LEADER 01268nam0-22004091i-450- 001 990006434790403321 005 20100414135048.0 010 $a88-24-50565-1 035 $a000643479 035 $aFED01000643479 035 $a(Aleph)000643479FED01 035 $a000643479 100 $a20010223d1999----km-y0itay50------ba 101 1 $aita$ceng 105 $ay-------001yy 200 1 $aAspetti morali dello sviluppo economico$fBarrington Moore jr 210 $aTorino$cEdizioni di Comunità$dc1999 215 $a272 p.$d21 cm 225 1 $aTerritori di Comunità$v8 454 0$12001$aMoral aspects of economic growth, and other essays$952039 610 0 $aEconomia$aSviluppo$aAspetti etici e sociali 610 0 $aCapitalismo e morale 610 0 $aDisuguaglianza sociale 610 0 $aSocialismo$aStoria 676 $a306.3$v21$zita 700 1$aMoore,$bBarrington,$cJr.$f<1913-2005>$0244975 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006434790403321 952 $a306.3 MOO 1$b7162$fBFS 952 $a17310 MOO$b18572$fSES 952 $a306.3 MOO 2$bBibl.35838$fFLFBC 959 $aFLFBC 959 $aSES 959 $aBFS 996 $aMoral aspects of economic growth, and other essays$952039 997 $aUNINA LEADER 04170nam 22007575 450 001 9910787703103321 005 20200630204437.0 010 $a1-4419-6117-8 010 $a1-280-39497-8 010 $a9786613572899 024 7 $a10.1007/978-1-4419-6117-4 035 $a(CKB)2670000000532307 035 $a(EBL)883861 035 $a(OCoLC)779195808 035 $a(SSID)ssj0000595565 035 $a(PQKBManifestationID)11422383 035 $a(PQKBTitleCode)TC0000595565 035 $a(PQKBWorkID)10555533 035 $a(PQKB)10929535 035 $a(DE-He213)978-1-4419-6117-4 035 $a(MiAaPQ)EBC883861 035 $a(PPN)159080924 035 $a(EXLCZ)992670000000532307 100 $a20120105d2012 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCochlear Mechanics$b[electronic resource] $eIntroduction to a Time Domain Analysis of the Nonlinear Cochlea /$fby Hendrikus Duifhuis 205 $a1st ed. 2012. 210 1$aNew York, NY :$cSpringer New York :$cImprint: Springer,$d2012. 215 $a1 online resource (265 p.) 300 $aDescription based upon print version of record. 311 $a1-4419-6116-X 311 $a1-4899-9173-5 320 $aIncludes bibliographical references and index. 327 $aPart I Anatomy and Function of the Linear Cochlea -- 1 Historical Introduction -- 2 Developments from 1950 to 1980 -- 3 Emerging Cochlear Mechanics -- Part II Anatomy and Function of the Nonlinear Cochlea -- 4 Nonlinear Auditory Phenomena (I) knowledge around 1980 -- 5 Modeling the Nonlinear Cochlea -- Part III Results and Open Issues -- 6 Results -- 7 Applications and perspective -- Part IV Appendices -- Index. 330 $aThe field of cochlear mechanics has received increasing interest over the last few decades. In the majority of these studies, researchers use linear systems analysis or linear approximations of the nonlinear (NL) systems. Even though it has been clear that the intact cochlea operates nonlinearly, lack of tools for proper nonlinear analysis, and widely available tools for linear analysis still lead to inefficient and possibly incorrect interpretation of the biophysics of the cochlea. An example is the presumption that a change in cochlear stiffness at hair cell level must account for the observed change in tuning (or frequency mapping) due to prestin application. Hypotheses like this need to be addressed in a tutorial that is lucid enough to analyze and explain basic differences. Cochlear Mechanics presents a useful and mathematically justified/justifiable approach in the main part of the text, an approach that will be elucidated with clear examples. The book will be useful to scientists in auditory neuroscience, as well as graduate students in biophysics/biomedical engineering. 606 $aNeurosciences 606 $aOtorhinolaryngology 606 $aBiophysics 606 $aBiological physics 606 $aBiomedical engineering 606 $aNeurosciences$3https://scigraph.springernature.com/ontologies/product-market-codes/B18006 606 $aOtorhinolaryngology$3https://scigraph.springernature.com/ontologies/product-market-codes/H46007 606 $aBiological and Medical Physics, Biophysics$3https://scigraph.springernature.com/ontologies/product-market-codes/P27008 606 $aBiomedical Engineering and Bioengineering$3https://scigraph.springernature.com/ontologies/product-market-codes/T2700X 615 0$aNeurosciences. 615 0$aOtorhinolaryngology. 615 0$aBiophysics. 615 0$aBiological physics. 615 0$aBiomedical engineering. 615 14$aNeurosciences. 615 24$aOtorhinolaryngology. 615 24$aBiological and Medical Physics, Biophysics. 615 24$aBiomedical Engineering and Bioengineering. 676 $a571.4 676 $a610 676 $a610.28 676 $a612.8 700 $aDuifhuis$b Hendrikus$4aut$4http://id.loc.gov/vocabulary/relators/aut$01476316 906 $aBOOK 912 $a9910787703103321 996 $aCochlear Mechanics$93690891 997 $aUNINA LEADER 04066nam 22006975 450 001 9910491023703321 005 20251225180509.0 010 $a3-030-80825-4 024 7 $a10.1007/978-3-030-80825-9 035 $a(CKB)4100000011982972 035 $a(MiAaPQ)EBC6676063 035 $a(Au-PeEL)EBL6676063 035 $a(PPN)257358900 035 $a(BIP)80861007 035 $a(BIP)80525557 035 $a(DE-He213)978-3-030-80825-9 035 $a(EXLCZ)994100000011982972 100 $a20210702d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment $e18th International Conference, DIMVA 2021, Virtual Event, July 14?16, 2021, Proceedings /$fedited by Leyla Bilge, Lorenzo Cavallaro, Giancarlo Pellegrino, Nuno Neves 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (403 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12756 311 08$a3-030-80824-6 327 $aYou?ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures -- The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild -- Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs -- Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy -- Help, my Signal has bad Device! - Breaking the Signal Messenger's Post-Compromise Security through a Malicious Device -- Refined Grey-Box Fuzzing with Sivo -- SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning -- SPECULARIZER: Uncovering Speculative Execution Attacks via Performance Tracing in Commodity Hardware -- Aion Attacks: Exposing Software Timer Problem in Trusted Execution Environment -- Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels -- Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races -- FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security -- Introspect Virtual Machines Like It Is the Linux Kernel! -- Calibration Done Right: Noiseless Flush+Flush Attacks -- Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates From Naturally Occurring Invariants -- PetaDroid: Adaptive Android Malware Detection using Deep Learning -- Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings -- Extended Abstract: A First Large-scale Analysis on Usage of MTA-STS -- Centy: Scalable Server-side Web Integrity Verification System Based on Fuzzy Hashes. 330 $aChapter ?SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing? is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12756 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aComputers 606 $aComputer crimes 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputer Engineering and Networks 606 $aComputing Milieux 606 $aComputer Crime 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputers. 615 0$aComputer crimes. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputer Engineering and Networks. 615 24$aComputing Milieux. 615 24$aComputer Crime. 676 $a005.8 702 $aBilge$b Leyla 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910491023703321 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$93395207 997 $aUNINA