01498nam0 22003131i 450 SUN001191020070503120000.088-348-2354-020030128d2002 |0itac50 baitaIT|||| |||||ˆIl ‰negozio fiduciarioLaura SantoroTorinoGiappichellic2002257 p.24 cm.001SUN00382602001 MonografieUniversità degli studi Roma Tre, Facoltà di giurisprudenza, Dipartimento studi giuridici2210 TorinoGiappichelli1999-.Fiducia <diritto>-Diritto civile-ItaliaFISUNC012514TorinoSUNL000001346.4502Contratti e rappresentanza. Italia21Santoro, LauraSUNV008884280796GiappichelliSUNV000045650ITSOL20181109RICASUN0011910UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00 CONS XV.Eb.41 bis 00 22390 UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00 CONS XV.Eb.41 00 24898 UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA22390CONS XV.Eb.41 bispaUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA24898CONS XV.Eb.41paNegozio fiduciario280455UNICAMPANIA03634nam 2200781 450 991014452320332120221206095330.00-470-65241-11-118-21034-41-281-31764-097866113176450-470-23814-310.1002/9780470238141(CKB)1000000000687340(EBL)362017(SSID)ssj0000294019(PQKBManifestationID)11277994(PQKBTitleCode)TC0000294019(PQKBWorkID)10302760(PQKB)11500798(CaBNVSL)mat05236507(IDAMS)0b00006481094b22(IEEE)5236507(Au-PeEL)EBL362017(CaPaEBR)ebr10296329(CaONFJC)MIL131764(CaSebORM)9781118210345(MiAaPQ)EBC362017(OCoLC)232611998(PPN)267453426(EXLCZ)99100000000068734020080625h20152008 uy 0engur|n|---|||||txtccrDigital signal processing and applications with the TMS320C6713 and TMS320C6416 DSK /Rulph Chassaing, Donald Reay2nd ed.Hoboken, New Jersey :Wiley-Interscience,c2008.[Piscataqay, New Jersey] :IEEE Xplore,2008.1 online resource (606 p.)Topics in digital signal processing ;17Rev. of: Digital signal processing and applications with the C6713 and C6416 DSK, c2005.0-470-23813-5 0-470-13866-1 Includes bibliographical references and index.Digital Signal Processing and Applications with the TMS320C6713 and TMS320C6416 DSK; Contents; Preface; Preface to the First Edition; List of Examples; Programs/Files on Accompanying CD; 1 DSP Development System; 2 Input and Output with the DSK; 3 Architecture and Instruction Set of the C6x Processor; 4 Finite Impulse Response Filters; 5 Infinite Impulse Response Filters; 6 Fast Fourier Transform; 7 Adaptive Filters; 8 Code Optimization; 9 DSP/BIOS and RTDX Using MATLAB, Visual C++, Visual Basic, and LabVIEW; 10 DSP Applications and Student Projects; Appendix A TMS320C6x Instruction Set.Appendix B Registers for Circular Addressing and InterruptsAppendix C Fixed-Point Considerations; Appendix D MATLAB and Goldwave Support Tools; Appendix E Fast Hartley Transform; Appendix F Goertzel Algorithm; Appendix G TMS320C6416 DSK; Index.Now in a new edition-the most comprehensive, hands-on introduction to digital signal processing. The first edition of Digital Signal Processing and Applications with the TMS320C6713 and TMS320C6416 DSK is widely accepted as the most extensive text.Topics in digital signal processing ;17Signal processingDigital techniquesTexas Instruments TMS320 series microprocessorsProgrammingSignal processingDigital techniques.Texas Instruments TMS320 series microprocessorsProgramming.621.382/2621.3822ZN 6040rvkChassaing Rulph622408Reay Donald(Donald S.)845804Chassaing Rulph622408CaBNVSLCaBNVSLCaBNVSLBOOK9910144523203321Digital signal processing and applications with the TMS320C6713 and TMS320C6416 DSK1888203UNINA03360nam 2200805z- 450 991055761470332120220321(CKB)5400000000045255(oapen)https://directory.doabooks.org/handle/20.500.12854/79611(oapen)doab79611(EXLCZ)99540000000004525520202203d2022 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierEnvironmental Disasters and Individuals' Emergency PreparednessIn the Perspective of Psychology and BehaviorBaselMDPI - Multidisciplinary Digital Publishing Institute20221 online resource (138 p.)3-0365-3235-8 3-0365-3234-X Environmental disasters are becoming more frequent. These disasters not only include the most common natural disasters, but also include man-made disasters, such as public health, accident disasters, etc., which have caused greater damage to human society and cities. Because of the limitations of a single government-led model in emergency response, the emergency preparedness of communities, families and individuals are more important. In particular, the emergency preparedness psychology and behavior of individuals directly determine whether or not they can effectively protect themselves and their families in the first time of disaster. This Special Issue focuses on environmental disasters and individuals' emergency preparedness in the perspective of psychology and behavior.Environmental Disasters and Individuals’ Emergency PreparednessEnvironmental Disasters and Individuals’ Emergency PreparednessPsychologybicsscaccidental life insurancecampus signalChinacoping behaviorsCOVID-19cross-validationdisaster awarenessdisaster experiencedisaster preparednessemergency preparedness behaviorhazard of disaster-causing factorsMHO staffmultiple disastersorganizational identificationpandemicplace attachmentpsychological capitalpublic sentimentrisk perceptionself-efficacysimulation and controlsocial networksstructural equation modelstructural regression modelsystem dynamicstheory of planned behaviortrainingtrustvolunteeringvulnerability of disaster-bearerswater resources carrying riskPsychologyHong Yuxiangedt1324193Han ZiqiangedtKim Jong-SukedtLee Joo-HeonedtHong YuxiangothHan ZiqiangothKim Jong-SukothLee Joo-HeonothBOOK9910557614703321Environmental Disasters and Individuals’ Emergency Preparedness3036020UNINA05224nam 22008295 450 991048382080332120251226200610.03-540-68914-110.1007/978-3-540-68914-0(CKB)1000000000440611(SSID)ssj0000316267(PQKBManifestationID)11247247(PQKBTitleCode)TC0000316267(PQKBWorkID)10274872(PQKB)10003395(DE-He213)978-3-540-68914-0(MiAaPQ)EBC3068506(PPN)127048308(EXLCZ)99100000000044061120100301d2008 u| 0engurnn|008mamaatxtccrApplied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings /edited by Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung1st ed. 2008.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2008.1 online resource (XI, 508 p.) Security and Cryptology,2946-1863 ;5037Bibliographic Level Mode of Issuance: Monograph3-540-68913-3 Includes bibliographical references and index.On the Effectiveness of Internal Patching Against File-Sharing Worms -- Peeking Through the Cloud: DNS-Based Estimation and Its Applications -- Pushback for Overlay Networks: Protecting Against Malicious Insiders -- PPAA: Peer-to-Peer Anonymous Authentication -- Generic Constructions of Stateful Public Key Encryption and Their Applications -- Traceable and Retrievable Identity-Based Encryption -- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures -- Attacking Reduced Round SHA-256 -- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography -- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? -- Replay Attack in a Fair Exchange Protocol -- Improved Conditional E-Payments -- Anonymity in Transferable E-cash -- Generic Security-Amplifying Methods of Ordinary Digital Signatures -- New Differential-Algebraic Attacks and Reparametrization of Rainbow -- Trapdoor Sanitizable Signatures and Their Application to Content Protection -- Multi-factor Authenticated Key Exchange -- Repelling Detour Attack Against Onions with Re-encryption -- Analysis of EAP-GPSK Authentication Protocol -- Efficient Device Pairing Using “Human-Comparable” Synchronized Audiovisual Patterns -- PUF-HB: A Tamper-Resilient HB Based Authentication Protocol -- An Authentication Scheme Based on the Twisted Conjugacy Problem -- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance -- A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation -- On the Security of the CCM Encryption Mode and of a Slight Variant -- wNAF *, an Efficient Left-to-Right Signed Digit Recoding Algorithm -- A Very Compact “Perfectly Masked” S-Box for AES -- Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks -- Traceable Privacy of Recent Provably-Secure RFID Protocols -- The Security of EPC Gen2 Compliant RFID Protocols.This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.Security and Cryptology,2946-1863 ;5037Computer networksCryptographyData encryption (Computer science)Data protectionApplication softwareComputers and civilizationElectronic data processingManagementComputer Communication NetworksCryptologyData and Information SecurityComputer and Information Systems ApplicationsComputers and SocietyIT OperationsComputer networks.Cryptography.Data encryption (Computer science).Data protection.Application software.Computers and civilization.Electronic data processingManagement.Computer Communication Networks.Cryptology.Data and Information Security.Computer and Information Systems Applications.Computers and Society.IT Operations.005.8Bellovin Steven M285077ACNS 2008MiAaPQMiAaPQMiAaPQBOOK9910483820803321Applied cryptography and network security4203315UNINA