Risultati della ricerca - Tréveris~

  1. 1

    The politics of local government finance / di Travers, Tony

    Pubblicazione 1986
    Libro
  2. 2

    Modern management / di Certo, Samuel C.

    Libro
  3. 3

    Law of Marriage Maintanance Separation and Divorce di Aiyar, Krishnamurthi S

    Libro
  4. 4
  5. 5

    Medicinal rule : a historical anthropology of kingship in east and central Africa / di Stroeken, Koen

    Pubblicazione 2018
    Sommario: “...Part I: Divinatory societies -- The forest within -- Beyond Turner's watershed division -- Part II: Medicinal rule -- A Sukuma chief on medicine -- Endogenizing Vansina's equatorial tradition -- From cult to dynasty: Nilotic and Niger-Congo extensions -- Magic and the sole mode of production -- Tio shrines of the forest master -- Part III: The ceremonial state -- Kuba, Kongo and Buganda 'miracles': reversions in transition -- From divinatory to ceremonial state: narrative proof from Rwanda -- Conclusions: Reversible transitions....”
    Libro
  6. 6

    English phonetics and phonology : an introduction / di Carr, Philip

    Pubblicazione 2013
    Sommario: “...English phonetics : consonants (I) -- English phonetics : consonants (II) -- English phonetics : vowels (I) -- English phonetics : vowels (II) -- The phonemic principle -- English phonemes -- English syllable structure -- Rhythm and word stress in English -- Rhythm, reversal and reduction -- English intonation -- Grapho-phonemics : spelling : pronunciation relations -- Variation in English accents -- An outline of some accents of English....”
    Testo
    Testo
    Testo
    Libro
  7. 7

    Data structures & other objects using Java di Main, Michael

    Pubblicazione 2003
    Sommario: “...Introduction to Trees.Tree Representations.A Class for Binary Tree Nodes.Tree Traversals.Binary Search Trees.Tree Projects. Heaps.B-Trees.Trees, Logs, and Time Analysis.Searching. ...”
    Libro
  8. 8

    The security-development nexus : expressions of sovereignty and securitization in Southern Africa /

    Pubblicazione 2007
    Sommario: “...INTRODUCTION Lars Buur, Steffen Jensen and Finn Stepputat The Security-Development Nexus 9 INTERNAL AND EXTERNAL BOUNDARIES Thomas Mandrup J��rgensen You Do Need a Stick to Be Able to Use It Gently The South African Armed Forces in The Democratic Republic of Congo 37 Steffen Jensen and Lars Buur The Nationalist Imperative South Africanisation, Regional Integration and Mobile Livelihoods 63 Lalli Metsola and Henning Melber Namibia's Pariah Heroes Swapo Ex-Combatants Between Liberation Gospel and Security Interests 85 STATES, DEVELOPMENT AND VERNACULAR SECURITY Lars Buur The Intertwined History of Security and Development The Case of Developmental Struggles in South Africa's Townships 109 Helene Maria Kyed The Politics of Policing Re-capturing 'Zones of Confusion' in Rural Post-War Mozambique 132 Guy Lamb Militarising Politics and Development The Case of Post-Independence Namibia 152 Jacob Rasmussen Struggling for the City Evictions in Inner-City Johannesburg 174 IDENTITY, VIOLENCE AND RIGHTS Steffen Jensen Through the Lens of Crime Land Claims and Contestations of Citizenship on the Frontier of the South African State 193 Amanda Hammar Criminality, Security and Development Post-Colonial Reversals in Zimbabwe's Margins 212 Tina Sideris Post-Apartheid South Africa �� Gender, Rights and the Politics of Recognition New Avenues for Old Forms of Violence? ...”
    Testo
    Libro
  9. 9

    Management models and industrial applications of linear programming di Charnes, A.

    Pubblicazione 1961
    Sommario: “...Suggested Topical Outline Glossary of Symbols A Survey of Some Salient Topics The Stepping-Stone Method for Transportation-Type Models Input-Output: An Example Elements of Matrix Algebra Elements of Matrix Algebra The Simplex Method and Some Geometry in Linear Spaces Appendix A: Some Further Geometrical Concepts Data Interpretations by Direct and Dual Relations Appendix B: Basic Existence Theorems and Goal Programming Solutions and Requirements Spaces: Geometry for the Constraints Appendix C: Some Basic Theorems in the Theory of Linear Inequalities Geometry of the Functional Theory and Computations for Delegation Models of Activity-Analysis Type: K-Efficiency, Functional Efficiency, and Goals Nonlinearity-A Functional Oriented Strategy Horizons and Surrogates in a Dynamic Model for Production Scheduling Appendix D: The Kuhn-Tucker Theorem and Some Applications to Storage, Inventory, and Functional Efficiency Degeneracy, Perturbation, and Complete Regularization Appendix E: Consolidation and Classification Issues with Reference to Leontief Matrices / Bibliography Index Suggested Topical Outline Glossary of Symbols The Modified Simplex and Dual Methods, and the Revised Simplex Code for Electronic Calculators Transportation-type Models Dyadic Models and Subdual Methods Prototypes, Compression, and Emphases in an Oil-field Development Example Appendix F: The Double-Reverse Method Networks and Models of Incidence Type Appendix G: Mixing Routines for a Class of Coupled Models Miscellaneous Topics Some Relations between the Theory of Games and Linear Programming Appendix H: Some Further Aspects of Saddle Points and Min....”
    Libro
  10. 10

    The multinationals and East-West relations : towards transideological collaboration di J. Wilczynski

    Pubblicazione 1976
    Sommario: “...Attacks by Western Radical Elements; 2 The Expedient Turn to Collaboration; A. The Amazing Reversal of Attitudes; B. Framework Collaboration Agreements; C. ...”
    Libro
  11. 11

    Gower handbook of supply chain management

    Pubblicazione 2024
    Sommario: “...Heath and Alister Danks; Service parts management, Olaf Schatteman and Jonathan Wright; Supply chain financial performance measurement, David Walters; Supply chain performance measures and systems, Linda Nuthall; Reverse logistics, Olaf Schatteman. Supply Chain Integration and Collaboration: Creating agile supply chains, Martin Christopher; Supply chain structures to deliver value, Michael G. ...”
    Libro
  12. 12

    A practical introduction to data structures and algorithm analysis / di Shaffer, Clifford A.

    Pubblicazione 2001
    Sommario: “...57 (2) Asymptotic Analysis 59 (6) Upper Bounds 60 (2) Lower Bounds 62 (1) Θ Notation 63 (1) Simplifying Rules 64 (1) Calculating the Running Time of a Program 65 (5) Analyzing Problems 70 (1) Common Misunderstandings 71 (1) Multiple Parameters 72 (1) Space Bounds 73 (3) Some Practical Considerations 76 (2) Further Reading 78 (1) Exercises 79 (4) Projects 83 (2) II FUNDAMENTAL DATA STRUCTURES 85 (132) Lists, Stacks, and Queues 87 (54) Lists 88 (25) Array-Based List Implementation 91 (4) Linked Lists 95 (10) Comparison of List Implementations 105 (2) Element Implementations 107 (1) Doubly Linked Lists 108 (5) The Dictionary ADT 113 (6) Stacks 119 (9) Array-Based Stacks 121 (1) Linked Stacks 122 (2) Comparison of Array-Based and Linked Stacks 124 (1) Implementing Recursion 125 (3) Queues 128 (5) Array-Based Queues 129 (4) Linked Queues 133 (1) Comparison of Array-Based and Linked Queues 133 (1) Further Reading 133 (1) Exercises 133 (5) Projects 138 (3) Binary Trees 141 (50) Definitions and Properties 141 (5) The Full Binary Tree Theorem 143 (2) A Binary Tree Node ADT 145 (1) Binary Tree Traversals 146 (3) Binary Tree Node Implementations 149 (10) Pointer-Based Node Implementations 149 (5) Space Requirements 154 (3) Array Implementation for Complete Binary Trees 157 (2) Binary Search Trees 159 (8) Heaps and Priority Queues 167 (7) Huffman Coding Trees 174 (11) Building Huffman Coding Trees 176 (6) Assigning and Using Huffman Codes 182 (3) Further Reading 185 (1) Exercises 186 (3) Projects 189 (2) Non-Binary Trees 191 (26) General Tree Definitions and Terminology 191 (4) An ADT for General Tree Nodes 192 (1) General Tree Traversals 193 (2) The Parent Pointer Implementation 195 (7) General Tree Implementations 202 (5) List of Children 202 (1) The Left-Child/Right-Sibling Implementation 203 (2) Dynamic Node Implementations 205 (2) Dynamic ``Left-Child/Right-Sibling'' Implementation 207 (1) K-ary Trees 207 (1) Sequential Tree Implementations 208 (3) Further Reading 211 (1) Exercises 211 (3) Projects 214 (3) III Sorting and Searching 217 (140) Internal Sorting 219 (40) Sorting Terminology and Notation 219 (2) Three Θ(n2) Sorting Algorithms 221 (6) Insertion Sort 221 (2) Bubble Sort 223 (1) Selection Sort 224 (2) The Cost of Exchange Sorting 226 (1) Shellsort 227 (2) Quicksort 229 (6) Mergesort 235 (3) Heapsort 238 (3) Binsort and Radix Sort 241 (6) An Empirical Comparison of Sorting Algorithms 247 (2) Lower Bounds for Sorting 249 (4) Further Reading 253 (1) Exercises 254 (3) Projects 257 (2) File Processing and External Sorting 259 (34) Primary versus Secondary Storage 259 (3) Disk Drives 262 (8) Disk Drive Architecture 263 (5) Disk Access Costs 268 (2) Buffers and Buffer Pools 270 (5) The Programmer's View of Files 275 (1) External Sorting 276 (3) Simple Approaches to External Sorting 279 (2) Replacement Selection 281 (4) Multiway Merging 285 (3) Further Reading 288 (1) Exercises 288 (3) Projects 291 (2) Searching 293 (34) Searching Sorted Arrays 294 (1) Self-Organizing Lists 295 (6) Searching in Sets 301 (1) Hashing 302 (19) Hash Functions 303 (4) Open Hashing 307 (1) Closed Hashing 308 (13) Further Reading 321 (1) Exercises 321 (3) Projects 324 (3) Indexing 327 (30) Linear Indexing 329 (2) ISAM 331 (3) Tree Indexing 334 (2) 2-3 Trees 336 (7) B-Trees 343 (9) B+-Trees 344 (6) B-Tree Analysis 350 (2) Further Reading 352 (1) Exercises 353 (2) Projects 355 (2) IV Applications and Advanced Topics 357 (136) Graphs 359 (34) Terminology and Representations 360 (4) Graph Implementations 364 (3) Graph Traversals 367 (10) Depth-First Search 370 (1) Breadth-First Search 371 (4) Topological Sort 375 (2) Shortest-Paths Problems 377 (5) Single-Source Shortest Paths 377 (4) All-Pairs Shortest Paths 381 (1) Minimum-Cost Spanning Trees 382 (5) Prim's Algorithm 383 (3) Kruskal's Algorithm 386 (1) Further Reading 387 (1) Exercises 388 (2) Projects 390 (3) Lists and Arrays Revisited 393 (30) Skip Lists 393 (6) Multilists 399 (3) Matrix Representations 402 (4) Memory Management 406 (12) Dynamic Storage Allocation 407 (7) Failure Policies and Garbage Collection 414 (4) Further Reading 418 (1) Exercises 419 (1) Projects 420 (3) Advanced Tree Structures 423 (28) Tries 423 (5) Balanced Trees 428 (6) The AVL Tree 428 (3) The Splay Tree 431 (3) Spatial Data Structures 434 (13) The K-D Tree 436 (5) The PR quadtree 441 (4) Other Spatial Data Structures 445 (2) Further Reading 447 (1) Exercises 447 (1) Projects 448 (3) Analysis Techniques 451 (18) Summation Techniques 452 (3) Recurrence Relations 455 (6) Estimating Upper and Lower Bounds 455 (1) Expanding Recurrences 456 (1) Divide and Conquer Recurrences 457 (2) Average-Case Analysis of Quicksort 459 (2) Amortized Analysis 461 (3) Further Reading 464 (1) Exercises 464 (4) Projects 468 (1) Limits to Computation 469 (24) Reductions 470 (5) Hard Problems 475 (7) NP-Completeness 476 (5) Getting Around NP-Complete Problems 481 (1) Impossible Problems 482 (7) Uncountability 483 (3) The Halting Problem Is Unsolvable 486 (2) Determining Program Behavior Is Unsolvable 488 (1) Further Reading 489 (1) Exercises 489 (2) Projects 491 (2) V APPENDIX 493 (4) A Utility Functions 495 (2) Bibliography 497 (6) Index 503...”
    Libro
  13. 13

    Data structures and algorithms with object-oriented design patterns in Java / di Preiss, Bruno R.

    Pubblicazione 2000
    Sommario: “...428 (2) 13.2 Reference Counting Garbage Collection 430 (4) 13.3 Mark-and-Sweep Garbage Collection 434 (3) 13.4 Stop-and-Copy Garbage Collection 437 (2) 13.5 Mark-and-Compact Garbage Collection 439 (4) Exercises 443 (1) Programming Projects 443 (3) CHAPTER 14 Algorithmic Patterns and Problem Solvers 446 (45) 14.1 Brute-Force and Greedy Algorithms 446 (4) 14.2 Backtracking Algorithms 450 (9) 14.3 Top-Down Algorithms: Divide and Conquer 459 (10) 14.4 Bottom-Up Algorithms: Dynamic Programming 469 (8) 14.5 Randomized Algorithms 477 (10) Exercises 487 (2) Programming Projects 489 (2) CHAPTER 15 Sorting Algorithms and Sorters 491 (47) 15.1 Basics 491 (1) 15.2 Sorting and Sorters 492 (2) 15.3 Insertion Sorting 494 (5) 15.4 Exchange Sorting 499 (11) 15.5 Selection Sorting 510 (9) 15.6 Merge Sorting 519 (5) 15.7 A Lower Bound on Sorting 524 (2) 15.8 Distribution Sorting 526 (6) 15.9 Performance Data 532 (3) Exercises 535 (2) Programming Projects 537 (1) CHAPTER 16 Graphs and Graph Algorithms 538 (61) 16.1 Basics 539 (8) 16.2 Implementing Graphs 547 (9) 16.3 Graph Traversals 556 (14) 16.4 Shortest-Path Algorithms 570 (10) 16.5 Minimum-Cost Spanning Trees 580 (9) 16.6 Application: Critical Path Analysis 589 (5) Exercises 594 (3) Programming Projects 597 (2) APPENDIX A Java and Object-Oriented Programming 599 (22) A.1 Variables 599 (2) A.2 Parameter Passing 601 (3) A.3 Objects and Classes 604 (5) A.4 Inner Classes 609 (1) A.5 Inheritance and Polymorphism 610 (9) A.6 Exceptions 619 (2) APPENDIX B Class Hierarchy Diagrams 621 (2) APPENDIX C Character Codes 623 (2) Bibliography 625 (2) Index 627...”
    Testo
    Testo
    Testo
    Libro
  14. 14

    International marketing /

    Pubblicazione 2024
    Sommario: “...2-4 Ethics and Airbus 2-5 Coping with Corruption 2-6 When International Buyers and Sellers Disagree 2-7 McDonald’s and Obesity2-8 Ultrasound Machines, India, China, and a Skewed Sex Ratio 2-9 Counterfeit Mobile Phones in Southeast Asia Assessing Global Market Opportunities 3-1 International Marketing Research at the Mayo Clinic 3-2 Swifter, Higher, Stronger, Dearer3-3 Marketing to the Bottom of the Pyramid 3-4 Continued Growth for Zara and Inditex 3-5 Club Med and the International Consumer 3-6 Gillette: The 11-Cent Razor, India, and Reverse Innovation 3-7 Amazon in Emerging Markets Developing Global Marketing Strategies 4-1 Tambrands—Overcoming Cultural Resistance 4-2 Futuram’s Risk Management Strategy 4-3 Sales Negotiations Abroad for MRI Systems 4-4 National Office Machines—Motivating Japanese Salespeople: Straight Salary or Commission?...”
    Libro
  15. 15

    New understanding computer science for advanced level di Bradley, Ray

    Pubblicazione 1999
    Sommario: “...427 (2) A simple program 429 (5) Other architecture systems 434 (3) Other aids to increased speed 437 (6) Assembly Language 443 (27) Introduction 443 (2) Basic principles 445 (1) Basic assembly-language principles 446 (5) Basic assembly-language instructions 451 (6) The assembler 457 (2) Loaders 459 (1) An assembly-language example 460 (1) A specific example 461 (9) A First Look at Operating Systems 470 (13) Introduction 470 (2) Microcomputer operating system principles 472 (11) Larger Operating Systems 483 (15) Mainframe computers--batch operating systems 483 (2) Multiprogramming (multitasking) 485 (8) Time sharing systems 493 (1) Thin client-server operating systems 494 (4) A First Look at Data Structures 498 (12) Introduction 498 (1) Linear list 499 (6) Arrays 505 (5) Further Data Structures 510 (19) Introduction 510 (1) Linked lists 510 (6) Tree structures (hierarchical data structures) 516 (13) File Handling and Organisation 529 (15) Introduction 529 (2) Logical file organisation 531 (2) Operations with files 533 (1) Processing data with serial and sequential access files 534 (10) Further File Handling 544 (17) Direct-access or random-access files 544 (2) Processing data in indexed-sequential files 546 (1) General terminology associated with files 547 (2) The link to the physical organisation of files 549 (3) The drive-you-mad car company 552 (9) A First Look at Databases 561 (15) Introduction 561 (5) Commercial database applications 566 (5) Security of the database system 571 (5) Further Databases 576 (16) Introduction 576 (1) Modelling data 576 (1) The basic database models 577 (2) The hierarchical database model 579 (1) The network database model 580 (2) The relational database model 582 (2) Normalisation 584 (8) The Binary Number System 592 (13) Introduction 592 (1) The binary system 592 (4) Other number bases 596 (5) Fixed point binary numbers 601 (4) Further Binary Systems 605 (13) Introduction 605 (1) Floating point representation of binary numbers 605 (1) Normalisation (standardisation) 606 (4) Computer-based arithmetic procedures 610 (4) Error classification 614 (4) Language Translation 618 (18) Introduction 618 (1) Compilation 619 (9) Polish and reverse Polish notation 628 (8) Computer Science Projects 636 (8) Introduction 636 (8) A Selection of Exam Questions 644 (7) Glossary 651 (42) Answers 693 (30) Index 723...”
    Libro
  16. 16

    Proactive purchasing in the supply chain : the key to world-class procurement / di Burt, David N.

    Pubblicazione 2012
    Sommario: “...Initiate Lease or Contract Post-Award Activities Summary Endnotes Suggested Reading Chapter 9 Purchasing Services Introduction Hidden Opportunities The Statement of Work Four Formats for Statements of Work Planning the Statement of Work Writing the Statement of Work Artificial Intelligence Tips on Writing an Effective Statement of Work Selecting Service Contractors Tips from a Professional The Ideal Services Supplier Pricing Service Contracts Professional Services Technical Services Operating Services Third Party Contracts So, Your Services Contract Is About to Expire Contract Administration Services Purchases and the Internet Construction Services Conventional Method Design and Build, Firm Agreed Price Method Design and Build, Cost-Reimbursable Method Building Team The Owner as a Contractor Construction Purchasing Entails Unique Problems Performance Contracting The Special Case of Contracting Consultants Qualifying the Consultants Summary Endnotes Suggested Reading Chapter 10 Production and Inventory Control Part I: The Fundamentals of Production Planning Modern Production Planning Systems Aggregate Planning and Master Scheduling Material Requirements Planning Capacity Requirements Planning Control of Production Activities Two Management Considerations Evolution of MRP and MRP II Systems Impact on Purchasing and Supply Just-in-Time Production Planning A JIT Illustration JIT's Impact on Purchasing and Supply ERP Systems Radio Frequency Identification System (RFID) Summary Part II: The Functions of Inventories Definition of Inventories Inventory Analysis Inventory Catalog ABC Analysis-The 80-20 Concept Dependent and Independent Demand Costs Associated with Inventories Carrying Costs Acquisition Costs Economic Order Quantity (EOQ) Concept Other Uses of the EOQ Concept The Weaknesses of the EOQ Formula Types of Inventory Control Systems Cyclical or Fixed Order Interval System The Just-in-Time (JIT) Approach Material Requirements Planning (MRP) System Order Point or Fixed Order Quantity System Summary Appendix: The Fundamentals of Inbound Transportation Endnotes Suggested Reading Chapter 11 Demand Management and Logistics The Key to Supply Chain Management The SCM Triangle Evolution to Strategic SCM Strategic Demand Management The Bullwhip Effect Evolution of Strategic Demand Forecasting Demand Forecasting Fundamentals Planning with Time Fences Implications for Supply Management Strategic Logistics Management Logistics Defined The Role of Logistics in Supply Chain Management Eliminate the Warehouse, If Possible Summary Endnotes Suggested Reading Chapter 12 Outsourcing Outsourcing: A Growth Industry Strategic Issues Core Competencies Supplier Dominance The Creation of Strategic Vulnerabilities The Dangers of Vertical Integration Horizontal Integration New Product Development and Outsourcing Lean Manufacturing Tactical Decisions Factors Influencing Make-or-Buy Decisions Cost Considerations Control of Production or Quality Technology Risk and Maturity Unreliable Suppliers Suppliers' Specialized Knowledge and Research Small-Volume Requirements Limited Facilities Work Force Stability Multiple-Source Policy Managerial Control Considerations Procurement and Inventory Considerations Netsourcing The Volatile Nature of the Make-or-Buy Decision Insourcing Dangers of Outsourcing Administration of Make-or-Buy Activities Chief Resource Officer Framework for Outsourcing Executive Level Involvement The Special Disadvantages of Outsourcing Business Processes Summary Endnotes Suggested Reading Chapter 13 Sourcing The Strategic Sourcing Plan Discovering Potential Suppliers Evaluating Potential Suppliers Selecting Suppliers Bidding vs. Negotiation Reverse Auctions Two-Step Bidding/Negotiation The Solicitation Weighted Factor Analysis Responsibility for Source Selection Developing Suppliers Managing Suppliers Additional Strategic Issues Early Supplier Involvement Supply Base Reduction Single vs. ...”
    Libro
  17. 17
  18. 18

    E-business and e-commerce management : strategy, implementation, and practice di Chaffey, Dave

    Pubblicazione 2007
    Sommario: “...43 (2) Marketplace channel structures 45 (2) Different types of online intermediary 47 (3) The importance of multi-channel marketplace models 50 (1) Focus on portals 51 (3) Types of portals 51 (2) The importance of search engines 53 (1) Location of trading in the marketplace 54 (3) Commercial arrangements for transactions 57 (1) Focus on auctions 58 (3) Case Study 2.1 The impact of B2B reverse auctions 60 (1) Business models for e-commerce 61 (2) Revenue models 63 (4) Publisher revenue models 63 (4) Focus on Internet start-up companies -- the `dot-coms' 67 (9) From `bricks and mortar' to `clicks and mortar' 67 (1) Assessing dot-com businesses 67 (1) Valuing Internet start-ups 68 (2) Case Study 2.2 lastminute.com - an international dot-com survivor 70 (2) The dot-com bubble bursts 72 (1) Why dot-coms failed 72 (2) The impact of the dot-com phenomenon on traditional organizations 74 (1) Case Study 2.3 Zopa launches a new lending model 75 (1) Summary 76 (1) Exercises 77 (1) References 78 (1) Further reading 79 (1) Web links 80 (1) E-business infrastructure 81 (64) Learning outcomes / Management issues 81 (1) Links to other chapters 81 (1) Introduction 82 (3) What is the Internet? ...”
    Libro
  19. 19
  20. 20