ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (101)
  • Maps
  • Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung  (43)
  • Amsterdam : Elsevier  (26)
  • Berkeley, CA : Apress  (24)
  • Bristol, UK : IOP Publishing
  • English  (101)
  • 2010-2014  (27)
  • 2005-2009  (74)
Collection
  • Books  (101)
  • Maps
Language
Years
Year
Branch Library
  • 1
    Monograph available for loan
    Monograph available for loan
    Berkeley, CA : Apress
    Call number: PIK M 034-17-90826
    Description / Table of Contents: Pro Git (Second Edition) is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented version control is a necessity for successful web projects, whether large or small. With this book you’ll learn how to master the world of distributed version workflow, use the distributed features of Git to the full, and extend Git to meet your every need. Written by Git pros Scott Chacon and Ben Straub, Pro Git (Second Edition) builds on the hugely successful first edition, and is now fully updated for Git version 2.0, as well as including an indispensable chapter on GitHub. It’s the best book for all your Git needs
    Type of Medium: Monograph available for loan
    Pages: XXV, 426 Seiten , Illustrationen, Diagramme
    Edition: Second Edition
    ISBN: 9781484200766 , 9781484200773 (print)
    Language: English
    Note: Contents: Getting Started ; Git Basics ; Git Branching ; Git on the Server ; Distributed Git ; Github ; Git Tools ; Customizing Git ; Git and Other Systems ; Git Internals ; Git in Other Environments ; Embedded Git in Your Applications ; Git Commands
    Location: A 18 - must be ordered
    Branch Library: PIK Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Monograph available for loan
    Monograph available for loan
    Amsterdam : Elsevier
    Call number: AWI G2-18-91738
    Type of Medium: Monograph available for loan
    Pages: XI, 716 Seiten , Illustrationen
    Edition: third edition
    ISBN: 9780123877826
    Language: English
    Note: Contents: Preface. - Acknowledgments. - 1. Data Acquisition and Recording. - 1.1 Introduction. - 1.2 Basic Sampling Requirements. - 1.3 Temperature. - 1.4 Salinity. - 1.5 Depth or Pressure. - 1.6 Sea-Level Measurement. - 1.7 Eulerian Currents. - 1.8 Lagrangian Current Measurements. - 1.9 Wind. - 1.10 Precipitation. - 1.11 Chemical Tracers. - 1.12 Transient Chemical Tracers. - 2. Data Processing and Presentation. - 2.1 Introduction. - 2.2 Calibration. - 2.3 Interpolation. - 2.4 Data Presentation. - 3. Statistical Methods and Error Handling. - 3.1 Introduction. - 3.2 Sample Distributions. - 3.3 Probability. - 3.4 Moments and Expected Values. - 3.5 Common PDFs. - 3.6 Central Limit Theorem. - 3.7 Estimation. - 3.8 Confidence Intervals. - 3.9 Selecting the Sample Size. - 3.10 Confidence Intervals for Altimeter-Bias Estimates. - 3.11 Estimation Methods. - 3.12 Linear Estimation (Regression). - 3.13 Relationship between Regression and Correlation. - 3.14 Hypothesis Testing. - 3.15 Effective Degrees of Freedom. - 3.16 Editing and Despiking Techniques: The Nature of Errors. - 3.17 Interpolation: Filling the Data Gaps. - 3.18 Covariance and the Covariance Matrix. - 3.19 The Bootstrap and Jackknife Methods. - 4. The Spatial Analyses of Data Fields. - 4.1 Traditional Block and Bulk Averaging. - 4.2 Objective Analysis. - 4.3 Kriging. - 4.4 Empirical Orrhogonal Functions. - 4.5 Extended Empirical Orrhogonal Functions. - 4.6 Cyclostationary EOFs. - 4.7 Factor Analysis. - 4.8 Normal Mode Analysis. - 4.9 Self Organizing Maps. - 4.10 Kalman Filters. - 4.11 Mixed Layer Depth Estimation. - 4.12 Inverse Methods. - 5. Time Series Analysis Methods. - 5.1 Basic Concepts. - 5.2 Stochastic Processes and Stationarity. - 5.3 Correlation Functions. - 5.4 Spectral Analysis. - 5.5 Spectral Analysis (Parametric Methods). - 5.6 Cross-Spectral Analysis. - 5.7 Wavelet Analysis. - 5.8 Fourier Analysis. - 5.9 Harmonic Analysis. - 5.10 Regime Shift Detection. - 5.11 Vector Regression. - 5.12 Fractals. - 6. Digital Filters. - 6.1 Introduction. - 6.2 Basic Concepts. - 6.3 Ideal Filters. - 6.4 Design of Oceanographic Filters. - 6.5 Running-Mean Filters. - 6.6 Godin-Type Filters. - 6.7 Lanczos-window Cosine Filters. - 6.8 Butterworth Filters. - 6.9 Kaiser-Bessel Filters. - 6.10 Frequency-Domain (Transform) Filtering. - References. - Appendix A: Units in Physical Oceanography. - Appendix B: Glossary of Statistical Terminology. - Appendix C: Means, Variances and Moment,Generating Functions for Some Common Continuous Variables. - Appendix D: Statistical Tables. - Appendix E: Correlation Coefficients at the 5% and 1% Levels of Significance for Various Degrees of Freedom v. - Appendix F: Approximations and Nondimensional Numbers in Physical Oceanography. - Appendix G: Convolution. - Index.
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application logic. No prior knowledge of C++ is assumed and the book covers the fundamental aspects of the language for writing BlackBerry 10 apps. Also a particular emphasis is put on how to create a visually enticing user experience with the Cascades framework, which is based on Qt and QML. Starting with the native SDK configuration and an overview of the Momentics IDE, the book is fast-paced and you will rapidly learn many of the best practices and techniques required for developing beautiful BlackBerry 10 apps. Learn BlackBerry 10 App Development is written for developers wishing to learn how to write apps for the new BlackBerry 10 OS and those interested in porting existing iOS and Android apps to BlackBerry 10 as native applications
    Pages: Online-Ressource (XVI, 356 pages) , 104 illustrations
    ISBN: 9781430261582
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer programming ; Computer Science ; Programming Techniques
    Description / Table of Contents: The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices, such as Samsung, Lenovo, and Asus. The increase in Android devices featuring Intel processors has created a demand for Android applications optimized for Intel Architecture: Android Application Development for the Intel® Platform is the perfect introduction for software engineers and mobile app developers. Through well-designed app samples, code samples and case studies, the book teaches Android application development based on the Intel platform—including for smartphones, tablets, and embedded devices—covering performance tuning, debugging and optimization. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University
    Pages: Online-Ressource (XX, 520 pages) , 278 illustrations
    ISBN: 9781484201008
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters. The book focuses on optimization for clusters consisting of the Intel® Xeon processor, but the optimization methodologies also apply to the Intel® Xeon Phi™ coprocessor and heterogeneous clusters mixing both architectures. Besides the tutorial and reference content, the authors address and refute many myths and misconceptions surrounding the topic. The text is augmented and enriched by descriptions of real-life situations
    Pages: Online-Ressource (XXIV, 300 pages) , 74 illustrations
    ISBN: 9781430264972
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; User interfaces (Computer systems) ; Computer Science ; User Interfaces and Human Computer Interaction ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: GUI Design for Android Apps is the perfect—and concise—introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University, and is excerpted from Android Application Development for the Intel® Platform
    Pages: Online-Ressource (XI, 156 pages) , 65 illustrations
    ISBN: 9781484203828
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Text processing (Computer science) ; Image processing ; Computer Science ; Image Processing and Computer Vision ; Document Preparation and Text Processing
    Description / Table of Contents: Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, how they are designed, with observations about tuning the methods for achieving robustness and invariance targets for specific applications. The survey is broader than it is deep, with over 540 references provided to dig deeper. The taxonomy includes search methods, spectra components, descriptor representation, shape, distance functions, accuracy, efficiency, robustness and invariance attributes, and more. Rather than providing ‘how-to’ source code examples and shortcuts, this book provides a counterpoint discussion to the many fine opencv community source code resources available for hands-on practitioners
    Pages: Online-Ressource (XXXI, 508 pages) , 216 illustrations
    ISBN: 9781430259305
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com)
    Pages: Online-Ressource (XXII, 680 pages) , 256 illustrations
    ISBN: 9781430268383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Software Engineering/Programming and Operating Systems ; Data Encryption
    Description / Table of Contents: It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track. --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI
    Pages: Online-Ressource (XXXVI, 400 pages) , 104 illustrations
    ISBN: 9781430263562
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work
    Pages: Online-Ressource (XX, 272 pages) , 74 illustrations
    ISBN: 9781430265726
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Unknown
    Berkeley, CA : Apress
    Keywords: Open source software ; Computer programming ; Software engineering ; Open Source ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Pro Git (Second Edition) is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented version control is a necessity for successful web projects, whether large or small. With this book you’ll learn how to master the world of distributed version workflow, use the distributed features of Git to the full, and extend Git to meet your every need. Written by Git pros Scott Chacon and Ben Straub, Pro Git (Second Edition) builds on the hugely successful first edition, and is now fully updated for Git version 2.0, as well as including an indispensable chapter on GitHub. It’s the best book for all your Git needs
    Pages: Online-Ressource (XXI, 456 pages) , 208 illustrations
    Edition: 2nd edition
    ISBN: 9781484200766
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Keywords: Computer science ; Multimedia information systems ; Computer Science ; Computer Science, general ; Multimedia Information Systems
    Description / Table of Contents: Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to choose and tune coding parameters for optimum results that would suit their particular needs for quality, compression, speed and power. The practical aspects are many: Uploading video to the Internet is only the beginning of a trend where a consumer controls video quality and speed by trading off various other factors. Open source and proprietary applications such as video e-mail, private party content generation, editing and archiving, and cloud asset management would give further control to the end-user. Digital video is frequently compressed and coded for easier storage and transmission. This process involves visual quality loss due to typical data compression techniques and requires use of high performance computing systems. A careful balance between the amount of compression, the visual quality loss and the coding speed is necessary to keep the total system cost down, while delivering a good user experience for various video applications. At the same time, power consumption optimizations are also essential to get the job done on inexpensive consumer platforms. Trade-offs can be made among these factors, and relevant considerations are particularly important in resource-constrained low power devices. To better understand the trade-offs this book discusses a comprehensive set of engineering principles, strategies, methods and metrics. It also exposes readers to approaches on how to differentiate and rank video coding solutions
    Pages: Online-Ressource (XVII, 368 pages) , 115 illustrations
    ISBN: 9781430267133
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Keywords: Computer science ; Computer organization ; Computer Science ; Computer Science, general ; Computer Systems Organization and Communication Networks
    Description / Table of Contents: Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources. Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - "chirps". Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things must evolve now by incorporating simpler protocols toward at the edges of the network, or remain forever inefficient. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored
    Pages: Online-Ressource (XXVI, 192 pages) , 75 illustrations
    ISBN: 9781430257417
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Android on x86: an Introduction to Optimizing for Intel® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel’s x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x86 devices. The fundamental idea is that extending your applications to support x86 or creating new ones is not difficult, but it is imperative to know all of the technicalities. This book is dedicated to providing you with an awareness of these nuances and an understanding of how to tackle them. Second, and most importantly, this book provides a one-stop detailed resource for best practices and procedures associated with the installation issues, hardware optimization issues, software requirements, programming tasks, and performance optimizations that emerge when developers consider the x86 Android devices. Optimization discussions dive into native code, hardware acceleration, and advanced profiling of multimedia applications. The authors have collected this information so that you can use the book as a guide for the specific requirements of each application project. This book is not dedicated solely to code; instead it is filled with the information you need in order to take advantage of x86 architecture. It will guide you through installing the Android SDK for Intel Architecture, help you understand the differences and similarities between processor architectures available in Android devices, teach you to create and port applications, debug existing x86 applications, offer solutions for NDK and C++ optimizations, and introduce the Intel Hardware Accelerated Execution Manager. This book provides the most useful information to help you get the job done quickly while utilizing best practices
    Pages: Online-Ressource (XXVII, 380 pages) , 180 illustrations
    ISBN: 9781430261315
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Xeon Phi™ Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It also examines the source code-level optimizations that can be performed to exploit the powerful features of the processor. Xeon Phi is at the heart of world’s fastest commercial supercomputer, which thanks to the massively parallel computing capabilities of Intel Xeon Phi processors coupled with Xeon Phi coprocessors attained 33.86 teraflops of benchmark performance in 2013. Extracting such stellar performance in real-world applications requires a sophisticated understanding of the complex interaction among hardware components, Xeon Phi cores, and the applications running on them. In this book, Rezaur Rahman, an Intel leader in the development of the Xeon Phi coprocessor and the optimization of its applications, presents and details all the features of Xeon Phi core design that are relevant to the practice of application developers, such as its vector units, hardware multithreading, cache hierarchy, and host-to-coprocessor communication channels. Building on this foundation, he shows developers how to solve real-world technical computing problems by selecting, deploying, and optimizing the available algorithms and data structure alternatives matching Xeon Phi’s hardware characteristics. From Rahman’s practical descriptions and extensive code examples, the reader will gain a working knowledge of the Xeon Phi vector instruction set and the Xeon Phi microarchitecture whereby cores execute 512-bit instruction streams in parallel
    Pages: Online-Ressource (XXI, 232 pages)
    ISBN: 9781430259275
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Keywords: Computer science ; Data encryption (Computer science) ; Database management ; Computer Science ; Data Encryption ; Database Management
    Description / Table of Contents: This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!   John McAuley,EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud."   Alex Rodriguez,  Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk."   Pete Nicoletti. Virtustream Inc. Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. With a foreword from Albert Caballero, the CTO at Trapezoid
    Pages: Online-Ressource (XVII, 156 pages) , 56 illustrations
    ISBN: 9781430261490
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing.  It discusses the social, regulatory, and design considerations specific to these domains. The book provides an application-based approach using real-world examples to illustrate the application of sensor technologies in a practical and experiential manner. The book  guides the reader from the formulation of the research question, through the design and validation process, to the deployment and management phase of sensor applications.  The processes and examples used in the book are primarily based on research carried out by Intel or joint academic research programs. "Sensor Technologies: Healthcare, Wellness and Environmental Applications provides an extensive overview of sensing technologies and their applications in healthcare, wellness, and environmental monitoring. From sensor hardware to system applications and case studies, this book gives readers an in-depth understanding of the technologies and how they can be applied. I would highly recommend it to students or researchers who are interested in wireless sensing technologies and the associated applications." Dr. Benny Lo Lecturer, The Hamlyn Centre, Imperial College of London     "This timely addition to the literature on sensors covers the broad complexity of sensing, sensor types, and the vast range of existing and emerging applications in a very clearly written and accessible manner.  It is particularly good at capturing the exciting possibilities that will occur as sensor networks merge with cloud-based ‘big data’ analytics to provide a host of new applications that will impact directly on the individual in ways we cannot fully predict at present.  It really brings this home through the use of carefully chosen case studies that bring the overwhelming concept of 'big data' down to the personal level of individual life and health."   Dermot Diamond Director, National Centre for Sensor Research, Principal Investigator, CLARITY Centre for Sensor Web Technologies, Dublin City University                                                                      "Sensor Technologies: Healthcare, Wellness and Environmental Applications takes the reader on an end-to-end journey of sensor technologies, covering the fundamentals from an engineering perspective, introducing how the data gleaned can be both processed and visualized, in addition to offering exemplar case studies in a number of application domains.  It is a must-read for those studying any undergraduate course that involves sensor technologies.  It also provides a thorough foundation for those involved in the research and development of applied sensor systems.  I highly recommend it to any engineer who wishes to broaden their knowledge in this area!" Chris Nugent Professor of Biomedical Engineering, University of Ulster  
    Pages: Online-Ressource (XXV, 336 pages) , 108 illustrations
    ISBN: 9781430260141
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer programming ; Programming languages (Electronic computers) ; Computer Science ; Programming Techniques ; Programming Languages, Compilers, Interpreters
    Description / Table of Contents: The book is great! It's clear and easy to read, with loads of examples that showed my students what to do. -- Larry Snyder, Emeritus Professor, University of Washington, Department of Computer Science and Engineering "Having the TouchDevelop book available made our events so much easier. Students could figure things out for themselves with help from the book." -- Jennifer Marsman, Microsoft Principal Developer Evangelist Mobile devices such as smartphones and tablets are set to become the main computers that virtually all people will own and carry with them at all times. And yet,mobile devices are not yet used for all computing tasks. A project at Microsoft Research was created to answer a simple question: "It is possible to create interesting apps directly on a smartphone or tablet, without using a separate PC or a keyboard?" The result is TouchDevelop, a programming environment that runs on all modern mobile devices such as Windows Phone, iPhone, iPad, Android phones and tablets, and also on PCs and Macs. This book walks you through all of the screens of the TouchDevelop app, and it points out similarities and differences of the TouchDevelop language compared to other programming languages. For users, the book can serve as a handyreference next to the phone. The book systematically addresses all programming language constructs, starting from the very basic constructs such as variables and loops. The book also explores many of the phone sensors and data sources which make creating apps for mobile devices so rewarding. If you are new to programming with TouchDevelop, or if you have not yet worked on touchscreen devices, we suggest that you read the book starting from Chapter 1. If you are already familiar with the basic paradigm of the TouchDevelop programming environment, then feel free to jump ahead to the later chapters that address particular topic areas. This book is written from the perspective of a person developing their code using a web browser. The TouchDevelop Web App runs in many modern browsers on many different devices including smartphones and tablets, Macs, PC. All screenshots and navigation instructions refer to the TouchDevelop Web App running in a browser. For Windows Phone, there is a dedicated TouchDevelop app in the Windows Phone Store which gives access to many more sensors and data sources. Starting with the TouchDevelop app v3.0 for Windows Phone 8, the phone app will share the same look and navigation structure and all features of the Web App
    Pages: Online-Ressource (XIX, 270 pages) , 69 illustrations
    Edition: 3rd edition
    ISBN: 9781430261377
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migration details are included. Cloud technology is a tremendous opportunity for an organization to reduce IT costs, and to improve productivity with increased access, simpler administration and improved services. Those businesses that embrace the advantages of the cloud will receive huge rewards in productivity and lower total cost of ownership over those businesses that choose to ignore it. The challenge for those charged with implementing Microsoft Office 365 is to leverage these advantages with the minimal disruption of their organization. This book provides practical help in moving your business to the Cloud and covers the planning, migration and the follow on management of the Office 365 Cloud services
    Pages: Online-Ressource (XXIX, 680 pages) , 638 illustrations
    ISBN: 9781430265276
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Call number: ZSP-168-640
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: ii, 192 S. : Ill., graph. Darst., Kt.
    Series Statement: Berichte zur Polar- und Meeresforschung 640
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Call number: ILP/M 10.0206
    In: Tectonophysics
    Type of Medium: Monograph available for loan
    Pages: VI, 238 S. : z.T. farb. Ill., graph. Darst.
    Series Statement: Tectonophysics Vol. 482, Iss. 1-4 : Special issue
    Language: English
    Location: Reading room
    Branch Library: GFZ Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-589
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (50 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 589
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-590
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (88 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 590
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-592
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource.
    Series Statement: Berichte zur Polar- und Meeresforschung 592
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Series available for loan
    Series available for loan
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-588
    In: Berichte zur Polar- und Meeresforschung ; 588
    Type of Medium: Series available for loan
    Pages: 198 S. , Ill., graph. Darst.
    ISSN: 1866-3192
    Series Statement: Berichte zur Polar- und Meeresforschung 588
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Call number: ZSP-168-585
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (235 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 585
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Call number: ZSP-168-587
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (104 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 587
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-591
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (64 S.). : Ill., graph. Darst.
    Series Statement: Berichte zur Polar- und Meeresforschung 591
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Call number: ZSP-168-593
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource.
    Series Statement: Berichte zur Polar- und Meeresforschung 593
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Keywords: forecast ; sand storm ; dust storm ; warning system ; aeolian dust ; aerosol
    Description / Table of Contents: This volume of IOP Conference Series: Earth and Environmental Science presents a selection of papers that were given at the WMO/GEO Expert Meeting on an International Sand and Dust Storm Warning System hosted by the Barcelona Supercomputing Center – Centro Nacional de Supercomputación in Barcelona (Spain) on 7-9 November 2007 (http://www.bsc.es/wmo). A sand and dust storm (SDS) is a meteorological phenomenon common in arid and semi-arid regions and arises when a gust front passes or when the wind force exceeds the threshold value where loose sand and dust are removed from the dry surface. After aeolian uptake, SDS reduce visibility to a few meters in and near source regions, and dust plumes are transported over distances as long as thousands of kilometres. Aeolian dust is unique among aerosol phenomena: (1) with the possible exception of sea-salt aerosol, it is globally the most abundant of all aerosol species, (2) it appears as the dominating component of atmospheric aerosol over large areas of the Earth, (3) it represents a serious hazard for life, health, property, environment and economy (occasionally reaching the grade of disaster or catastrophic event) and (4) its influence, impacts, complex interactions and feedbacks within the Earth System span a wide range of spatial and temporal scales. From a political and societal point of view, the concern for SDS and the need for international cooperation were reflected after a survey conducted in 2005 by the World Meteorological Organization (WMO) in which more than forty WMO Member countries expressed their interest for creating or improving capacities for SDS warning advisory and assessment. In this context, recent major advances in research – including, for example, the development and implementation of advanced observing systems, the theoretical understanding of the mechanisms responsible for sand and dust storm generation and the development of global and regional dust models – represent the basis for developing applications focusing on societal benefit and risk reduction. However, at present there are interdisciplinary research challenges to overwhelm current uncertainties in order to reach full potential. Furthermore, the community of practice for SDS observations, forecasts and analyses is mainly scientifically based and rather disconnected from potential users. This requires the development of interfaces with operational communities at international and national levels, strongly focusing on the needs of people and factors at risk ... The general objective of the WMO/GEO Expert Meeting on an International Sand and Dust Storm Warning System was to discuss and recommend actions needed to develop a global routine SDS-WAS based on integrating numerical SDS prediction and observing systems, and on establishing effective cooperation between data producers and user communities in order to provide SDS-WAS products capable of contributing to the reduction of risks from SDS. The specific objectives were: to identify, present and suggest future real-time observations for forecast verification and dust surveillance: satellite, ground-based remote sensing (passive and active) and in-situ monitoring; to present ongoing forecasting activities; to discuss and identify user needs: health, air quality, air transport operations, ocean, and others; to identify and discuss dust research issues relevant for operational forecast applications; to present the concept of SDS-WAS and Regional Centers...
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Description / Table of Contents: IOP Publishing presents Volume 6 of the open-access IOP Conference Series: Earth and Environmental Science (EES) as the online abstract book for the IARU International Scientific Congress on Climate Change: Global Risks, Challenges and Decisions (10–12 March, Copenhagen, Denmark). This abstracts-only volume of EES is quite different to standard IOP Conference Series proceedings volumes which contain full, peer-reviewed proceedings papers. This unique volume of more than 1400 abstracts, divided into 58 different sessions, contains all the oral and poster presentations from the Congress. In view of the importance of the Climate Change Congress as a scientific basis for the COP15 conference, we are delighted to offer this collection as a permanent record of current research devoted to climate change. We hope this compilation will contribute to future world-wide dialogue on climate change in the ongoing search to address the scientific, political, social and economic challenges ahead.
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Description / Table of Contents: Reconstructing past climate and past ocean circulation demands the highest possible precision and accuracy which urges the scientific community to look at different sediment records such as the ones from coastal zones to deep-sea with a more complete set of technical and methodological tools. However, the information given by each tool varies in precision, accuracy and in significance according to their environmental settings. It is therefore essential to compare tools. With that in mind, and as part of the International year of Planet Earth, a workshop entitled `From deep-sea to coastal zones: Methods and Techniques for studying palaeoenvironments' took place in Faro (Portugal), from 25–29 February 2008 in order to: present several methods and techniques that can be used for studying sediments from deep-sea to coastal zones, namely for reconstructing palaeoenvironments in order to document past climatic changes and short to long-term environmental processes; allow cross experience between different fields and specialties, either from deep-sea to coastal zones or from micropaleontology to geochemistry; give the opportunity to students from different universities and countries to attend the workshop; publish a special volume on the presented methods and techniques during the workshop. The workshop was organized in four non-parallel sessions dealing with the use of micropaleontology, isotopes, biogeochemistry and sedimentology, as tools for palaeoenvironmental studies. The present IOP Conference Series: Earth and Environmental Science proceedings reflect this organization and papers are published in each theme. The papers are either short reviews or case studies and are highlighted below. The remains of microorganisms found in sediments are the main proxies used in micropaleontological studies. However, the link between fossilized remains and their living origin is not easy to reconstruct only based on the geologic/sedimentary record. Accordingly, Barbosa presents a review of the actual knowledge of living phytoplankton dynamics and the processes, or environmental conditions, which could contribute to the production of fossilized biogenic remains. In the next paper, de Vernal presents a review, based on several case studies, on how palynological fossils observed in sediments are used in tracing biogenic fluxes, characterizing sedimentary environments, or even reconstructing hydrographical conditions and productivity. The two other papers presented in the micropaleontological proxy section are case studies on the use of dinoflagellates (Rochon) and calcareous plankton remains (Guerreiro et al), respectively, to better understand their local or regional environmental living characteristics ant therefore their specific interpretation for palaeoenvironmental reconstruction at a regional scale. Isotopic proxies can be used either as provenance tracers or as chronometers of different processes. Once again, each study can provide a very specific framework of the proxies' use and it is very important to know and evaluate the limits of these tools in each environment and/or type of analyzed material. Accordingly, the two first articles deal with the study of organic carbon either by carbon and oxygen stable isotopes (Hélie) or by radiocarbon (Mollhenhauer and Rethemeyer) analysis. The two other articles in this section deal with the use of radioisotopes. Ghaleb reviews the methods for measuring short-lived radiosisotopes in sediments, giving examples of their use for estimating recent sedimentary accumulation rates; whereas Hillaire-Marcel reviews the potential use of U-series isotopes as radiochronometers in biogenic carbonates. Geochemistry groups more than one field of expertise. However, in the present section, inorganic geochemistry is not treated and both articles present work on a very specific, and at the same time very complex, compound of the organic matter realm: black carbon. As such, Veilleux et al present a density fractionation method for isolating the small quantities of soot-like and graphitic material usually found in natural samples, whereas González-Vila et al. illustrate the potential of the combined use of analytical pyrolysis and solid state 13C NMR to determine the presence of black carbon and to characterize the refractory organic matter in marine sediments from the Gulf of Cadiz (Spain). In the last section, two papers are presented and discuss sedimentological proxies. In their paper, using diffuse spectral reflectance data, Veiga-Pires and Mestre try to determine if `twinned cores' (or paired cores) can be used as duplicate records to increase the volume of sediments collected in the field, whereas Drago et al discuss the use of fish remains in sediments for the reconstruction of paleoproductivity. Each of the above papers benefited from the constructive comments of at least two reviewers and we wish to sincerely thank the reviewers for their timely evaluation. We also thank the participants, volunteers and organizers of the workshop for their implication, making this first workshop on Methods and Techniques for studying palaeoenvironments (METECH) a success. The workshop and this proceeding would not have been possible without the financial and logistical support of GEOTOP, CIMA, the Portuguese Foundation for Science and Technology (FACC07/1/1315) and IOP Conference Series: Earth and Environmental Science...
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Description / Table of Contents: The Beyond Kyoto conference in Aarhus March 2009 was organised in collaboration with other knowledge institutions, businesses and authorities. It brought together leading scientists, policy-makers, authorities, intergovernmental organisations, NGO's, business stakeholders and business organisations. The conference was a joint interdisciplinary project involving many academic areas and disciplines. These conference proceedings are organised in central and recurring themes that cut across many debates on climate change, the climatic challenges as well as the solutions. In the front there is a short presentation of the conference concept. Part I of the proceedings focuses on issues related to the society – covering climate policy, law, market based instruments, financial structure, behaviour and consumption, public participation, media communication and response from indigenous peoples etc. Part II of the proceedings concerns the scientific knowledge base on climate related issues – covering climate change processes per se, the potential impacts of projected climate change on biodiversity and adaptation possibilities, the interplay between climate, agriculture and biodiversity, emissions, agricultural systems, increasing pressure on the functioning of agriculture and natural areas, vulnerability to extreme weather events and risks in respect to sea-level rise etc...
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-586
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (147 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 586
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Call number: ZSP-168-572
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource.
    Series Statement: Berichte zur Polar- und Meeresforschung 572
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-574
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (110 S.)
    Series Statement: Berichte zur Polar- und Meeresforschung 574
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-575
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (37 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 575
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Call number: ZSP-168-577
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (132 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 577
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Call number: ZSP-168-571
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 411 S. : graph. Darst.
    Series Statement: Berichte zur Polar- und Meeresforschung 571
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Call number: ZSP-168-573
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource.
    Series Statement: Berichte zur Polar- und Meeresforschung 573
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Call number: ZSP-168-578
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (158 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 578
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-579
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (271 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 579
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Call number: ZSP-168-569
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (153 S.). : graph. Darst.
    Series Statement: Berichte zur Polar- und Meeresforschung 569
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Call number: ZSP-168-570
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (145 S.)
    Series Statement: Berichte zur Polar- und Meeresforschung 570
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-581
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (S. 35).
    Series Statement: Berichte zur Polar- und Meeresforschung 581
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-580
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (175 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 580
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Call number: ZSP-168-583
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: Online-Ressource (167 S.).
    Series Statement: Berichte zur Polar- und Meeresforschung 583
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Call number: ZSP-168-584
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 265 S. : Ill., graph. Darst.
    ISSN: 1866-3192
    Series Statement: Berichte zur Polar- und Meeresforschung 584
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Monograph available for loan
    Monograph available for loan
    Amsterdam : Elsevier
    Call number: AWI G2-21-94484
    Description / Table of Contents: Although it is generally accepted that the Arctic Ocean is a very sensitive and important region for changes in the global climate, this region is the last major physiographic province of the earth whose short-and long-term geological history is much less known in comparison to other ocean regions. This lack of knowledge is mainly caused by the major technological/logistic problems in reaching this harsh, ice-covered region with normal research vessels and in retrieving long and undisturbed sediment cores. During the the last about 20 years, however, several international and multidisciplinary ship expeditions, including the first scientific drilling on Lomonosov Ridge in 2004, a break-through in Arctic research, were carried out into the central Artic and its surrounding shelf seas. Results from these expeditions have greatly advanced our knowledge on Arctic Ocean paleoenvironments. Published syntheses about the knowledge on Arctic Ocean geology, on the other hand, are based on data available prior to 1990. A comprehensive compilation of data on Arctic Ocean paleoenvironment and its short-and long-term variability based on the huge amount of new data including the ACEX drilling data, has not been available yet. With this book, presenting (1) detailed information on glacio-marine sedimentary processes and geological proxies used for paleoenvironmental reconstructions, and (2) detailed geological data on modern environments, Quaternary variability on different time scales as well as the long-term climate history during Mesozoic-Tertiary times, this gap in knowledge will be filled.
    Type of Medium: Monograph available for loan
    Pages: XIV, 592 Seiten , Illustrationen
    Edition: First edition
    ISBN: 9780444520180
    Series Statement: Developments in marine geology 2
    Language: English
    Note: Contents Preface Acknowledgements List of Abbreviations Part 1: Introduction and Background Chapter 1. Introduction to the Arctic: Significance and History 1.1 The Arctic Ocean and Its Significance for the Earth's Climate System 1.2 History of Arctic Ocean Research 1.3 Plate Tectonic Evolution and Palaeogeography 1.4 Glaciations in Earth's History Chapter 2. Modern Physiography, Hydrology, Climate, and Sediment Input 2.1 Bathymetry and Physiography 2.2 Oceanic Circulation Pattern and Water-Mass Characteristics 2.3 Sea-Ice Cover: Extent, Thickness, and Variability 2.4 Primary Production and Vertical Carbon Fluxes in the Arctic Ocean 2.5 River Discharge 2.6 Permafrost 2.7 Coastal Erosion 2.8 Aeolian Input 2.9 Modern Sediment Input: A Summary Part 2: Processes and Proxies Chapter 3. Glacio-Marine Sedimentary Processes 3.1 Sea-Ice Processes: Sediment Entrainment and Transport 3.2 Ice Sheet- and Iceberg-Related Processes 3.3 Sediment Mass-Wasting Processes 3.4 Turbidite Sedimentation in the Central Arctic Ocean Chapter 4. Proxies Used for Palaeoenvironmental Reconstructions in the Arctic Ocean 4.1 Lithofacies Concept 4.2 Grain-Size Distribution 4.3 Proxies for Sources and Transport Processes of Terrigenous Sediments 4.4 Trace Elements Used for Palaeoenvironmental Reconstruction 4.5 Micropalaeontological Proxies and Their (Palaeo-) Environmental and Stratigraphical Significance 4.6 Stable Isotopes of Foraminifers 4.7 Organic-Geochemical Proxies for Organic-Carbon Source and Palaeoenvironment Part 3: The Marine-Geological Record 5 Modern Environment and its record in surface sediments 5.1 Terrigenous (non-biogenic) components in Arctic Ocean surface sediments: Implications for provenance and modern transport processes 5.2 Organic-Carbon Content: Terrigenous Supply versus Primary Production Chapter 6. Quaternary Variability of Palaeoenvironment and Its Sedimentary Record 6.1 The Stratigraphic Framework of Arctic Ocean Sediment Cores: Background, Problems, and Perspectives 6.2 Variability of Quaternary Ice Sheets and Palaeoceanographic Characteristics: Terrestrial, Model, and Eurasian Continental Margin Records 6.3 Circum-Arctic Glacial History, Sea-Ice Cover, and Surface-Water Characteristics: Quaternary Records from the Central Arctic Ocean 6.4 Accumulation of Particulate Organic Carbon at the Arctic Continental Margin and Deep-Sea Areas During Late Quaternary Times Chapter 7. Mesozoic to Cenozoic Palaeoenvironmental Records of High Northern Latitudes 7.1 Mesozoic High-Latitude Palaeoclimate and Arctic Ocean Palaeoenvironment 7.2 Cenozoic High-Latitude Palaeoclimate and Arctic Ocean Palaeoenvironment Chapter 8. Open Questions and Future Geoscientific Arctic Ocean Research 8.1 Quaternary and Neogene Climate Variability on Sub-Millennial to Milankovich Time Scales 8.2 The Mesozoic-Cenozoic History of the Arctic Ocean References Index
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Description / Table of Contents: This volume of the IOP Conference Series: Earth and Environmental Sciences presents a selection of papers given at the Donald D Harrington Symposium on the Geology of the Aegean held on the campus of the University of Texas at Austin on April 28-30, 2008. Donald D Harrington was born in Illinois in 1899 and moved westward after serving in the Army Air Corps during World War I. Mr Harrington took a position as a landman with Marlin Oil Company in Oklahoma. When the Texas Panhandle oil boom hit in 1926, he moved to Amarillo, Texas, where he met Sybil Buckingham—the granddaughter of one of Amarillo's founding families. They married in 1935 and went on to build one of the most successful independent oil and gas operations in Texas history. The couple created the Don and Sybil Harrington Foundation in 1951 to support worthy causes such as museums, medical research, education, and the arts. At the Harrington Symposium on the Geology of the Aegean, researchers presented papers organized under five general themes: (1) the geology of Aegean in general (2) the geologic history of specific domains within the Aegean (Cyclades, Menderes, Kazdag, Rhodope, Crete, southern Balkans, etc) (3) the dynamic tectonic processes that occur within the Aegean (4) its geo-archeological history, natural history and hazards and (5) comparisons of the Aegean to regions elsewhere (e.g., Basin and Ranges; Asian extensional terranes). The Aegean is a locus of dynamic research in a variety of fields, and the symposium provided an opportunity for geologists from a range of disciplines to interact and share new results and information about their research in the area...
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Unknown
    Bristol, UK : IOP Publishing
    Description / Table of Contents: Caldera-formation is one of the most awe-inspiring and powerful displays of nature's force. Resultant deposits may cover vast areas and significantly alter the immediate topography. Post-collapse activity may include resurgence, unrest, intra-caldera volcanism and potentially the start of a new magmatic cycle, perhaps eventually leading to renewed collapse. Since volcanoes and their eruptions are the surface manifestation of magmatic processes, calderas provide key insights into the generation and evolution of large-volume silicic magma bodies in the Earth's crust. Despite their potentially ferocious nature, calderas play a crucial role in modern society's life. Collapse calderas host essential economic deposits and supply power for many via the exploitation of geothermal reservoirs, and thus receive considerable scientific, economic and industrial attention. Calderas also attract millions of visitors world-wide with their spectacular scenic displays. To build on the outcomes of the 2005 calderas workshop in Tenerife (Spain) and to assess the most recent advances on caldera research, a follow-up meeting was proposed to be held in Mexico in 2008. This abstract volume presents contributions to the 2nd Calderas Workshop held at Hotel Misión La Muralla, Querétaro, Mexico, 19–25 October 2008. The title of the workshop `Reconstructing the evolution of collapse calderas: Magma storage, mobilisation and eruption' set the theme for five days of presentations and discussions, both at the venue as well as during visits to the surrounding calderas of Amealco, Amazcala and Huichapan. The multi-disciplinary workshop was attended by more than 40 scientist from North, Central and South America, Europe, Australia and Asia. Contributions covered five thematic topics: geology, geochemistry/petrology, structural analysis/modelling, geophysics, and hazards...
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Description / Table of Contents: The 14th International Symposium for the Advancement of Boundary Layer Remote Sensing (ISARS 2008) addresses acoustical, optical and microwave techniques to probe the lower part of the atmosphere. The symposium focuses on the physical basis of remote sensing techniques and new instruments. A theme for the conference is also various applications of remote sensing, this year with special emphasis on wind energy. ISARS is an informal association of scientists from all over the world which organizes a symposium every second year. While the abbreviation ISARS has remained unchanged since the start in Calgary 1981, the words have changed from International Symposium on Acoustic Remote Sensing and Associated Techniques of the Atmosphere and Oceans because other techniques than the acoustic have become important for boundary layer remote sensing. Specifically lasers for remote wind sensing are developing rapidly. By the end of each symposium the chairman of the next has been elected. So far the symposia have taken place in different countries each time with different chairs. The scientific organizing committee, which consists mainly of chair persons of previous symposia, maintains the continuity of themes and of the organization in general. After the last symposium held in Garmisch-Partenkirchen, many of the papers appeared in revised and improved form in a special issue of Meteorologische Zeitschrift. A similar special issue is also planned to follow ISARS 2008. I wish to express my gratitude to the scientific organizing committee for valuable advice and to the local organizing committee for all their effort with the conference papers and the conference itself. Jakob Mann, Conference Chair
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Keywords: hydrological forecasting ; hydro-meteorological extremes, floods and droughts ; global climate change and antropogenic impacts on hydrological processes ; water management ; floods, morphological processes, erosion, sediment transport and sedimentation ; developments in hydrology
    Description / Table of Contents: This volume of IOP Conference Series: Earth and Environmental Science presents a selection of papers that were given at the 24th Conference of the Danube Countries. Within the framework of the International Hydrological Program IHP of UNESCO. Since 1961 the Danube countries have successfully co-operated in organizing conferences on Hydrological Forecasting and Hydrological Water Management Issues. The 24th Conference of the Danube Countries took place between 2-4 June 2008 in Bled, Slovenia and was organized by the National Committee of Slovenia for the International Hydrological Program of UNESCO, under the auspices of the President of Republic of Slovenia. It was organized jointly by the Slovenian National Commission for UNESCO and the Environmental Agency of the Republic of Slovenia, under the support of UNESCO, WMO, and IAHS...
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Pages: Online-Ressource (1-1098, I1-I32 Seiten)
    ISBN: 9780444826428
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Keywords: DDC 515.35 ; LC QA371 ; Differential equations ; Differential equations, Partial ; Evolution equations
    Pages: Online-Ressource (xv, 592 pages)
    ISBN: 9780444530349
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-558
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: 68 S. : Ill., graph. Darst. Kt.
    Series Statement: Berichte zur Polar- und Meeresforschung 558
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-557
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: 166 S. : Ill., graph. Darst., Kt.
    Series Statement: Berichte zur Polar- und Meeresforschung 557
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Call number: ZSP-168-560
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: X, 228 S. : Ill., Kt.
    Series Statement: Berichte zur Polar- und Meeresforschung 560
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Call number: ZSP-168-565
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: 235 S. : graph. Darst., Kt.
    Series Statement: Berichte zur Polar- und Meeresforschung 565
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Call number: ZSP-168-566
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 30 S. : Ill., graph. Darst., Kt.
    Series Statement: Berichte zur Polar- und Meeresforschung 566
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-568
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: 138 S. : graph. Darst., Kt.
    Series Statement: Berichte zur Polar- und Meeresforschung 568
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    facet.materialart.12
    facet.materialart.12
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-563
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: 12
    Pages: VIII, 229 S. : Ill., graph. Darst., Kt.
    Series Statement: Berichte zur Polar- und Meeresforschung 563
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Series available for loan
    Series available for loan
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-544 ; ZSP-168-544
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 242 S. : graph. Darst.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 544
    Classification:
    Oceanology
    Language: English
    Location: AWI Reading room
    Location: AWI Reading room
    Branch Library: AWI Library
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Call number: ZSP-168-549 ; ZS-090(549)
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 214 S. : graph. Darst.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 549
    Classification:
    Oceanology
    Language: English
    Location: AWI Reading room
    Location: Lower compact magazine
    Branch Library: AWI Library
    Branch Library: GFZ Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Series available for loan
    Series available for loan
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-542 ; ZSP-168-542
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: XIII, 165 S. : graph. Darst.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 542
    Classification:
    Oceanology
    Language: English
    Note: Zugl.: Bremen, Univ., Diss., 2006
    Location: AWI Reading room
    Location: AWI Reading room
    Branch Library: AWI Library
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Call number: ZSP-168-543 ; ZSP-168-543
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 235 S. : graph. Darst.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 543
    Classification:
    Oceanology
    Language: English
    Location: AWI Reading room
    Location: AWI Reading room
    Branch Library: AWI Library
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Series available for loan
    Series available for loan
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-548 ; ZS-090(548)
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 103 S. : graph. Darst.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 548
    Classification:
    Stratigraphy
    Language: English
    Note: Zugl.: Bremen, Univ., Diss., 2006
    Location: AWI Reading room
    Location: Lower compact magazine
    Branch Library: AWI Library
    Branch Library: GFZ Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Series available for loan
    Series available for loan
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-547 ; ZS-090(547)
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 152 S. : graph. Darst.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 547
    Classification:
    Meteorology and Climatology
    Language: English
    Note: Zugl.: Bremen, Univ., Diss., 2005
    Location: AWI Reading room
    Location: Lower compact magazine
    Branch Library: AWI Library
    Branch Library: GFZ Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Unknown
    Amsterdam : Elsevier
    Pages: Online-Ressource (4777-5752, I1-I52 Seiten)
    ISBN: 9780444532008
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Pages: Online-Ressource (2251-3031)
    ISBN: 9780444518736
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Unknown
    Amsterdam : Elsevier
    Pages: Online-Ressource (3845-4776, I1-I52 Seiten)
    ISBN: 9780444506313
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Unknown
    Amsterdam : Elsevier
    Pages: Online-Ressource (1557-2440, I-1-I-34 Seiten)
    ISBN: 9780444824356
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Unknown
    Amsterdam : Elsevier
    ISBN: 9780444512352
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Unknown
    Amsterdam : Elsevier
    ISBN: 9780444531209
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    ISBN: 9780444519108
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Unknown
    Amsterdam : Elsevier
    Keywords: DDC 530.1201/5113 ; LC QC174.17.M35 ; Quantum logic
    Pages: Online-Ressource (p)
    ISBN: 9780444528704
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Description / Table of Contents: Since its inception in the famous 1936 paper by Birkhoff and von Neumann entitled “The logic of quantum mechanics” quantum logic, i.e. the logical investigation of quantum mechanics, has undergone an enormous development. Various schools of thought and approaches have emerged and there are a variety of technical results. Quantum logic is a heterogeneous field of research ranging from investigations which may be termed logical in the traditional sense to studies focusing on structures which are on the border between algebra and logic. For the latter structures the term quantum structures is appropriate. The chapters of this Handbook, which are authored by the most eminent scholars in the field, constitute a comprehensive presentation of the main schools, approaches and results in the field of quantum logic and quantum structures. Much of the material presented is of recent origin representing the frontier of the subject. The present volume focuses on quantum structures. Among the structures studied extensively in this volume are, just to name a few, Hilbert lattices, D-posets, effect algebras MV algebras, partially ordered Abelian groups and those structures underlying quantum probability. - Written by eminent scholars in the field of logic - A comprehensive presentation of the theory, approaches and results in the field of quantum logic - Volume focuses on quantum structures
    Pages: Online-Ressource (xiii, 801 pages)
    ISBN: 9780444528704
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Unknown
    Amsterdam : Elsevier
    ISBN: 9780444531001
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Series available for loan
    Series available for loan
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-541 ; ZS-090(541
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: XVI, 141 S. : Ill., graph. Darst.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 541
    Classification:
    Meteorology and Climatology
    Language: English
    Note: Zugl.: Greifswald, Univ., Diss., 2005
    Location: AWI Reading room
    Location: Lower compact magazine
    Branch Library: AWI Library
    Branch Library: GFZ Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Series available for loan
    Series available for loan
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-539 ; ZS-090(539)
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 123 S. : Ill., graph. Darst., Kt.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 539
    Language: English
    Location: AWI Reading room
    Location: Lower compact magazine
    Branch Library: AWI Library
    Branch Library: GFZ Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    ISBN: 9780444508706
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    ISBN: 9780444521453
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Pages: Online-Ressource (1-1012, I1-I28 Seiten)
    ISBN: 9780444513953
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Unknown
    Amsterdam : Elsevier
    ISBN: 9780444513991
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Unknown
    Amsterdam : Elsevier
    ISBN: 9780444528193
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    ISBN: 9780444506979
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Unknown
    Amsterdam : Elsevier
    Pages: Online-Ressource (829-1660)
    ISBN: 9780444512536
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Call number: ZSP-168-500 ; ZS-090(500)
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 302 S. , graph. Darst.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 500
    Classification:
    Oceanology
    Language: English
    Location: AWI Reading room
    Location: Lower compact magazine
    Branch Library: AWI Library
    Branch Library: GFZ Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Series available for loan
    Series available for loan
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP-168-503
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: IV, 149 S.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 503
    Language: English
    Location: AWI Reading room
    Branch Library: AWI Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Series available for loan
    Series available for loan
    Bremerhaven : Alfred-Wegener-Inst. für Polar- und Meeresforschung
    Associated volumes
    Call number: ZSP 168-501 ; ZS-090(501)
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: II, 247 S.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 501
    Classification:
    Oceanology
    Language: English
    Location: AWI Reading room
    Location: Lower compact magazine
    Branch Library: AWI Library
    Branch Library: GFZ Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Call number: ZSP-168-502 ; ZS-090(502)
    In: Berichte zur Polar- und Meeresforschung
    Type of Medium: Series available for loan
    Pages: 106 S. , graph. Darst.
    ISSN: 1618-3193
    Series Statement: Berichte zur Polar- und Meeresforschung 502
    Classification:
    Oceanology
    Language: English
    Location: AWI Reading room
    Location: Lower compact magazine
    Branch Library: AWI Library
    Branch Library: GFZ Library
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Pages: Online-Ressource (1105-1618, I1-I26 Seiten)
    ISBN: 9780444511461
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Pages: Online-Ressource (1-1060, I1-I46 Seiten)
    ISBN: 9780444520418
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Pages: Online-Ressource (1061-1822, I1-I46 Seiten)
    ISBN: 9780444520432
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...