Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 457
- Law 453
- History 438
- Economic conditions 352
- Droit 324
- Economic history 301
- Història 298
- Law reviews 280
- Politics and government 231
- Management 223
- Law and legislation 201
- Education 189
- Social conditions 189
- Agronomy 177
- Agronomía 174
- Biblia 160
- Crítica e interpretación 157
- Agronomia 148
- Histoire 142
- Development 140
- Filosofía 135
- Study and teaching 135
- Research 133
- Música 130
- Animal science 118
- Revues de droit 116
- Artificial intelligence 113
- Economics 111
- Bíblia 109
- Geología 109
-
22901Publicado 2015Tabla de Contenidos: “…3.5.3 The barbershop problem: introducing fairness -- 3.5.4 Readers-writers -- 3.5.4.1 A solution favoring the readers -- 3.5.4.2 Giving priority to the writers -- 3.5.4.3 A fair solution -- 3.6 Monitors -- 3.6.1 Design approach 1: critical section inside the monitor -- 3.6.2 Design approach 2: monitor controls entry to critical section -- 3.7 Applying monitors in classical problems -- 3.7.1 Producers-consumers revisited -- 3.7.1.1 Producers-consumers: buffer manipulation within the monitor -- 3.7.1.2 Producers-consumers: buffer insertion/extraction exterior to the monitor -- 3.7.2 Readers-writers -- 3.7.2.1 A solution favoring the readers -- 3.7.2.2 Giving priority to the writers -- 3.7.2.3 A fair solution -- 3.8 Dynamic vs. static thread management -- 3.8.1 Qt's thread pool -- 3.8.2 Creating and managing a pool of threads -- 3.9 Debugging multithreaded applications -- 3.10 Higher-level constructs: multithreaded programming without threads -- 3.10.1 Concurrent map -- 3.10.2 Map-reduce -- 3.10.3 Concurrent filter -- 3.10.4 Filter-reduce -- 3.10.5 A case study: multithreaded sorting -- 3.10.6 A case study: multithreaded image matching -- Exercises -- Chapter 4: Shared-memory programming: OpenMP -- 4.1 Introduction -- 4.2 Your First OpenMP Program -- 4.3 Variable Scope -- 4.3.1 OpenMP Integration V.0: Manual Partitioning -- 4.3.2 OpenMP Integration V.1: Manual Partitioning Without a Race Condition -- 4.3.3 OpenMP Integration V.2: Implicit Partitioning with Locking -- 4.3.4 OpenMP Integration V.3: Implicit Partitioning with Reduction -- 4.3.5 Final Words on Variable Scope -- 4.4 Loop-Level Parallelism -- 4.4.1 Data Dependencies -- 4.4.1.1 Flow Dependencies -- 4.4.1.2 Antidependencies -- 4.4.1.3 Output Dependencies -- 4.4.2 Nested Loops -- 4.4.3 Scheduling -- 4.5 Task Parallelism -- 4.5.1 The sections Directive -- 4.5.1.1 Producers-Consumers in OpenMP…”
Libro electrónico -
22902Publicado 2016Tabla de Contenidos: “…3.6.2 C++11 Error Reporting -- 3.6.3 C++11 Data Types -- 3.6.4 Creating and Running C++11 Threads -- 3.6.5 Examples of C++11 Thread Management -- 3.7 SPool Utility -- 3.7.1 Under the SPool Hood -- 3.8 SPool Examples -- 3.8.1 Addition of Two Long Vectors -- 3.8.2 Monte Carlo Computation of π -- 3.8.3 Thread Safety Issue -- 3.9 First Look at OpenMP -- 3.9.1 Example: Computing the Area Under a Curve -- 3.10 Database Search Example -- 3.11 Conclusions -- 3.12 Annex: Coding C++11 Time Durations -- Chapter 4: Thread-Safe Programming -- 4.1 Introduction -- 4.1.1 First Example: The Monte Carlo π Code -- 4.2 Some Library Functions are not Thread Safe -- 4.3 Dealing with Random Number Generators -- 4.3.1 Using Stateless Generators -- 4.3.2 Using Local C++ Objects -- 4.4 Thread Local Storage Services -- 4.4.1 C++11 thread_local Keyword -- 4.4.2 OpenMP threadprivate Directive -- 4.4.3 Windows TLS Services -- 4.4.4 Thread Local Classes in TBB -- 4.4.5 Thread Local Storage in Pthreads -- 4.5 Second Example: A Gaussian Random Generator -- 4.6 Comments on Thread Local Storage -- 4.7 Conclusion -- Chapter 5: Concurrent Access to Shared Data -- 5.1 First Comments on Thread Synchronization -- 5.2 Need for Mutual Exclusion Among Threads -- 5.3 Different Kinds of Mutex Flavors -- 5.4 Pthreads Mutual Exclusion -- 5.4.1 Mutex-Spin-Lock Programming Interface -- 5.4.2 Simple Example: Scalar Product of Two Vectors -- 5.4.3 First, Very Inefficient Version -- 5.4.4 Another Inefficient Version Using Spin Locks -- 5.4.5 Correct Approach -- 5.5 Other Simple Examples -- 5.5.1 Reduction< -- T> -- Utility -- 5.5.2 SafeCout: Ordering Multithreaded Output to stdout -- 5.6 Windows Mutual Exclusion -- 5.7 OpenMP Mutual Exclusion -- 5.8 C++11 Mutual Exclusion -- 5.8.1 Scoped Lock Class Templates -- Why is another scoped locking class needed? …”
Libro electrónico -
22903por Gödl, RobertTabla de Contenidos: “…3.3.1 Debian-Backports - aktuellere Software aus dem nächsten Debian-Release installieren -- 3.3.2 Pinning - aktuellere Software aus anderen Debian-Versionen installieren -- 3.3.3 Auf Debian Testing wechseln -- 3.4 Weitere Paket-Formate für zusätzliche Software -- 3.4.1 Flatpak - zusätzliche und aktuellere Software -- 3.4.2 Snap - zusätzliche und aktuellere Software von Ubuntu -- 3.5 AppImages - ausführbare Dateien unter Linux -- 3.6 Software für die Programmierung -- 3.6.1 Python-Software über das Python-Repository verwalten -- 3.6.2 Rust-Software mittels Cargo verwalten -- 3.7 Software unter Debian kompilieren -- 3.7.1 C-Programme kompilieren -- 3.7.2 C++-Programme kompilieren -- 3.8 Distrobox - Software von anderen Linux-Distributionen im Container installieren -- 3.9 Software über selbst extrahierende Skripte installieren -- Kapitel 4: Das System -- 4.1 Die Verzeichnis-Hierarchie -- 4.1.1 Das Wurzelverzeichnis -- 4.1.2 Das Home-Verzeichnis -- 4.2 Rechte an Ihren Daten - Gruppen -- 4.2.1 Benutzer und Gruppen erstellen -- 4.3 sudo und su - der Administrator unter Debian -- 4.4 Das Terminal - die Kommandozeile -- 4.4.1 Der Aufbau des Terminals und dessen Grundlagen -- 4.4.2 Ordner-Inhalte anzeigen und in der Verzeichnis-Hierarchie navigieren -- 4.4.3 Hilfe und Optionen -- 4.4.4 Arbeiten mit Dateien und Ordnern am Terminal -- 4.4.5 Kopieren und Einfügen -- 4.5 Treiber und Firmware -- 4.5.1 Druckertreiber und Scannertreiber -- 4.5.2 NVIDIA-Grafikkarten-Treiber installieren -- 4.6 Systemd - die Steuerzentrale von Debian -- 4.6.1 Installierte Systemdienste anzeigen lassen -- 4.6.2 Nähere Informationen zu einem Systemdienst anzeigen -- 4.6.3 Dienste manuell starten und stoppen -- 4.6.4 Mit Systemd Debian steuern (ausschalten, neu starten, ...) -- 4.6.5 Log-Dateien anzeigen -- 4.6.6 Start-Analyse mit Systemd…”
Publicado 2023
Libro electrónico -
22904Publicado 2023Tabla de Contenidos: “…3.5.1 Conditional Probability Function -- 3.5.2 Conditional Probability Density Function -- 3.6 Expectations -- 3.6.1 Moments -- 3.6.2 Expected Value of Function of Random Variable -- 3.6.3 Covariance -- 3.7 Conditional Expectations -- 3.8 Convergence of Random Variables -- 3.9 Random Processes -- 3.10 Markov Processes -- 3.11 Hidden Markov Models -- 3.12 Gaussian Processes -- Exercises -- Part II Optimization -- Chapter 4 Optimization Theory -- 4.1 Basic Concepts and Terminology -- 4.1.1 Optimization Problems -- 4.1.2 Equivalent Problems -- 4.2 Convex Sets -- 4.2.1 Convexity‐Preserving Operations -- 4.2.1.1 Intersection -- 4.2.1.2 Affine Transformation -- 4.2.1.3 Perspective Transformation -- 4.2.2 Examples of Convex Sets -- 4.2.2.1 Hyperplanes and Halfspaces -- 4.2.2.2 Polyhedral Sets -- 4.2.2.3 Norm Balls and Ellipsoids -- 4.2.2.4 Convex Cones -- 4.2.3 Generalized Inequalities -- 4.3 Convex Functions -- 4.3.1 First‐ and Second‐Order Conditions for Convexity -- 4.3.2 Convexity‐Preserving Operations -- 4.3.2.1 Scaling, Sums, and Integrals -- 4.3.2.2 Pointwise Maximum and Supremum -- 4.3.2.3 Affine Transformation -- 4.3.2.4 Perspective Transformation -- 4.3.2.5 Partial Infimum -- 4.3.2.6 Square of Nonnegative Convex Functions -- 4.3.3 Examples of Convex Functions -- 4.3.3.1 Norms -- 4.3.3.2 Indicator and Support Functions -- 4.3.4 Conjugation -- 4.3.5 Dual Norms -- 4.4 Subdifferentiability -- 4.4.1 Subdifferential Calculus -- 4.4.1.1 Nonnegative Scaling -- 4.4.1.2 Summation -- 4.4.1.3 Affine Transformation -- 4.4.1.4 Pointwise Maximum -- 4.4.1.5 Subgradients of Conjugate Functions -- 4.5 Convex Optimization Problems -- 4.5.1 Optimality Condition -- 4.5.2 Equality Constrained Convex Problems -- 4.6 Duality -- 4.6.1 Lagrangian Duality -- 4.6.2 Lagrange Dual Problem -- 4.6.3 Fenchel Duality -- 4.7 Optimality Conditions…”
Libro electrónico -
22905Publicado 2023Tabla de Contenidos: “…3.3.2 Dimensionality Reduction -- 3.4 Importance of Dimensionality Reduction in Machine Learning -- 3.4.1 Methods of Dimensionality Reduction -- 3.4.1.1 Principal Component Analysis (PCA) -- 3.4.1.2 Linear Discriminant Analysis (LDA) -- 3.4.1.3 Generalized Discriminant Analysis (GDA) -- 3.5 Distance Measures -- 3.6 Clustering -- 3.6.1 Algorithms in Clustering -- 3.6.2 Applications of Clustering -- 3.6.3 Iterative Distance-Based Clustering -- 3.7 Hierarchical Model -- 3.8 Density-Based Clustering -- 3.8.1 DBSCAN -- 3.8.2 OPTICS -- 3.9 Role of Machine Learning in Factories of the Future -- 3.10 Identification of the Probable Customers -- 3.11 Conclusion -- References -- Chapter 4 Understanding Neural Networks -- 4.1 Introduction -- 4.2 Components of Neural Networks -- 4.2.1 Neurons -- 4.2.2 Synapses and Weights -- 4.2.3 Bias -- 4.2.4 Architecture of Neural Networks -- 4.2.5 How Do Neural Networks Work? …”
Libro electrónico -
22906Publicado 2024Tabla de Contenidos: “…Conclusion -- 3.8. Acknowledgment -- 3.9. References -- Chapter 4. Edge Computing with Operations Research Using IoT Devices in Healthcare: Concepts, Tools, Techniques and Use Cases -- 4.1. …”
Libro electrónico -
22907Publicado 2005Tabla de Contenidos: “…3.4 Starting the SMF Bundle Server -- 3.5 Starting the SMF Runtime -- 3.6 Stopping the SMF Bundle Server -- 3.7 Stopping the SMF Runtime -- 3.8 Submitting bundles to the SMF bundle server -- 3.9 Installing bundles into the SMF Runtime -- 3.10 Removing bundles from the SMF bundle server -- 3.11 Uninstalling bundles from the SMF Runtime -- Chapter 4. …”
Libro electrónico -
22908Tabla de Contenidos: “…Tivoli Configuration Manager fundamentals and installation -- 3.1 IBM Tivoli Configuration Manager fundamentals -- 3.1.1 Tivoli Configuration Manager components and services -- 3.2 Creating a deployment plan for Tivoli Configuration Manager -- 3.3 How to deploy Tivoli Configuration Manager components -- 3.3.1 Distributed Configuration Manager components -- 3.3.2 TMR server configuration -- 3.3.3 Components for managed nodes -- 3.3.4 Components for gateways -- 3.3.5 Components for endpoints -- 3.4 Required roles for installation -- 3.5 RDBMS considerations -- 3.6 RIM considerations -- 3.7 General pre-install checks, hints, and tips -- 3.7.1 UNIX -- 3.7.2 Windows Systems on Intel® 486 or Pentium® systems -- 3.8 Installation methods -- 3.9 Overview of Integrated Install -- 3.10 Server Install -- 3.10.1 Typical Server Install -- 3.10.2 Custom Server Install -- 3.10.3 Starting the installation programs -- 3.11 Desktop Install -- 3.11.1 Starting the installation program -- 3.12 Web Gateway Install -- 3.12.1 Web Gateway prerequisites -- 3.12.2 Starting the installation program -- 3.12.3 Multiple endpoints installation -- 3.13 Uninstallation of IBM Tivoli Configuration Manager -- Chapter 4. …”
Libro electrónico -
22909Publicado 2011Tabla de Contenidos: “…2.10 Factors Behind the Success of a Construction Organization -- References -- Review Questions -- Chapter 3: Construction Economics -- 3.1 Introduction -- 3.2 Economic Decision-Making -- 3.2.1 Out-of-Pocket Commitment -- 3.2.2 Payback Period -- 3.2.3 Average Annual Rate of Return -- 3.3 Time Value of Money -- 3.4 Cash-Flow Diagrams -- 3.4.1 Project Cash-Flow and Company Cash-Flow Diagrams -- 3.4.2 Using Cash-Flow Diagrams -- 3.5 Using Interest Tables -- 3.6 Evaluating Alternatives by Equivalence -- 3.6.1 Present Worth Comparison -- 3.6.2 Future Worth Comparison -- 3.6.3 Annual Cost and Worth Comparison -- 3.6.4 Rate of Return Method -- 3.7 Effect of Taxation on Comparison of Alternatives -- 3.8 Effect of Inflation on Cash-Flow -- 3.9 Evaluation of Public Projects: Discussion on Benefit-Cost Ratio -- 3.9.1 Benefit/Cost Criteria -- References -- Solved Examples -- Review Questions -- Chapter 4: Client's Estimation of Project Cost -- 4.1 Introduction -- 4.2 Approximate Methods of Estimation -- 4.2.1 Preliminary Estimate for Buildings -- 4.2.2 Preliminary Estimate for Industrial Structures -- 4.3 Types of Estimates -- 4.3.1 Rough Order of Magnitude Estimates -- 4.3.2 Client's Indicative Cost Estimate -- 4.3.3 Client's Preliminary Cost Estimate -- 4.3.4 Client's Detailed Estimate -- 4.3.5 Client's Definitive Estimate -- 4.3.6 Revised Estimate -- 4.3.7 Supplementary Estimates -- 4.3.8 Project Closure Cost -- 4.4 Methods of Structuring Project Costs -- 4.5 Illustrative Cases in Preparation of Estimate -- 4.5.1 Case1: Multi-Level Car Parking Facility -- 4.5.2 Case 2: Preliminary Estimate for Construction of Sewage Treatment Plant -- References -- Solved Examples -- Review Questions -- Chapter 5: Construction Contract -- 5.1 Construction Contract -- 5.2 Contract Document -- 5.2.1 The Contract Drawings -- 5.2.2 The Specifications…”
Libro electrónico -
22910Publicado 2009Tabla de Contenidos: “…3.4.1 Thomas Algorithm for Tridiagonal Systems -- 3.4.2 Crank-Nicholson Scheme: Truncation Error, Consistency, and Convergence -- 3.4.3 Dissipative and Dispersive Errors -- 3.4.4 Stability of the Crank-Nicholson Scheme -- 3.5 A Note on Implicit Methods -- 3.6 Leap-frog and DuFort-Frankel Schemes -- 3.6.1 Truncation Error of the DuFort-Frankel Scheme -- 3.6.2 Stability of DuFort-Frankel Scheme -- 3.7 Operator Notation -- 3.8 The Alternating Direction Implicit (ADI) Method -- 3.8.1 ADI Scheme -- 3.8.2 Splitting and Approximate Factorisation -- 3.8.3 Stability of the ADI Scheme -- 3.8.4 Program 3.1: adi.f -- 3.9 Summary -- 3.10 Key Terms -- 3.11 Exercise 3 -- Chapter 4: Equations of Hyperbolic Type -- 4.1 Introduction -- 4.2 Explicit Schemes -- 4.2.1 FTCS Scheme -- 4.2.2 FTFS Scheme -- 4.2.3 Upwind Scheme: First Order -- 4.2.4 Upwind Scheme: Modified Equation -- 4.2.5 The Lax Scheme -- 4.2.6 Consistency of Lax Scheme -- 4.2.7 Lax Scheme: Modified Equation -- 4.2.8 The Leap-Frog Scheme -- 4.3 Lax-Wendroff Scheme and Variants -- 4.3.1 Lax-Wendroff Scheme: Modified Equation -- 4.3.2 Two-Step Lax-Wendroff Scheme -- 4.3.3 The MacCormack Scheme -- 4.3.4 Upwind Scheme: Warming-Beam -- 4.4 Implicit Schemes -- 4.5 More on Upwind Schemes -- 4.6 Scalar Conservation Law: Lax-Wendroff and Related Schemes -- 4.6.1 Program 4.1: Ixmc.f -- 4.6.2 Implicit Schemes for Scalar Conservation Law -- 4.7 Hyperbolic System of Conservation Laws -- 4.7.1 System of Conservation Laws -- 4.8 Second-order Wave Equation -- 4.8.1 Stability of the Leap-Frog Scheme for the Wave Equation -- 4.8.2 An Implicit Scheme for the Second-Order Wave Equation -- 4.8.3 Stability of the Implicit Scheme -- 4.9 Method of Characteristics for Second-order Hyperbolic Equations -- 4.10 Model Convection-Diffusion Equation -- 4.10.1 Steady Convection-Diffusion Equation…”
Libro electrónico -
22911Publicado 2021Tabla de Contenidos: “…3.7.1 Installing Docker -- 3.7.2 Checking your Docker installation -- 3.8 Packaging our microservice -- 3.8.1 Creating a Dockerfile -- 3.8.2 Packaging and checking our Docker image -- 3.8.3 Booting our microservice in a container -- 3.9 Publishing our microservice -- 3.9.1 Creating a private container registry -- 3.9.2 Pushing our microservice to the registry -- 3.9.3 Booting our microservice from the registry -- 3.10 Docker review -- 3.11 Continue your learning -- Summary -- 4 Data management for microservices -- 4.1 New tools -- 4.2 Getting the code -- 4.3 Developing microservices with Docker Compose -- 4.3.1 Why Docker Compose? …”
Libro electrónico -
22912por Sountharrajan, S.Tabla de Contenidos: “…3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology…”
Publicado 2023
Libro electrónico -
22913por Tyagi, Amit KumarTabla de Contenidos: “…3.2 Significance of Volunteer Edge Cloud Concept -- 3.3 Proposed System -- 3.3.1 Smart Contract -- 3.3.2 Order Task Method -- 3.3.3 KubeEdge -- 3.4 Implementation of Volunteer Edge Control -- 3.4.1 Formation of a Cloud Environment -- 3.5 Result Analysis of Volunteer Edge Cloud -- 3.6 Introducing Blockchain-Enabled Internet of Things Systems Using the Serverless Cloud Platform -- 3.7 Introducing Serverless Cloud Platforms -- 3.7.1 IoT Systems -- 3.7.2 JointCloud -- 3.7.3 Computing Without Servers -- 3.7.4 Oracle and Blockchain Technology -- 3.8 Serverless Cloud Platform System Design -- 3.8.1 Aim and Constraints -- 3.8.2 Goals and Challenges -- 3.8.3 HCloud Connections -- 3.8.4 Data Sharing Platform -- 3.8.5 Cloud Manager -- 3.8.6 The Agent -- 3.8.7 Client Library -- 3.8.8 Witness Blockchain -- 3.9 Evaluation of HCloud -- 3.9.1 CPU Utilization -- 3.9.2 Cost Analysis -- 3.10 HCloud-Related Works -- 3.10.1 Serverless -- 3.10.2 Efficiency -- 3.11 Conclusion -- References -- Chapter 4 Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications for Next-Generation Society -- 4.1 Introduction -- 4.2 Background Work -- 4.3 Motivation -- 4.4 Existing Innovations in the Current Society -- 4.5 Expected Innovations in the Next-Generation Society -- 4.6 An Environment with Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.7 Open Issues in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.8 Research Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.9 Legal Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.10 Future Research Opportunities Towards Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications…”
Publicado 2024
Libro electrónico -
22914por Cerioni, CristianoTabla de Contenidos: “…Parete interna sud, muro di fase 4 con due diverse tecniche di rifinitura della malta. -- 39. S. Elena all'Esino. Restituzione ipotetica delle principali fasi della chiesa. -- 40. …”
Publicado 2021
Libro electrónico -
22915por van der Haas, VictoriaTabla de Contenidos: “…Multi-molar dentine profile for individual UID_1988.014. -- Figure 39. Scatter plot of dentine and bone δ13C and δ15N values for individual UID_1988.014. -- Figure 40. …”
Publicado 2023
Libro electrónico -
22916Publicado 2022Libro electrónico
-
22917por Akepogu, Ananda RaoTabla de Contenidos: “…3.3 Types of Algorithms -- 3.3.1 Brute Force Algorithms -- 3.3.2 Divide and Conquer Algorithms -- 3.3.3 Dynamic Programming Algorithms -- 3.3.4 Greedy Algorithms -- 3.3.5 Branch and Bound Algorithms -- 3.3.6 Recursive Algorithms -- 3.3.7 Back Tracking Algorithms -- 3.3.8 Randomized Algorithms -- 3.3.9 Hill Climbing Algorithms -- 3.4 Performance Analysis -- 3.4.1 Properties of the Best Algorithms -- 3.5 Space Complexity -- 3.5.1 Instruction Space -- 3.5.2 Text Section of a Program -- 3.5.3 Data Space -- 3.5.4 Stack Space -- 3.5.5 Calculating the Instruction Space -- 3.5.6 Calculating the Data Space -- 3.5.7 Size of Data Section -- 3.5.8 Size of Rodata Section -- 3.5.9 Size of bss Section -- 3.6 Apriori Analysis -- 3.7 Asymptotic Notation -- 3.7.1 Big oh Notation (O) -- 3.7.2 Omega Notation (Ω) -- 3.7.3 Theta Notation (θ) -- 3.7.4 Little oh Notation(o) -- 3.8 Time Complexity -- 3.8.1 Time Complexity Analysis of Bubble Sort -- 3.8.2 Time Complexity Analysis of Selection Sort -- 3.9 Worst Case, Average Case and Best Case Complexity -- 3.9.1 Worst Case -- 3.9.2 Average Case -- 3.9.3 Best Case -- Summary -- Exercises -- Chapter 4 Arrays -- 4.1 Introduction -- 4.1.1 Array -- 4.2 Array Types -- 4.2.1 Single-dimensional Array -- 4.2.2 Multi-dimensional Array -- 4.2.3 N-dimensional Array -- 4.3 Array Representation -- 4.4 Initializing Arrays -- 4.5 Accessing Values of an Array -- 4.6 Array Operations -- 4.6.1 Traversing -- 4.6.2 Insertion -- 4.6.3 Deletion -- 4.6.4 Sorting -- 4.6.5 Searching -- 4.7 Arrays as Parameters -- 4.8 Character Sequences -- 4.9 Applications -- Summary -- Exercises -- Chapter 5 Linked List -- 5.1 Introduction -- 5.2 Representation of Linked List in Memory -- 5.2.1 Static Representation -- 5.2.2 Dynamic Representation -- 5.3 Singly Linked List -- 5.3.1 Operations -- 5.4 Circular Linked List -- 5.4.1 Merging of Two Circular Lists…”
Publicado 1900
Libro electrónico -
22918por Kamthane, Ashok N.Tabla de Contenidos: “…Exercises -- Chapter 3: Introduction to Operating System -- 3.1 Introduction -- 3.2 Operating System -- 3.2.1 Types of Operating System -- 3.2.2 Different Operating Systems -- 3.2.3 Functions of Operating System -- 3.3 GUI-based Operating System: Windows XP -- 3.4 Features of Windows XP -- 3.5 Starting Windows XP Professional -- 3.6 The Desktop -- 3.6.1 Taskbar -- 3.6.2 Customizing Taskbar -- 3.6.3 Desktop Icons -- 3.6.4 Customizing Desktop -- 3.7 My Computer -- 3.8 Working with Files and Folders -- 3.8.1 Creating Files and Folders -- 3.8.2 Recycle Bin -- 3.9 Windows Explorer -- 3.10 Windows Help and Support Center -- 3.11 Searching in Windows XP 80 -- 3.12 System Utilities in Windows XP -- 3.13 Control Panel -- Summary -- Exercises -- Chapter 4: Introduction to Word Processors -- 4.1 Introduction -- 4.2 Features of a Word Processor -- 4.3 Different Word Processors -- 4.4 Starting Microsoft Office Word 2003 -- 4.4.1 Microsoft Word Environment -- 4.4.2 Getting Help -- 4.5 Working with Word 2003 Documents -- 4.5.1 Creating a New Document -- 4.5.2 Opening an Existing Document -- 4.5.3 Saving a Document -- 4.5.4 Closing a Document and Exiting Microsoft Word -- 4.6 Working with Text -- 4.6.1 Inserting Text -- 4.6.2 Selecting Text -- 4.6.3 Formatting the Text -- 4.6.4 Aligning and Indenting Text -- 4.6.5 Formatting Style -- 4.6.6 Format Painter -- 4.6.7 Using Cut, Copy, and Paste in Word -- 4.6.8 Finding and Replacing Text -- 4.6.9 Undo and Redo -- 4.6.10 Bullets and Numbering -- 4.6.11 Header and Footer -- 4.7 Working with Tables -- 4.7.1 Table Properties -- 4.7.2 Moving and Resizing Table -- 4.7.3 Adding and Deleting Rows and Columns -- 4.8 Checking Spelling and Grammar -- 4.8.1 Using the Auto Spell and Auto Grammar Features -- 4.8.2 Using Spelling and Grammar Dialog Box -- 4.8.3 Using AutoCorrect Options -- 4.8.4 Using Synonyms and Thesaurus…”
Publicado 2011
Libro electrónico -
22919
-
22920por Estornés Lasa, Bernardo
Publicado 1984Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca de la Universidad de Navarra, Biblioteca Central de Capuchinos de España)Libro