: Debt and Default in the Age of Philip II', Economic Journal, 121 (557), December, 1205-27, technical appendix -- Mauricio Drelichman and Hans-Joachim Voth (2011), 'Serial Defaults, Serial Profits: Returns to Sovereign Lending in Habsburg Spain, 1566-1600', Explorations in Economic History, 48 (1), January, 1-19 -- Mauricio Drelichman and Hans-Joachim Voth (2015), 'Risk Sharing with the Monarch: Contingent Debt and Excusable Defaults in the Age of Philip II, 1556-1598', Cliometrica, 9 (1), January, 49-75 -- Earl J. Hamilton (1947), 'Origin and Growth of the National Debt in Western Europe', American Economic Review, 37 (2), May, 118-30 -- David R. Weir (1989), 'Tontines, Public Finance, and Revolution in France and England, 1688-1789', Journal of Economic History, 49 (1), March, 95-124. , Douglass C. North and Barry R. Weingast (1989), 'Constitutions and Commitment: The Evolution of Institutional Governing Public Choice in Seventeenth-Century England', Journal of Economic History, XLIX (4), December, 803-32 -- David Stasavage (2002), 'Credible Commitment in Early Modern Europe: North and Weingast Revisited', Journal of Law Economics and Organization, 18 (1), April, 155-86 -- Kenneth A. Schultz and Barry R. Weingast (2003), 'The Democratic Advantage: Institutional Foundations of Financial Power in International Competition', International Organization, 57 (1), Winter, 3-42 -- Sebastian M. Saiegh (2005), 'Do Countries Have a 'Democratic Advantage"?: Political Institutions, Multilateral Agencies, and Sovereign Borrowing', Comparative Political Studies, 38 (4), May, 366-87 -- David Stasavage (2007), 'Cities, Constitutions, and Sovereign Borrowing in Europe, 1274-1785', International Organization, 61 (3), July, 489-525 -- Candace C. Archer, Glen Biglaiser and Karl DeRouen Jr. (2007), 'Sovereign Bonds and the 'Democratic Advantage": Does Regime Type Affect Credit Rating Agency Ratings in the Developing World?', International Organization, 61 (2), April, 341-65 -- Glen Biglaiser and Joseph L. Staats (2012), 'Finding the 'Democratic Advantage" in Sovereign Bond Ratings: The Importance of Strong Courts, Property Rights Protection, and the Rule of Law', International Organization, 66 (3), July, 515-35 -- Emanuel Kohlscheen (2007), 'Why Are There Serial Defaulters? Evidence from Constitutions', Journal of Law and Economics, 50 (4), November, 713-30 -- Juan Carlos Hatchondo and Leonardo Martinez (2010), 'The Politics of Sovereign Defaults', Economic Quarterly, 96 (3), Third Quarter, 291-317 -- Atif Mian, Amir Sufi and Francesco Trebbi (2014), 'Resolving Debt Overhangs: Political Constraints in the Aftermath of Financial Crises', American Economic Journal: Macroeconomics, 6 (2), April, 1-28 -- Mark Dincecco (2010), 'The Political Economy of Fiscal Prudence in Historical Perspective', Economics and Politics, 22 (1), March, 1-36 -- Michael D. Bordo (1999), 'International Rescues versus Bailouts: A Historical Perspective', Cato Journal, 18 (3), Winter, 363-75 -- John Joseph Wallis (2000), 'American Government Finance in the Long Run: 1790 to 1990', Journal of Economic Perspectives, 14 (1), Winter, 61-82 -- Carmen M. Reinhart and Vincent R. Reinhart (2015), 'Financial Crises, Development, and Growth: A Long-Term Perspective', World Bank Economic Review, Annual Bank Conference on Development Economics 'The Role of Theory in Development Economics" June 2-3, 2014 Washington D.C., 29 (Supplement 1), April, S57-S76 -- Carmen M. Reinhart, Vincent R. Reinhart and Kenneth S. Rogoff (2012), 'Public Debt Overhangs: Advanced-Economy Episodes Since 1800', Journal of Economic Perspectives, 26 (3), Summer, 69-86 -- Moritz Schularick and Alan M. Taylor (2012), 'Credit Booms Gone Bust: Monetary Policy, Leverage Cycles, and Financial Crises, 1870-2008', American Economic Review, 102 (2), April, 1029-61 -- Michael D. Bordo and Eugene N. White (1991), 'A Tale of Two Currencies: British and French Finance During the Napoleonic Wars', Journal of Economic History, 51 (2), June, 303-16 -- Marc Flandreau and Juan H. Flores (2009), 'Bonds and Brands: Foundations of Sovereign Debt Markets, 1820-1830', Journal of Economic History, 69 (3), September, 646-84 -- Gerardo della Paolera and Alan M. Taylor (2013), 'Sovereign Debt in Latin America, 1820-1913', Revista de Historia Económica/Journal of Iberian and Latin American Economic History, 31 (2), September, 173-217. , Richard Sicotte, Catalina Vizcarra and Kirsten Wandschneider (2010), 'Military Conquest and Sovereign Debt: Chile, Peru and the London Bond Market, 1876-1890', Cliometrica, 4 (3), October, 293-319 -- Marc D. Weidenmier (2005), 'Gunboats, Reputation, and Sovereign Repayment: Lessons from the Southern Confederacy', Journal of International Economics, 66 (2), July, 407-22 -- Michael D. Bordo and Hugh Rockoff (1992), 'The Gold Standard as a 'Good Housekeeping Seal of Approval"', Journal of Economic History, 56 (2), June, 389-428 -- Niall Ferguson and Moritz Schularick (2006), 'The Empire Effect: The Determinants of Country Risk in the First Age of Globalization, 1880-1913', Journal of Economic History, 66 (2), June, 283-312 -- Theodore Roosevelt (1904) 'President Theodore Roosevelt's Annual Message to Congress', delivered December 6th, 1904 -- Kris Mitchener and Marc Weidenmier (2005), 'Empire, Public Goods, and the Roosevelt Corollary', Journal of Economic History, 65 (3), September, 658-92 -- Kris James Mitchener and Marc D. Weidenmier (2010), 'Supersanctions and Sovereign Debt Repayment', Journal of International Money and Finance, 29 (1), February, 19-36 -- Barry Eichengreen and Ricardo Hausmann (1999) 'Exchange Rates and Financial Fragility' in Federal Reserve Bank of Kansas City (eds.), New Challenges for Monetary Policy, 329-68 -- Michael D. Bordo and Christopher M. Meissner (2006), 'The Role of Foreign Currency Debt in Financial Crises: 1880-1913 versus 1972-1997', Journal of Banking and Finance, 30 (12), December, 3299-329 -- Lyndon Moore and Jakub Kaluzny (2005), 'Regime Change and Debt Default: The Case of Russia, Austro-Hungary, and the Ottoman Empire following World War One', Explorations in Economic History, 42 (2), April, 237-58 -- Kim Oosterlinck and John S. Landon-Lane (2006), 'Hope Springs Eternal - French Bondholders and the Soviet Repudiation (1915-1919)', Review of Finance, 10 (4), 507-35 -- Barry Eichengreen and Richard Portes (1986), 'Debt and Default in the 1930s: Causes and Consequences', European Economic Review, 30 (3), June, 599-640 -- Barry Eichengreen (1991), 'Historical Research on International Lending and Debt', Journal of Economic Perspectives, 5 (2), Spring, 149-69 -- Peter Boone and Simon Johnson (2014), 'Forty Years of Leverage: What Have We Learned About Sovereign Debt?', American Economic Review: Papers and Proceedings, 104 (5), May, 266-71 -- Paolo Manasse and Nouriel Roubini (2009), ''Rules for Thumb' for Sovereign Debt Crises', Journal of International Economics, 78 (2), July, 192-205 -- Bergljot Barkbu, Barry Eichengreen and Ashoka Mody (2012), 'Financial Crises and the Multilateral Response: What the Historical Record Shows', Journal of International Economics, 88 (2), November, 422-35 -- Allan H. Meltzer (1984), 'The International Debt Problem', Cato Journal, 4 (1), Sping/Summer, 63-9 -- Jeffrey Sachs (1986), 'Managing the LDC Debt Crisis', Brookings Paper on Economic Activity, No. 2, 397-431 -- Jeffrey Sachs and Harry Huizinga (1987), 'U.S. Commercial Banks and the Developing-Country Debt Crisis', Brookings Paper on Economic Activity, No. 2, 555-601. , Jeremy Bulow (2002), 'First World Governments and Third World Debt', Brookings Papers on Economic Activity, No. 1, 229-55 -- Allan H. Meltzer (2004), 'Argentina 2002: A Case of Government Failure', Cato Journal, 23 (1), Spring/Summer, 29-31 -- Eugenio Andrea Bruno (2006), 'The Failure of Debt-Based Development: Lessons from Argentina', Cato Journal, 26 (2), Spring/Summer, 357-65 -- Juan Carlos Hatchondo, Leonardo Martinez and Horacio Sapriza (2007), 'The Economics of Sovereign Default', Economic Quarterly, 93 (2), Spring, 163-87 -- Ugo Panizza, Federico Sturzenegger and Jeromin Zettelmeyer (2009), 'The Economics and Law of Sovereign Debt and Default', Journal of Economic Literature, 47 (3), September, 651-98 -- Michael Tomz and Mark L. J. Wright (2013), 'Empirical Research on Debt and Default', Annual Review of Economics, 5, August, 247-72 -- Fernando Broner, Alberto Martin and Jaume Ventura (2010), 'Sovereign Risk and Secondary Markets', American Economic Review, 100 (4), September, 1523-55 -- Michael Tomz and Mark L. J. Wright (2007), 'Do Countries Default in 'Bad Times'?', Journal of the European Economic Association, 5 (2-3), April-May, 352-60 -- Edward I. Altman and Herbert A. Rijken (2011), 'Toward a Bottom-Up Approach to Assessing Sovereign Default Risk', Journal of Applied Corporate Finance, 23 (1), Winter, 20-31 -- Federico Sturzenegger and Jeromin Zettelmeyer (2008), 'Haircuts: Estimating Investor Losses in Sovereign Debt Restructurings, 1998-2005', Journal of International Money and Finance, 27 (5), September, 780-805 -- Juan J. Cruces and Christoph Trebesch (2013), 'Sovereign Defaults: The Price of Haircuts', American Economic Journal: Macroeconomics, 5 (3), July, 85-117 -- Miguel Fuentes and Diego Saravia (2010), 'Sovereign Defaulters: Do International Capital Markets Punish Them?', Journal of Development Economics, 91 (2), March, 336-47 -- Eduardo Levy Yeyati and Ugo Panizza (2011), 'The Elusive Costs of Sovereign Defaults', Journal of Development Economics, 94 (1), January, 95-105 -- Alberto Alesina and David Dollar (2000), 'Who Gives Foreign Aid to Whom and Why?', Journal of Economic Growth, 5 (1), March, 33-63 -- Alberto Alesina and Beatrice Weder (2002), 'Do Corrupt Governments Receive Less Foreign Aid?', American Economic Review, 92 (4), September, 1126-37 -- Craig Burnside and David Dollar (2000), 'Aid, Policies and Growth', American Economic Review, 90 (4), September, 847-68 -- Robert J. Barro and Jong-Wha Lee (2005), 'IMF Programs: Who is Chosen and What Are the Effects?', Journal of Monetary Economics, 52 (7), October, 1245-69 -- William Easterly (2002), 'How Did Heavily Indebted Poor Countries Become Heavily Indebted? Reviewing Two Decades of Debt Relief', World Development, 30 (10), October, 1677-96 -- Serkan Arslanalp and Peter Blair Henry (2005), 'Is Debt Relief Efficient?', Journal of Finance, LX (2), April, 1017-51. , Federico Sturzenegger and Jeromin Zettelmeyer (2007), 'Creditors' Losses Versus Debt Relief: Results From a Decade of Sovereign Debt Crises', Journal of the European Economic Association, 5 (2-3), April-May, 343-51 -- Rutsel Silvestre J. Martha (1990), 'Preferred Creditor Status under International Law: The Case of the International Monetary Fund', International and Comparative Law Quarterly, 39 (4), October, 801-26 -- Raghuram G. Rajan (2005), 'Institutional Reform and Sovereign Debt Crises', Cato Journal, 25 (1), Winter, 17-24 -- Nouriel Roubini and Jeffrey Sachs (1989), 'Government Spending and Budget Deficits in the Industrial Countries', Economic Policy, 4 (8), April, 99-132 -- Marina Azzimonti, Eva de Francisco and Vincenzo Quadrini (2014), 'Financial Globalization, Inequality, and the Rising Public Debt', American Economic Review, 104 (8), August, 2267-302 -- Viral Acharya, Itamar Drechsler and Philipp Schnabl (2014), 'A Pyrrhic Victory? Bank Bailouts and Sovereign Credit Risk', Journal of Finance, LXIX (6), December, 2689-739 -- Mark Aguiar, Manuel Amador, Emmanuel Farhi and Gita Gopinath (2014), 'Sovereign Debt Booms in Monetary Unions', American Economic Review: Papers and Proceedings, 104 (5), May, 101-6 -- Laurence J. Kotlikoff (2004), 'Fiscal Policy and the Future of the Euro', Cato Journal, 24 (1-2), Spring/Summer, 51-5 -- Jerome L. Stein (2011), 'The Diversity of Debt Crises in Europe', Cato Journal, 31 (2), Spring/Summer, 199-215 -- Philip R. Lane (2012), 'The European Sovereign Debt Crisis', Journal of Economic Perspectives, 26 (3), Summer, 49-67 -- Kevin H. O'Rourke and Alan M. Taylor (2013), 'Cross of Euros', Journal of Economic Perspectives, 27 (3), March, 167-91 -- John Beirne and Marcel Fratzscher (2013), 'The Pricing of Sovereign Risk and Contagion During the European Sovereign Debt Crisis', Journal of International Money and Finance, 34, April, 60-82 -- Carmen M. Reinhart and Kenneth S. Rogoff (2010), 'Growth in a Time of Debt', American Economic Review, 100 (2), May, 573-78 -- Thomas Herndon, Michael Ash and Robert Pollin (2014), 'Does High Public Debt Consistently Stifle Economic Growth? A Critique of Reinhart and Rogoff', Cambridge Journal of Economics, 38 (2), December, 257-79 -- Ugo Panizza and Andrea F. Presbitero (2013), 'Public Debt and Economic Growth in Advanced Economies: A Survey', Swiss Journal of Economics in Statistics, 149 (2), 175-204 -- Anja Baum, Cristina Checherita-Westphal and Philipp Rother (2013), 'Debt and Growth: New Evidence from the Euro Area', Journal of International Money and Finance, 32, February, 809-21 -- Alan J. Auerbach, Jagadeesg Gokhale and Laurence J. Kotlikoff (1994), 'Generating Accounting: A Meaningful Way to Evaluate Fiscal Policy', Journal of Economic Perspectives, 8 (1), Winter, 73-94 -- Pierre Lemieux (2013), 'American and European Welfare States: Similar Causes, Similar Effects', Cato Journal, 33 (2), Spring/Summer, 227-32 -- Michael Tanner (2013), 'Is America Becoming Greece?', Cato Journal, 33 (2), Spring/Summer, 211-25. , John H. Cochrane (2011), 'Inflation and Debt', National Affairs, Fall, 56-78 -- Carmen Reinhart and M. Belen Sbrancia (2015), 'The Liquidation of Government Debt', Economic Policy, 30 (82), April, 291-333 -- James M. Buchanan (1986), 'The Ethics of Debt Default', in James M. Buchanan, Charles K. Rowley and Robert D. Tollison (eds.), Deficit, Oxford, UK: Basil Blackwell, 361-73 -- Geoffrey Brennan and Giuseppe Eusepi (2002), 'The Dubious Ethics of Debt Default', Public Finance Review, 30 (6), November, 546-61 -- Seema Jayachandran and Michael Kremer (2006), 'Odious Debt', American Economic Review, 96 (1), March, 82-92 -- Albert H. Choi and Eric A. Posner (2007), 'A Critique of the Odious Debt Doctrine', Law and Contemporary Problems, 70 (3), Summer, 33-51 -- Nouriel Roubini (2002), 'Do We Need a New Bankruptcy Regime?', Brookings Papers on Economic Activity, 1, 321-33 -- Andrei Shleifer (2003), 'Will the Sovereign Debt Market Survive?', American Economic Review, 93 (2), May, 85-90 -- Rohan Pitchford and Mark L. J. Wright (2012), 'Holdouts in Sovereign Debt Restructuring: A Theory of Negotiation in a Weak Contractual Environment', Review of Economic Studies, 79 (2), April, 812-37 -- Robert W. Kolb (2015), 'The Virtue of Vultures: Distressed Debt Investors in the Sovereign Debt Market', Journal of Social, Political, and Economic Studies, 40 (4), Winter, 368-412.
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((Currently Only Available on Campus))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Cambridge :Cambridge University Press,
    UID:
    almahu_9947414424202882
    Umfang: 1 online resource (xiii, 207 pages) : , digital, PDF file(s).
    ISBN: 9781139225694 (ebook)
    Inhalt: Constructing International Security helps policy makers and students recognize effective third-party strategies for balancing deterrence and restraint in security relationships. Brett V. Benson shows that there are systematic differences among types of security commitments. Understanding these commitments is key, because commitments, such as formal military alliances and extended deterrence threats, form the basis of international security order. Benson argues that sometimes the optimal commitment conditions military assistance on specific hostile actions the adversary might take. At other times, he finds, it is best to be ambiguous by leaving an ally and adversary uncertain about whether the third party will intervene. Such uncertainty transfers risk to the ally, thereby reducing the ally's motivation to behave too aggressively. The choice of security commitment depends on how well defenders can observe hostilities leading to war and on their evaluations of dispute settlements, their ally's security and the relative strength of the defender.
    Anmerkung: Title from publisher's bibliographic system (viewed on 05 Oct 2015). , Machine generated contents note: 1. Understanding the design of security commitments; 2. A typology of third-party commitments; 3. Time consistency and entrapment; 4. Evidence of moral hazard in military alliances; 5. A theory of commitment design; 6. Testing the implications for alliance design; 7. Deterrent commitments in East Asia; 8. Constructing security in today's world.
    Weitere Ausg.: Print version: ISBN 9781107027244
    Sprache: Englisch
    Schlagwort(e): Electronic books
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    almahu_9949301350302882
    Umfang: 1 online resource (565 pages)
    ISBN: 9781484255742
    Anmerkung: Intro -- Table of Contents -- About the Authors -- Preface -- Acknowledgments -- Chapter 1: Introduction -- Read the Book, Not the Spec -- SYCL 1.2.1 vs. SYCL 2020, and DPC++ -- Getting a DPC++ Compiler -- Book GitHub -- Hello, World! and a SYCL Program Dissection -- Queues and Actions -- It Is All About Parallelism -- Throughput -- Latency -- Think Parallel -- Amdahl and Gustafson -- Scaling -- Heterogeneous Systems -- Data-Parallel Programming -- Key Attributes of DPC++ and SYCL -- Single-Source -- Host -- Devices -- Sharing Devices -- Kernel Code -- Kernel: Vector Addition (DAXPY) -- Asynchronous Task Graphs -- Race Conditions When We Make a Mistake -- C++ Lambda Functions -- Portability and Direct Programming -- Concurrency vs. Parallelism -- Summary -- Chapter 2: Where Code Executes -- Single-Source -- Host Code -- Device Code -- Choosing Devices -- Method#1: Run on a Device of Any Type -- Queues -- Binding a Queue to a Device, When Any Device Will Do -- Method#2: Using the Host Device for Development and Debugging -- Method#3: Using a GPU (or Other Accelerators) -- Device Types -- Accelerator Devices -- Device Selectors -- When Device Selection Fails -- Method#4: Using Multiple Devices -- Method#5: Custom (Very Specific) Device Selection -- device_selector Base Class -- Mechanisms to Score a Device -- Three Paths to Device Code Execution on CPU -- Creating Work on a Device -- Introducing the Task Graph -- Where Is the Device Code? -- Actions -- Fallback -- Summary -- Chapter 3: Data Management -- Introduction -- The Data Management Problem -- Device Local vs. Device Remote -- Managing Multiple Memories -- Explicit Data Movement -- Implicit Data Movement -- Selecting the Right Strategy -- USM, Buffers, and Images -- Unified Shared Memory -- Accessing Memory Through Pointers -- USM and Data Movement -- Explicit Data Movement in USM. , Implicit Data Movement in USM -- Buffers -- Creating Buffers -- Accessing Buffers -- Access Modes -- Ordering the Uses of Data -- In-order Queues -- Out-of-Order (OoO) Queues -- Explicit Dependences with Events -- Implicit Dependences with Accessors -- Choosing a Data Management Strategy -- Handler Class: Key Members -- Summary -- Chapter 4: Expressing Parallelism -- Parallelism Within Kernels -- Multidimensional Kernels -- Loops vs. Kernels -- Overview of Language Features -- Separating Kernels from Host Code -- Different Forms of Parallel Kernels -- Basic Data-Parallel Kernels -- Understanding Basic Data-Parallel Kernels -- Writing Basic Data-Parallel Kernels -- Details of Basic Data-Parallel Kernels -- The range Class -- The id Class -- The item Class -- Explicit ND-Range Kernels -- Understanding Explicit ND-Range Parallel Kernels -- Work-Items -- Work-Groups -- Sub-Groups -- Writing Explicit ND-Range Data-Parallel Kernels -- Details of Explicit ND-Range Data-Parallel Kernels -- The nd_range Class -- The nd_item Class -- The group Class -- The sub_group Class -- Hierarchical Parallel Kernels -- Understanding Hierarchical Data-Parallel Kernels -- Writing Hierarchical Data-Parallel Kernels -- Details of Hierarchical Data-Parallel Kernels -- The h_item Class -- The private_memory Class -- Mapping Computation to Work-Items -- One-to-One Mapping -- Many-to-One Mapping -- Choosing a Kernel Form -- Summary -- Chapter 5: Error Handling -- Safety First -- Types of Errors -- Let's Create Some Errors! -- Synchronous Error -- Asynchronous Error -- Application Error Handling Strategy -- Ignoring Error Handling -- Synchronous Error Handling -- Asynchronous Error Handling -- The Asynchronous Handler -- Invocation of the Handler -- Errors on a Device -- Summary -- Chapter 6: Unified Shared Memory -- Why Should We Use USM? -- Allocation Types -- Device Allocations. , Host Allocations -- Shared Allocations -- Allocating Memory -- What Do We Need to Know? -- Multiple Styles -- Allocations à la C -- Allocations à la C++ -- C++ Allocators -- Deallocating Memory -- Allocation Example -- Data Management -- Initialization -- Data Movement -- Explicit -- Implicit -- Migration -- Fine-Grained Control -- Queries -- Summary -- Chapter 7: Buffers -- Buffers -- Creation -- Buffer Properties -- use_host_ptr -- use_mutex -- context_bound -- What Can We Do with a Buffer? -- Accessors -- Accessor Creation -- What Can We Do with an Accessor? -- Summary -- Chapter 8: Scheduling Kernels and Data Movement -- What Is Graph Scheduling? -- How Graphs Work in DPC++ -- Command Group Actions -- How Command Groups Declare Dependences -- Examples -- When Are the Parts of a CG Executed? -- Data Movement -- Explicit -- Implicit -- Synchronizing with the Host -- Summary -- Chapter 9: Communication and Synchronization -- Work-Groups and Work-Items -- Building Blocks for Efficient Communication -- Synchronization via Barriers -- Work-Group Local Memory -- Using Work-Group Barriers and Local Memory -- Work-Group Barriers and Local Memory in ND-Range Kernels -- Local Accessors -- Synchronization Functions -- A Full ND-Range Kernel Example -- Work-Group Barriers and Local Memory in Hierarchical Kernels -- Scopes for Local Memory and Barriers -- A Full Hierarchical Kernel Example -- Sub-Groups -- Synchronization via Sub-Group Barriers -- Exchanging Data Within a Sub-Group -- A Full Sub-Group ND-Range Kernel Example -- Collective Functions -- Broadcast -- Votes -- Shuffles -- Loads and Stores -- Summary -- Chapter 10: Defining Kernels -- Why Three Ways to Represent a Kernel? -- Kernels As Lambda Expressions -- Elements of a Kernel Lambda Expression -- Naming Kernel Lambda Expressions -- Kernels As Named Function Objects. , Elements of a Kernel Named Function Object -- Interoperability with Other APIs -- Interoperability with API-Defined Source Languages -- Interoperability with API-Defined Kernel Objects -- Kernels in Program Objects -- Summary -- Chapter 11: Vectors -- How to Think About Vectors -- Vector Types -- Vector Interface -- Load and Store Member Functions -- Swizzle Operations -- Vector Execution Within a Parallel Kernel -- Vector Parallelism -- Summary -- Chapter 12: Device Information -- Refining Kernel Code to Be More Prescriptive -- How to Enumerate Devices and Capabilities -- Custom Device Selector -- Being Curious: get_info< -- > -- -- Being More Curious: Detailed Enumeration Code -- Inquisitive: get_info< -- > -- -- Device Information Descriptors -- Device-Specific Kernel Information Descriptors -- The Specifics: Those of "Correctness" -- Device Queries -- Kernel Queries -- The Specifics: Those of "Tuning/Optimization" -- Device Queries -- Kernel Queries -- Runtime vs. Compile-Time Properties -- Summary -- Chapter 13: Practical Tips -- Getting a DPC++ Compiler and Code Samples -- Online Forum and Documentation -- Platform Model -- Multiarchitecture Binaries -- Compilation Model -- Adding SYCL to Existing C++ Programs -- Debugging -- Debugging Kernel Code -- Debugging Runtime Failures -- Initializing Data and Accessing Kernel Outputs -- Multiple Translation Units -- Performance Implications of Multiple Translation Units -- When Anonymous Lambdas Need Names -- Migrating from CUDA to SYCL -- Summary -- Chapter 14: Common Parallel Patterns -- Understanding the Patterns -- Map -- Stencil -- Reduction -- Scan -- Pack and Unpack -- Pack -- Unpack -- Using Built-In Functions and Libraries -- The DPC++ Reduction Library -- The reduction Class -- The reducer Class -- User-Defined Reductions -- oneAPI DPC++ Library -- Group Functions. , Direct Programming -- Map -- Stencil -- Reduction -- Scan -- Pack and Unpack -- Pack -- Unpack -- Summary -- For More Information -- Chapter 15: Programming for GPUs -- Performance Caveats -- How GPUs Work -- GPU Building Blocks -- Simpler Processors (but More of Them) -- Expressing Parallelism -- Expressing More Parallelism -- Simplified Control Logic (SIMD Instructions) -- Predication and Masking -- SIMD Efficiency -- SIMD Efficiency and Groups of Items -- Switching Work to Hide Latency -- Offloading Kernels to GPUs -- SYCL Runtime Library -- GPU Software Drivers -- GPU Hardware -- Beware the Cost of Offloading! -- Transfers to and from Device Memory -- GPU Kernel Best Practices -- Accessing Global Memory -- Accessing Work-Group Local Memory -- Avoiding Local Memory Entirely with Sub-Groups -- Optimizing Computation Using Small Data Types -- Optimizing Math Functions -- Specialized Functions and Extensions -- Summary -- For More Information -- Chapter 16: Programming for CPUs -- Performance Caveats -- The Basics of a General-Purpose CPU -- The Basics of SIMD Hardware -- Exploiting Thread-Level Parallelism -- Thread Affinity Insight -- Be Mindful of First Touch to Memory -- SIMD Vectorization on CPU -- Ensure SIMD Execution Legality -- SIMD Masking and Cost -- Avoid Array-of-Struct for SIMD Efficiency -- Data Type Impact on SIMD Efficiency -- SIMD Execution Using single_task -- Summary -- Chapter 17: Programming for FPGAs -- Performance Caveats -- How to Think About FPGAs -- Pipeline Parallelism -- Kernels Consume Chip "Area" -- When to Use an FPGA -- Lots and Lots of Work -- Custom Operations or Operation Widths -- Scalar Data Flow -- Low Latency and Rich Connectivity -- Customized Memory Systems -- Running on an FPGA -- Compile Times -- The FPGA Emulator -- FPGA Hardware Compilation Occurs "Ahead-of-Time" -- Writing Kernels for FPGAs. , Exposing Parallelism.
    Weitere Ausg.: Print version: Reinders, James Data Parallel C++ Berkeley, CA : Apress L. P.,c2020 ISBN 9781484255735
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    San Diego :Plural Publishing, Incorporated,
    UID:
    almahu_9949465355402882
    Umfang: 1 online resource (649 pages)
    Ausgabe: 2nd ed.
    ISBN: 9781635501629
    Inhalt: Covering an array of evidence-based content, including aphasia, traumatic brain injury, dementia, and language in aging, Aphasia and Other Acquired Neurogenic Language Disorders: A Guide for Clinical Excellence, Second Edition is a must-have textbook for clinicians and students studying to be speech-language pathologists. This clinical guide strategically addresses scientific foundations, service delivery, international and multicultural perspectives, assessment, and treatment.
    Anmerkung: Intro -- What Is Special About This Book? -- Acknowledgments -- About the Author -- Dedication -- Section I. Welcome and Introduction -- Chapter 1. Welcome to the Fantastic World of Research and Clinical Practice in Acquired Neurogenic Communication Disorders -- What Are Acquired Cognitive-Linguistic Disorders? -- Which Neurogenic Communication Disorders Are Not Acquired Language Disorders? -- What Is Clinical Aphasiology? -- What Is So Fantastic About the World of Neurogenic Communication Disorders? -- We Work With Wonderful People and Become Part of Their Rich Life Stories -- We Are Catalysts for Positive Change -- We Enjoy Empowerment of Others Through Advocacy and Leadership -- We Enjoy a Great Deal of Humor and Fascination -- We Enjoy Fantastic Local and Worldwide Professional Networks -- Our Work Is Multicultural and Multilingual -- We Are Lifelong Learners -- We Tap Into Our Most Scientific and Our Most Creative Selves at the Same Time -- We Have Rich Career Opportunities -- What Disciplines Are Relevant to Aphasia and Related Disorders? -- What Is Known About the Incidence and Prevalence of Acquired Neurogenic Language Disorders? -- Where Do Aphasiologists Work? -- What Is the Career Outlook for Clinical Aphasiologists? -- Learning and Reflection Activities -- Chapter 2. Becoming the Ultimate Excellent Clinician -- What Makes a Clinician Truly Excellent? -- What Can One Do to Become an Excellent Clinical Aphasiologist? -- How Do the People We Serve Characterize What They Most Want? -- What Are Some Traits of People Who Are Perceived as Unhelpful Clinicians? -- What Content Is Important to Master? -- What Credentials Are Required for a Career as an Aphasiologist? -- What Credentials May Aphasiologists Earn Beyond Their Basic Academic and Clinical Credentials? -- Is It Best to Specialize or Generalize?. , What Strategies Help Boost Career Development in Acquired Cognitive-Linguistic Disorders? -- What Organizations Support Professional Information Sharing and Networking Among Clinical Aphasiologists? -- Learning and Reflection Activities -- Chapter 3. Writing and Talking About the People With Whom We Work -- What Is Important to Consider in Writing and Talking About People With Neurogenic Cognitive-Linguistic Disorders? -- Person-First Language -- Alternatives to the Word Patient -- People With Disabilities -- Research Participants -- Older People -- Healthy Adults -- What Are Important Nuances in Terms We Use to Refer to People Who Care for People With Neurogenic Cognitive-Linguistic Disorders? -- What Is the Difference Between the Terms Therapy and Treatment ? -- Neurotypical People -- What Are Pros and Cons of Terms Used to Refer to SLPs? -- What Are the Preferred Terms When Referring to the Experts Who Work With People Who Have Neurogenic Communication Challenges? -- What Is Important to Keep in Mind Regarding Inclusive and Welcoming Language? -- What Other Terms Might Unintentionally Convey Negative Connotations? -- Why Are There Inconsistencies in the Prefixes Used in Terms for Characterizing Neurogenic Symptoms, and What Is the Rationale for Varied Prefix Choices? -- Learning and Reflection Activities -- Section II. Foundations for Considering Acquired Neurogenic Language Disorders -- Chapter 4. Defining and Conceptualizing Aphasia -- What Is a Good Way to Define Aphasia? -- Aphasia Is Acquired -- Aphasia Has a Neurological Cause -- Aphasia Affects Reception and Production of Language Across Modalities -- Aphasia Is Not a Speech, Intellectual, Sensory, or Psychiatric Disorder -- How Have Established Aphasiologists Defined Aphasia? -- What Are the Primary Frameworks for Conceptualizing Aphasia? -- Unidimensional Frameworks. , Multidimensional Frameworks -- Medical Frameworks -- Cognitive Neuropsychological, Psycholinguistic, and Neurolinguistic Frameworks -- Biopsychosocial Frameworks -- Social Frameworks -- Social Determinants of Health Frameworks -- Other Historically Relevant Frameworks -- How Does One Choose a Preferred Framework for Conceptualizing Aphasia? -- How Are the Frameworks for Conceptualizing Aphasia Relevant to Other Neurogenic Language Disorders? -- Learning and Reflection Activities -- Chapter 5. The WHO ICF, Human Rights Perspectives, and Life Participation Approaches -- What Is the WHO ICF? -- How Is the WHO ICF Relevant to Ethics and Human Rights? -- How Is the WHO ICF Specifically Relevant to Intervention and Research in Rehabilitation? -- How Is the WHO ICF Specifically Relevant to People With Neurogenic Language Disorders? -- Learning and Reflection Activities -- Chapter 6. Etiologies of Acquired Neurogenic Language Disorders -- What Is a Stroke? -- What Are Stroke Risk Factors, and What Causes Stroke? -- What Are the Physiological Effects of Stroke? -- How Crucial Is Timing for Medical Treatment After a Stroke? -- How Is the Sudden Onset of Stroke Relevant to Supporting Patients and Families? -- What Is a Transient Ischemic Attack? -- What Is Hypoperfusion? -- What Can Be Done to Prevent Stroke? -- Attending to Stroke Triggers -- What Is TBI? -- What Are Blast Injuries? -- What Are Concussion and Mild TBI? -- What Can Be Done to Prevent TBI? -- What Are Bacteria and Viruses? -- What Other Types of Infections Affect Cortical Function? -- What Is Neoplasm? -- What Is Toxemia? -- What Are Diabetes Mellitus and Diabetic Encephalopathy? -- What Is Metabolic Syndrome? -- What Other Metabolic Disorders Cause Encephalopathy? -- What Is Neurodegenerative Disease? -- What Is Dementia? -- What Is Mild Cognitive Impairment?. , What Is Primary Progressive Aphasia? -- What Are Some Special Challenges in Identifying Etiologies of Cognitive-Linguistic Disorders? -- Learning and Reflection Activities -- Chapter 7. Neurophysiology and Neuropathology of Acquired Neurogenic Language Disorders -- What Should SLPs Know About Neuroanatomy and Neurophysiology Associated With Neurogenic Cognitive-Linguistic Disorders? -- What Are Key Neurophysiological Principles Pertinent to Acquired Cognitive-Linguistic Disorders? -- Specialization of Structure and Function -- Interconnectivity Throughout the Brain -- The Brain's Plasticity -- What Is the Most Clinically Pertinent Knowledge an Aphasiologist Should Have About the Blood Supply to the Brain? -- What Factors Affect a Person's Prognosis for Recovery From a Stroke or Brain Injury? -- Why Is It Important for Clinical Aphasiologists to Know About the Visual System? -- What Aspects of the Visual System Are Most Relevant to People With Neurogenic Language Disorders? -- Anatomy and Physiology Associated With Visual Deficits -- How Are Visual Field Deficits Characterized? -- What Are Ocular Motor Deficits? -- What Are Visual Attention Deficits? -- What Are Higher-Level Visual Deficits? -- What Aspects of the Neurophysiology of Hearing Are Most Relevant to People With Neurogenic Language Disorders? -- Learning and Reflection Activities -- Supplemental Review of Neuroanatomy Related to Aphasiology -- Supplemental Review of Blood Supply to the Brain -- Supplemental Review of the Visual System -- Supplemental Review of the Auditory System -- Chapter 8. Neuroimaging and Other Neurodiagnostic Instrumentation -- What Are the Most Relevant Neuroimaging Techniques for Aphasiologists to Know About? -- Computed Axial Tomography (CAT or CT) -- Magnetic Resonance Imaging (MRI) -- Single Photon Emission Computed Tomography (SPECT) -- Cerebral Angiography. , What Other Neurodiagnostic Methods Are Important for Aphasiologists to Know About? -- Electroencephalography (EEG) -- Electrocorticography -- Additional Methods -- Learning and Reflection Activities -- Chapter 9. Aging, Which Is Not a Disorder, and Its Relevance to Aphasiology -- What Is Aging? -- What Are Key Theories About Aging That Are Especially Relevant to Cognition and Communication? -- What Is Aging Well? -- How Are Demographic Shifts in Aging Populations Relevant to Clinical Aphasiologists? -- What Are Normal Changes in the Brain as People Age? -- What Are Positive Aspects of the Aging Brain? -- Memory -- Word Finding -- Syntactic Processing -- Reading and Writing -- Discourse -- Pragmatics -- What Are General Guidelines for Differentiating Normal From Impaired Language in Older Adults? -- What Theories Have Been Proposed to Account for Cognitive-Linguistic Changes With Aging? -- Resource Capacity Theories -- Working Memory Theories -- Context-Processing Deficiency Theories -- Signal Degradation Theories -- Transmission Deficit Theories -- Speed-of-Processing Theories -- Inhibition Theories -- What Can Be Done to Ensure the Best Preservation of Language Abilities as People Age? -- What Is Elderspeak, and How May We Raise Awareness About It? -- What Sensitivities Related to Ageism Are Important for Aphasiologists to Demonstrate? -- Learning and Reflection Activities -- Section III. Features, Symptoms, and Syndromes in the Major Categories of Cognitive-Linguistic Disorders -- Chapter 10. Syndromes and Hallmark Characteristics of Aphasia -- How Are the Types of Aphasia Classified? -- What Are the Classic Syndromes of Aphasia, and What Are the Hallmark Characteristics of Each? -- Expressive/Receptive, Nonfluent/Fluent, and Anterior/Posterior Dichotomies -- Classic Aphasia Classification -- Wernicke's Aphasia -- Broca's Aphasia -- Global Aphasia. , Conduction Aphasia.
    Weitere Ausg.: Print version: Hallowell, Brooke Aphasia and Other Acquired Neurogenic Language Disorders San Diego : Plural Publishing, Incorporated,c2019 ISBN 9781635501599
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    UID:
    almahu_BV046888247
    Umfang: 1 Online-Ressource (x, 262 Seiten).
    ISBN: 978-1-350-11554-5 , 978-1-350-11552-1 , 978-1-350-11553-8
    Inhalt: "From short paratactic sentences to frequent repetition and parallelisms, Donald Trump's idiolect is highly distinctive from that of previous Presidents of the USA. Combining quantitative and qualitative analyses, this book identifies the characteristic features of Trump's language and argues that his speech style, often underestimated by the media, is strategically implemented as a persuasive device. The chapters examine Trump's tweets, inaugural address, political speeches, interviews, presidential debates and reality TV appearances, revealing populist language traits that establish his idiolect as a direct reflection of changing social and political norms. Also scrutinised is Trump's deviant use of nicknames, the definite article and conceptual metaphors as strategies of othering and antagonising his opponents, which is tailored to a specific political purpose. Drawing on techniques from corpus linguistics, multimodality and critical discourse analysis, this book provides a multifaceted investigation of Trump's language use and addresses essential questions about Trump as a political phenomenon"
    Anmerkung: Introduction: From fake news to tremendous success / Matthias Eitelmann and Ulrike Schneider -- It's just words, folks. It's just words : Donald Trump's distinctive linguistic style / Jesse Egbert and Douglas Biber -- I know words, I have the best words : repetitions, parallelisms, and matters of (in)coherence / Kristina Nilsson Björkenstam and Gintarė Grigonytė -- A man who was just an incredible man, an incredible man : age factors and coherence in Donald Trump's spontaneous speech / Patricia Ronan and Gerold Schneider -- Very emotional, totally conservative, and somewhat all over the place : an analysis of intensifiers in Donald Trump's speech / Ulrike Stange -- Crooked Hillary, Lyin' Ted, and failing New York Times : nicknames in Donald Trump's tweets / Jukka Tyrkkö and Irina Frisk -- I'm doing great with the Hispanics. Nobody knows it : the distancing effect of Donald Trump's the plurals / Ulrike Schneider and Kristene K. McClure -- Either we WIN this election, or we are going to LOSE this country! : Trump's warlike competition metaphor / Anthony Koth -- Silence and Denial Trump's discourse on the environment / Marta Degani and Alexander Onysko -- Donald Trump's "fake news" agenda : a pragmatic account of rhetorical delegitimization / Christoph Schubert -- Sorry not sorry : political apology in the age of Trump / Jan David Hauck and Teruko Vida Mitsuhara -- Great movement vs. crooked opponents : is Donald Trump's language populist? / Ulrike Schneider and Matthias Eitelmann
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-1-350-11551-4
    Sprache: Englisch
    Fachgebiete: Anglistik
    RVK:
    RVK:
    Schlagwort(e): 1946- Trump, Donald ; Englisch ; Politische Sprache ; Rhetorik ; Diskursanalyse ; Aufsatzsammlung ; History ; Electronic books
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    UID:
    almahu_9947364354002882
    Umfang: XII, 255 p. 133 illus. , online resource.
    ISBN: 9783642341762
    Serie: Lecture Notes in Computer Science, 7233
    Inhalt: This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Symposium on Applications of Graph Transformations, AGTIVE 2011, held in Budapest, Hungary, in October 2011. The 13 revised full papers presented together with 2 invited talks, 2 application reports, and 3 tool demonstration papers were carefully selected from 36 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on invited talk abstracts, model-driven engineering, graph transformation applications, tool demonstrations, graph transformation exploration techniques, graph transformation semantics and reasoning, application reports and bidirectional transformations.
    Anmerkung: Best Practices to Model Business Services in Complex IT Environments -- Drools: A Rule Engine for Complex Event Processing -- Graph Transformation Concepts for Meta-model Evolution Guaranteeing Permanent Type Conformance throughout Model Migration -- A Graph Transformation-Based Semantics for Deep Metamodelling -- Reusable Graph Transformation Templates -- Towards an Automated 3D Reconstruction of Plant Architecture.- Generating Graph Transformation Rules from AML/GT State Machine Diagrams for Building Animated Model Editors -- AGG 2.0 – New Features for Specifying and Analyzing Algebraic Graph Transformations -- Integration of a Pattern-Based Layout Engine into Diagram Editors -- Tool Demonstration of the Transformation Judge -- Knowledge-Based Graph Exploration Analysis.- Graph Grammar Induction as a Parser-Controlled Heuristic Search Process.- Planning Self-adaption with Graph Transformations -- From Graph Transformation Units via MiniSat to GrGen.NET -- Locality in Reasoning about Graph Transformations -- Contextual Hyperedge Replacement -- The Added Value of Programmed Graph Transformations – A Case Study from Software Configuration Management -- A Case Study Based Comparison of ATL and SDM -- Applying Advanced TGG Concepts for a Complex Transformation of Sequence Diagram Specifications to Timed Game Automata -- Automatic Conformance Testing of Optimized Triple Graph Grammar Implementations. Drools: A Rule Engine for Complex Event Processing -- Graph Transformation Concepts for Meta-model Evolution Guaranteeing Permanent Type Conformance throughout Model Migration -- A Graph Transformation-Based Semantics for Deep Metamodelling -- Reusable Graph Transformation Templates -- Towards an Automated 3D Reconstruction of Plant Architecture.- Generating Graph Transformation Rules from AML/GT State Machine Diagrams for Building Animated Model Editors -- AGG 2.0 – New Features for Specifying and Analyzing Algebraic Graph Transformations -- Integration of a Pattern-Based Layout Engine into Diagram Editors -- Tool Demonstration of the Transformation Judge -- Knowledge-Based Graph Exploration Analysis.- Graph Grammar Induction as a Parser-Controlled Heuristic Search Process.- Planning Self-adaption with Graph Transformations -- From Graph Transformation Units via MiniSat to GrGen.NET -- Locality in Reasoning about Graph Transformations -- Contextual Hyperedge Replacement -- The Added Value of Programmed Graph Transformations – A Case Study from Software Configuration Management -- A Case Study Based Comparison of ATL and SDM -- Applying Advanced TGG Concepts for a Complex Transformation of Sequence Diagram Specifications to Timed Game Automata -- Automatic Conformance Testing of Optimized Triple Graph Grammar Implementations.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783642341755
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz