LEADER 01375nam2-2200433---450- 001 990001005270203316 005 20090506122053.0 010 $a2-13-049760-8 035 $a0100527 035 $aUSA010100527 035 $a(ALEPH)000100527USA01 035 $a0100527 100 $a20020228d1999----km-y0itay50------ba 101 0 $afre 102 $aFR 105 $ay|||z|||001yy 200 1 $aHistoire du droit du travail$fNorbert Olszak 210 $aParis$cPresses universitaires de France$d1999 215 $a127 p.$d18 cm 225 2 $aQue sais-je?$v3450 410 0$1001000311637$12001$aQue sais-je?$v, 3450 606 0 $aDiritto del lavoro$xStoria$2BNCF 676 $a344.450109 700 1$aOLSZAK,$bNorbert$0553202 801 0$aIT$bsalbc$gISBD 912 $a990001005270203316 951 $aVI.4. Coll. 22/ 348(Coll. JP 3450)$b160408 L.M.$cVI.4. Coll.$d00078470 959 $aBK 969 $aUMA 979 $aCHIARA$b90$c20020228$lUSA01$h1329 979 $aCHIARA$b90$c20020228$lUSA01$h1329 979 $aCHIARA$b90$c20020228$lUSA01$h1330 979 $c20020403$lUSA01$h1742 979 $aPAOLA$b90$c20040319$lUSA01$h1136 979 $aPATRY$b90$c20040406$lUSA01$h1709 979 $aANNAMARIA$b90$c20081024$lUSA01$h1108 979 $aANNAMARIA$b90$c20090506$lUSA01$h1220 996 $aHistoire du droit du travail$9974529 997 $aUNISA LEADER 04507 am 2201081 n 450 001 9910416501803321 005 20200518 010 $a2-7355-0887-0 024 7 $a10.4000/books.cths.11252 035 $a(CKB)4100000011289054 035 $a(FrMaCLE)OB-cths-11252 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/53923 035 $a(PPN)248497944 035 $a(EXLCZ)994100000011289054 100 $a20200609j|||||||| ||| 0 101 0 $afre 135 $auu||||||m|||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 13$aLa montagne explorée, étudiée et représentée : évolution des pratiques culturelles depuis le xviiie siècle /$fLouis Bergès 210 $aParis $cÉditions du Comité des travaux historiques et scientifiques$d2020 330 $aLe Siècle des lumières, qui consacre l?ouverture des élites européennes à la modernité scientifique, est aussi celui qui pousse les mêmes sociétés vers les sommets et les glaciers des montagnes. Objet de fascination et non plus de crainte, la montagne apparaît, à la suite de Rousseau et Senancour, dans toute sa majesté, à la fois vierge, mystérieuse, repliée sur elle-même et porteuse d?un message d?universalité. Après avoir longtemps suscité peur et préjugés depuis l?Antiquité, la montagne est devenue au xviiie siècle un territoire de conquête et de découverte générant toute une mythologie et un imaginaire qui vont modifier le rapport des sociétés européennes avec le milieu des sommets. Le Congrès national des sociétés historiques et scientifiques rassemble chaque année universitaires, membres de sociétés savantes et jeunes chercheurs. Ce recueil est issu de travaux présentés lors du 142e Congrès sur le thème « Circulations montagnardes, circulations européennes ». 517 $aMontagne explorée, étudiée et représentée 517 $aMontagne explorée, étudiée et représentée 517 $aLa montagne explorée, étudiée et représentée 517 $aLa montagne explorée, étudiée et représentée  606 $aHistory 606 $asciences naturelles 606 $ahistoire 606 $aanthropologie 606 $alittérature 606 $apeinture 606 $agéographie 606 $ahistoire de l'art 606 $apatrimoine 606 $acinéma 606 $aenvironnement 606 $aépoque moderne 606 $aépoque contemporaine 610 $apeinture 610 $ahistoire de l'art 610 $alittérature 610 $aépoque contemporaine 610 $agéographie 610 $asciences naturelles 610 $ahistoire 610 $aanthropologie 610 $acinéma 610 $apatrimoine 610 $aenvironnement 610 $aépoque moderne 615 4$aHistory 615 4$asciences naturelles 615 4$ahistoire 615 4$aanthropologie 615 4$alittérature 615 4$apeinture 615 4$agéographie 615 4$ahistoire de l'art 615 4$apatrimoine 615 4$acinéma 615 4$aenvironnement 615 4$aépoque moderne 615 4$aépoque contemporaine 700 $aBelle$b Elsa$01364746 701 $aBergès$b Louis$0548977 701 $aBertoncini$b Pierre$0317227 701 $aCarpi$b Anna-Lisa$01309670 701 $aChandivert$b Arnauld$01309671 701 $aCosta$b Sandra$0619888 701 $aDelpech$b Viviane$01309672 701 $aEspinosa$b Laurence$01309673 701 $aGras$b Philippe$01309674 701 $aKraus$b Sabine$01309675 701 $aLanglois$b Gauthier$01299207 701 $aLapacherie$b Jean-Gérard$01286381 701 $aManso$b Christian$01309676 701 $aMolinier$b Claude$01309677 701 $aOunoughi$b Samia$01309678 701 $aParsis-Barubé$b Odile$01281219 701 $aPépy$b Émilie-Anne$01240607 701 $aPeyré$b Pierre$01309679 701 $aRichard-Brunet$b Véronique$01309680 701 $aRocher Gonzalez$b Manel$01309681 701 $aTessier-Brusetti$b Chloé$01309682 701 $aVenzal$b Christel$01309683 701 $aBergès$b Louis$0548977 801 0$bFR-FrMaCLE 906 $aBOOK 912 $a9910416501803321 996 $aLa montagne explorée, étudiée et représentée : évolution des pratiques culturelles depuis le xviiie siècle$93386242 997 $aUNINA LEADER 10762nam 2200493 450 001 996464512603316 005 20231201230931.0 010 $a3-030-74717-4 035 $a(CKB)4100000011891441 035 $a(MiAaPQ)EBC6568307 035 $a(Au-PeEL)EBL6568307 035 $a(OCoLC)1247059670 035 $a(PPN)255289529 035 $a(EXLCZ)994100000011891441 100 $a20211120d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSmart computing and communication $e5th international conference, SmartCom 2020, Paris, France, December 29-31, 2020 : proceedings /$fMeikang Qiu (editor) 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (304 pages) 225 1 $aLecture Notes in Computer Science ;$vv.12608 311 $a3-030-74716-6 327 $aIntro -- Preface -- Organization -- Contents -- A Post-processing Trajectory Publication Method Under Differential Privacy -- 1 Introduction -- 2 Preliminaries -- 2.1 Differential Privacy -- 2.2 Data Model -- 2.3 Inconsistency Problem -- 3 Proposed Methods -- 3.1 Differential Privacy Publishing of Trajectory -- 3.2 Constrained Inference -- 4 Evaluation -- 5 Conclusion -- References -- Chinese Clinical Named Entity Recognition Based on Stroke-Level and Radical-Level Features -- 1 Introduction -- 2 Related Work -- 3 Hierarchical Structure of Proposed Model -- 3.1 Embedding Layer -- 3.2 BiLSTM Layer -- 3.3 CRF Layer -- 4 Experiments and Results -- 4.1 Experimental Data and Evaluation Indicators -- 4.2 Model Building and Parameter Setting -- 4.3 Experimental Results -- 5 Conclusion -- References -- Vision-Based Autonomous Driving for Smart City: A Case for End-to-End Learning Utilizing Temporal Information -- 1 Introduction -- 2 Background and Related Works -- 3 Proposed Method: Temporal Conditional Imitation Learning (TCIL) -- 4 Proposed Model: CNN-LSTM Network -- 5 Experiment -- 5.1 Dataset -- 5.2 Training -- 5.3 Evaluation -- 6 Results -- 6.1 Comparison with the State-of-the-Art -- 6.2 Ablation Study -- 7 Conclusion -- References -- A Novel Estimation Method for the State of Charge of Lithium-Ion Battery Using Temporal Convolutional Network Under Multiple Working Conditions -- 1 Introduction -- 2 Our Proposed TCN for SOC Estimation -- 2.1 Causal Convolutions -- 2.2 Dilated Convolutions -- 2.3 Residual Block -- 2.4 Model Overall Structure -- 3 Performance Analysis -- 3.1 Dataset -- 3.2 Experimental Settings -- 3.3 SOC Estimation at Fixed Ambient Temperatures -- 3.4 SOC Estimation at Varying Ambient Temperatures -- 3.5 Comparative Analysis of Experimental Results -- 4 Conclusion -- References. 327 $aResearch on Security Methods of Wireless Sensor Networks Based on Internet of Things Technology -- 1 Introduction -- 2 Characteristics of Wireless Sensor Networks -- 3 Several Commonly Used Attack Methods for Wireless Networks -- 4 Main Defense Methods of Wireless Sensor Network -- 5 Summary and Outlook -- 6 Funding Statement -- References -- Research on Multi-channel Pulse Amplitude Analyzer Based on FPGA -- 1 Introduction -- 2 Research Status -- 3 Multi-channel Pulse System Design -- 4 Experimental Results and Analysis -- 4.1 Master Function Timing Test -- 4.2 PWM Chopper Amplitude Modulation Test -- 5 Conclusion and Prospect -- References -- Towards Smart Building: Exploring of Indoor Microclimate Comfort Level Thermal Processes -- 1 Introduction -- 2 Literature Review -- 3 Mathematical Model -- 3.1 Heat Balance Equation on Indoor Environment -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- Container Memory Live Migration in Wide Area Network -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Key Designs -- 4.1 Dirty Page Tracking -- 4.2 Dirty Page Popularity-Based Migration Algorithm -- 5 System Modules -- 6 Evaluation -- 7 Conclusion -- References -- vRAS: An Efficient Virtualized Resource Allocation Scheme -- 1 Introduction -- 2 Problem Definition -- 3 vRAS -- 3.1 System Structure -- 3.2 vRAS Functionality -- 3.3 Estimation of Resource Requirements -- 3.4 Determination of Resource Allocation Sizes -- 4 Performance Evaluation -- 5 Conclusion -- References -- HOOD: High-Order Orthogonal Decomposition for Tensors -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Method -- 5 Experiments -- 6 Conclusion -- References -- A GMM-Based Anomaly IP Detection Model from Security Logs -- 1 Introduction -- 2 Related Work and Comparison of Existing Methods -- 3 Detection Model. 327 $a3.1 Algorithm Background Knowledge Introduction -- 3.2 Detection Model -- 4 Test Results -- 4.1 Data Set -- 4.2 Test Results -- 5 Conclusion -- References -- Intelligent Textbooks Based on Image Recognition Technology -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 SSM Framework -- 3.2 Perceptual Hash Algorithm -- 3.3 OpenCV's Template Matching Algorithm -- 4 Implementation and Results -- 4.1 System Analysis -- 4.2 Implementation of iOS Client -- 5 Conclusion -- Reference -- Visual Analytics for Basketball Star Card Market-Under the Background of the NBA Restart -- 1 Introduction -- 2 Data Description -- 2.1 Sample Selection -- 2.2 Data Crawling -- 2.3 Data Cleaning and Reorganization -- 3 Empirical Analysis -- 3.1 Price Distribution -- 3.2 Transaction Volume of Star Cards at Different Times -- 3.3 Price Trends and Reasons for Fluctuations -- 3.4 Price Rising Period -- 3.5 Price Down Period -- 4 Conclusion -- References -- An Effective Seafile Dockerfile for Raspberry Pi to Make Docker YAML Files for Treehouses -- 1 Introduction -- 2 Background Technology -- 2.1 Treehouses -- 2.2 Services.Sh -- 3 Docker Image Building -- 4 Starting the Seafile Container -- 5 Automate the Initiation of a Seafile Container -- 6 Debugging Technique -- 7 Conclusion -- References -- Design of a Hardware Accelerator for Zero-Knowledge Proof in Blockchains -- 1 Introduction -- 2 Groth16's Calculation Steps and Software Implementation -- 2.1 Calculation Steps of Groth16 Algorithm -- 2.2 The Method of Software Implementation -- 3 Hardware Design and Implementation -- 3.1 FFT Units -- 3.2 ECP Units -- 3.3 MAC Units -- 4 Results and Analysis -- 5 Conclusion -- References -- Energy-Efficient Optimization Design for UAV-Assisted Wireless Powered MEC Systems -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 Energy Consumption Based on Working Pattern. 327 $a2.2 Problem Formulation -- 3 Proposed Solution -- 3.1 Charging Resources Allocation Optimization -- 3.2 IoTDs Associations Optimization -- 3.3 Working Mode Decisions Optimization -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- Privacy-Preserving Accelerated Clustering for Data Encrypted by Different Keys -- 1 Introduction -- 2 Preliminaries -- 2.1 k-Means Clustering -- 2.2 Avoiding Divisions -- 3 Model Description -- 3.1 System Model -- 3.2 Threat Model -- 4 Our Scheme -- 4.1 Secure Distance Computation -- 4.2 Secure Comparison -- 4.3 Privacy Preserving Accelerated Clustering -- 4.4 Security Analysis -- 5 Experimental Evaluation -- 6 Conclusions -- References -- Blockchain Technology in Automobile Insurance Claim Systems Research -- 1 Introduction -- 2 Related Work Research -- 3 Key Technology Contrast -- 3.1 Public or Permissioned -- 3.2 Node Selection and Consensus Algorithm -- 3.3 Encryption Algorithm -- 3.4 The Data Analysis -- 4 Challenges for Blockchain -- 4.1 Throughput and Scalability -- 4.2 User Privacy Issues -- 4.3 Smart Contract -- 5 Prospects -- 6 Conclusions -- References -- Birds Classification Based on Deep Transfer Learning -- 1 Introduction -- 1.1 Research Background -- 1.2 Frame of the Thesis -- 2 Work Foundation -- 2.1 Convolutional Neural Network -- 2.2 ResNeXt -- 2.3 Deep Transfer Learning -- 2.4 Model Fine-Tuning -- 3 Algorithm -- 4 Experimental Design -- 4.1 Data Set -- 4.2 Experimental Environment -- 4.3 Experimental Procedure -- 5 Analysis of Experimental Results -- 6 Conclusion -- References -- Research on Security Consensus Algorithm Based on Blockchain -- 1 Introduction -- 2 Introduction of Several Consensus Algorithms -- 2.1 CFT Consensus Algorithms -- 2.2 BFT Consensus Algorithms -- 3 Comparison of Consensus Algorithm Performance -- 4 Summary and Outlook -- References. 327 $aDesign of Intelligent Detection and Alarm System for Accident Anti-collision Based on ARM Technology -- 1 Introduction -- 2 Research Status at Home and Abroad -- 3 Related Technology Introduction -- 3.1 Melis Window Introduction -- 3.2 Melis Message Mechanism -- 4 Anti-collision System Software Design -- 4.1 System Main Program -- 4.2 G-Sensor Control Design -- 4.3 Anti-collision Design -- 4.4 Anti-collision System Test Analysis -- 5 Summary and Outlook -- References -- Resisting Adversarial Examples via Wavelet Extension and Denoising -- 1 Introduction -- 2 Research Background -- 2.1 Adversarial Attacks -- 2.2 Defense Strategies -- 3 Methodology -- 3.1 Overview -- 3.2 Wavelet Extension -- 3.3 Wavelet Denoising -- 4 Evaluations -- 4.1 Experimental Settings and Implementations -- 4.2 Black-Box Scenario -- 4.3 White-Box Scenario -- 5 Conclusion -- References -- Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Additively Homomorphic Encryption (AHE) -- 3.2 AHE Under Multiple Keys -- 3.3 AHE Supports One Multiplication -- 3.4 AHE Supports One Multiplication Under Multiple Keys -- 4 Model Description -- 4.1 System Model -- 4.2 Threat Model -- 5 Privacy Preserving Computing Framework -- 5.1 Secure Addition Protocol (SA) -- 5.2 Secure Multiplication Protocol (SM) -- 5.3 Secure Exponentiation Protocol (SE) -- 6 Security Analysis -- 7 Experimental Evaluation -- 7.1 Performance of Our Scheme -- 7.2 Comparison with Existing Schemes -- 8 Conclusions -- References -- Deep Reinforcement Learning Based on Spatial-Temporal Context for IoT Video Sensors Object Tracking -- 1 Introduction -- 2 Related Works -- 2.1 Visual Object Tracking -- 2.2 Deep Reinforcement Learning -- 3 The Existing Popularity About Deep RL and STC Tracker (DRST) -- 3.1 Framework of DRST. 327 $a3.2 DRST Networks. 410 0$aLecture Notes in Computer Science 606 $aCloud computing$vCongresses 615 0$aCloud computing 676 $a004 702 $aQiu$b Meikang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996464512603316 996 $aSmart Computing and Communication$91939023 997 $aUNISA