Mostrando 22,901 - 22,920 Resultados de 23,350 Para Buscar '"'39"', tiempo de consulta: 0.16s Limitar resultados
  1. 22901
    Publicado 2015
    Tabla de Contenidos: “…3.5.3 The barbershop problem: introducing fairness -- 3.5.4 Readers-writers -- 3.5.4.1 A solution favoring the readers -- 3.5.4.2 Giving priority to the writers -- 3.5.4.3 A fair solution -- 3.6 Monitors -- 3.6.1 Design approach 1: critical section inside the monitor -- 3.6.2 Design approach 2: monitor controls entry to critical section -- 3.7 Applying monitors in classical problems -- 3.7.1 Producers-consumers revisited -- 3.7.1.1 Producers-consumers: buffer manipulation within the monitor -- 3.7.1.2 Producers-consumers: buffer insertion/extraction exterior to the monitor -- 3.7.2 Readers-writers -- 3.7.2.1 A solution favoring the readers -- 3.7.2.2 Giving priority to the writers -- 3.7.2.3 A fair solution -- 3.8 Dynamic vs. static thread management -- 3.8.1 Qt's thread pool -- 3.8.2 Creating and managing a pool of threads -- 3.9 Debugging multithreaded applications -- 3.10 Higher-level constructs: multithreaded programming without threads -- 3.10.1 Concurrent map -- 3.10.2 Map-reduce -- 3.10.3 Concurrent filter -- 3.10.4 Filter-reduce -- 3.10.5 A case study: multithreaded sorting -- 3.10.6 A case study: multithreaded image matching -- Exercises -- Chapter 4: Shared-memory programming: OpenMP -- 4.1 Introduction -- 4.2 Your First OpenMP Program -- 4.3 Variable Scope -- 4.3.1 OpenMP Integration V.0: Manual Partitioning -- 4.3.2 OpenMP Integration V.1: Manual Partitioning Without a Race Condition -- 4.3.3 OpenMP Integration V.2: Implicit Partitioning with Locking -- 4.3.4 OpenMP Integration V.3: Implicit Partitioning with Reduction -- 4.3.5 Final Words on Variable Scope -- 4.4 Loop-Level Parallelism -- 4.4.1 Data Dependencies -- 4.4.1.1 Flow Dependencies -- 4.4.1.2 Antidependencies -- 4.4.1.3 Output Dependencies -- 4.4.2 Nested Loops -- 4.4.3 Scheduling -- 4.5 Task Parallelism -- 4.5.1 The sections Directive -- 4.5.1.1 Producers-Consumers in OpenMP…”
    Libro electrónico
  2. 22902
    Publicado 2016
    Tabla de Contenidos: “…3.6.2 C++11 Error Reporting -- 3.6.3 C++11 Data Types -- 3.6.4 Creating and Running C++11 Threads -- 3.6.5 Examples of C++11 Thread Management -- 3.7 SPool Utility -- 3.7.1 Under the SPool Hood -- 3.8 SPool Examples -- 3.8.1 Addition of Two Long Vectors -- 3.8.2 Monte Carlo Computation of π -- 3.8.3 Thread Safety Issue -- 3.9 First Look at OpenMP -- 3.9.1 Example: Computing the Area Under a Curve -- 3.10 Database Search Example -- 3.11 Conclusions -- 3.12 Annex: Coding C++11 Time Durations -- Chapter 4: Thread-Safe Programming -- 4.1 Introduction -- 4.1.1 First Example: The Monte Carlo π Code -- 4.2 Some Library Functions are not Thread Safe -- 4.3 Dealing with Random Number Generators -- 4.3.1 Using Stateless Generators -- 4.3.2 Using Local C++ Objects -- 4.4 Thread Local Storage Services -- 4.4.1 C++11 thread_local Keyword -- 4.4.2 OpenMP threadprivate Directive -- 4.4.3 Windows TLS Services -- 4.4.4 Thread Local Classes in TBB -- 4.4.5 Thread Local Storage in Pthreads -- 4.5 Second Example: A Gaussian Random Generator -- 4.6 Comments on Thread Local Storage -- 4.7 Conclusion -- Chapter 5: Concurrent Access to Shared Data -- 5.1 First Comments on Thread Synchronization -- 5.2 Need for Mutual Exclusion Among Threads -- 5.3 Different Kinds of Mutex Flavors -- 5.4 Pthreads Mutual Exclusion -- 5.4.1 Mutex-Spin-Lock Programming Interface -- 5.4.2 Simple Example: Scalar Product of Two Vectors -- 5.4.3 First, Very Inefficient Version -- 5.4.4 Another Inefficient Version Using Spin Locks -- 5.4.5 Correct Approach -- 5.5 Other Simple Examples -- 5.5.1 Reduction&lt -- T&gt -- Utility -- 5.5.2 SafeCout: Ordering Multithreaded Output to stdout -- 5.6 Windows Mutual Exclusion -- 5.7 OpenMP Mutual Exclusion -- 5.8 C++11 Mutual Exclusion -- 5.8.1 Scoped Lock Class Templates -- Why is another scoped locking class needed? …”
    Libro electrónico
  3. 22903
    por Gödl, Robert
    Publicado 2023
    Tabla de Contenidos: “…3.3.1 Debian-‌Backports - aktuellere Software aus dem nächsten Debian-Release installieren -- 3.3.2 ‌Pinning - ‌aktuellere Software aus anderen Debian-Versionen installieren -- 3.3.3 Auf ‌Debian Testing wechseln -- 3.4 Weitere Paket-Formate für zusätzliche Software -- 3.4.1 ‌Flatpak - zusätzliche und aktuellere Software -- 3.4.2 ‌Snap - zusätzliche und aktuellere Software von Ubuntu -- 3.5 ‌AppImages - ausführbare Dateien unter Linux -- 3.6 Software für die Programmierung -- 3.6.1 ‌Python-Software über das Python-Repository verwalten -- 3.6.2 ‌Rust-Software mittels ‌Cargo verwalten -- 3.7 ‌Software unter Debian ‌kompilieren -- 3.7.1 ‌C-Programme kompilieren -- 3.7.2 ‌C++-Programme kompilieren -- 3.8 ‌Distrobox - Software von anderen Linux-Distributionen im Container installieren -- 3.9 Software über ‌selbst extrahierende Skripte installieren -- Kapitel 4: Das System -- 4.1 Die ‌Verzeichnis-Hierarchie -- 4.1.1 Das Wurzelverzeichnis -- 4.1.2 Das ‌Home-Verzeichnis -- 4.2 ‌Rechte an Ihren Daten - ‌Gruppen -- 4.2.1 ‌Benutzer und Gruppen ‌erstellen -- 4.3 ‌sudo und ‌su - ‌der ‌Administrator unter Debian -- 4.4 ‌Das ‌Terminal - die ‌Kommandozeile -- 4.4.1 ‌Der Aufbau des Terminals und dessen Grundlagen -- 4.4.2 ‌Ordner-Inhalte anzeigen und in der Verzeichnis-Hierarchie navigieren -- 4.4.3 ‌Hilfe und Optionen -- 4.4.4 ‌Arbeiten mit Dateien und Ordnern am Terminal -- 4.4.5 ‌Kopieren und ‌Einfügen -- 4.5 Treiber und Firmware -- 4.5.1 ‌Druckertreiber und ‌Scannertreiber -- 4.5.2 ‌NVIDIA-‌Grafikkarten-Treiber installieren -- 4.6 ‌Systemd - die Steuerzentrale von Debian -- 4.6.1 Installierte ‌Systemdienste anzeigen lassen -- 4.6.2 Nähere Informationen zu einem Systemdienst anzeigen -- 4.6.3 Dienste manuell starten und stoppen -- 4.6.4 Mit Systemd Debian steuern (ausschalten, neu starten, ...) -- 4.6.5 ‌Log-Dateien anzeigen -- 4.6.6 ‌Start-Analyse mit Systemd…”
    Libro electrónico
  4. 22904
    Publicado 2023
    Tabla de Contenidos: “…3.5.1 Conditional Probability Function -- 3.5.2 Conditional Probability Density Function -- 3.6 Expectations -- 3.6.1 Moments -- 3.6.2 Expected Value of Function of Random Variable -- 3.6.3 Covariance -- 3.7 Conditional Expectations -- 3.8 Convergence of Random Variables -- 3.9 Random Processes -- 3.10 Markov Processes -- 3.11 Hidden Markov Models -- 3.12 Gaussian Processes -- Exercises -- Part II Optimization -- Chapter 4 Optimization Theory -- 4.1 Basic Concepts and Terminology -- 4.1.1 Optimization Problems -- 4.1.2 Equivalent Problems -- 4.2 Convex Sets -- 4.2.1 Convexity‐Preserving Operations -- 4.2.1.1 Intersection -- 4.2.1.2 Affine Transformation -- 4.2.1.3 Perspective Transformation -- 4.2.2 Examples of Convex Sets -- 4.2.2.1 Hyperplanes and Halfspaces -- 4.2.2.2 Polyhedral Sets -- 4.2.2.3 Norm Balls and Ellipsoids -- 4.2.2.4 Convex Cones -- 4.2.3 Generalized Inequalities -- 4.3 Convex Functions -- 4.3.1 First‐ and Second‐Order Conditions for Convexity -- 4.3.2 Convexity‐Preserving Operations -- 4.3.2.1 Scaling, Sums, and Integrals -- 4.3.2.2 Pointwise Maximum and Supremum -- 4.3.2.3 Affine Transformation -- 4.3.2.4 Perspective Transformation -- 4.3.2.5 Partial Infimum -- 4.3.2.6 Square of Nonnegative Convex Functions -- 4.3.3 Examples of Convex Functions -- 4.3.3.1 Norms -- 4.3.3.2 Indicator and Support Functions -- 4.3.4 Conjugation -- 4.3.5 Dual Norms -- 4.4 Subdifferentiability -- 4.4.1 Subdifferential Calculus -- 4.4.1.1 Nonnegative Scaling -- 4.4.1.2 Summation -- 4.4.1.3 Affine Transformation -- 4.4.1.4 Pointwise Maximum -- 4.4.1.5 Subgradients of Conjugate Functions -- 4.5 Convex Optimization Problems -- 4.5.1 Optimality Condition -- 4.5.2 Equality Constrained Convex Problems -- 4.6 Duality -- 4.6.1 Lagrangian Duality -- 4.6.2 Lagrange Dual Problem -- 4.6.3 Fenchel Duality -- 4.7 Optimality Conditions…”
    Libro electrónico
  5. 22905
    Publicado 2023
    Tabla de Contenidos: “…3.3.2 Dimensionality Reduction -- 3.4 Importance of Dimensionality Reduction in Machine Learning -- 3.4.1 Methods of Dimensionality Reduction -- 3.4.1.1 Principal Component Analysis (PCA) -- 3.4.1.2 Linear Discriminant Analysis (LDA) -- 3.4.1.3 Generalized Discriminant Analysis (GDA) -- 3.5 Distance Measures -- 3.6 Clustering -- 3.6.1 Algorithms in Clustering -- 3.6.2 Applications of Clustering -- 3.6.3 Iterative Distance-Based Clustering -- 3.7 Hierarchical Model -- 3.8 Density-Based Clustering -- 3.8.1 DBSCAN -- 3.8.2 OPTICS -- 3.9 Role of Machine Learning in Factories of the Future -- 3.10 Identification of the Probable Customers -- 3.11 Conclusion -- References -- Chapter 4 Understanding Neural Networks -- 4.1 Introduction -- 4.2 Components of Neural Networks -- 4.2.1 Neurons -- 4.2.2 Synapses and Weights -- 4.2.3 Bias -- 4.2.4 Architecture of Neural Networks -- 4.2.5 How Do Neural Networks Work? …”
    Libro electrónico
  6. 22906
    Publicado 2024
    Tabla de Contenidos: “…Conclusion -- 3.8. Acknowledgment -- 3.9. References -- Chapter 4. Edge Computing with Operations Research Using IoT Devices in Healthcare: Concepts, Tools, Techniques and Use Cases -- 4.1. …”
    Libro electrónico
  7. 22907
    Publicado 2005
    Tabla de Contenidos: “…3.4 Starting the SMF Bundle Server -- 3.5 Starting the SMF Runtime -- 3.6 Stopping the SMF Bundle Server -- 3.7 Stopping the SMF Runtime -- 3.8 Submitting bundles to the SMF bundle server -- 3.9 Installing bundles into the SMF Runtime -- 3.10 Removing bundles from the SMF bundle server -- 3.11 Uninstalling bundles from the SMF Runtime -- Chapter 4. …”
    Libro electrónico
  8. 22908
    por Gucer, Vasfi, Ceylan, Sanver
    Publicado 2005
    Tabla de Contenidos: “…Tivoli Configuration Manager fundamentals and installation -- 3.1 IBM Tivoli Configuration Manager fundamentals -- 3.1.1 Tivoli Configuration Manager components and services -- 3.2 Creating a deployment plan for Tivoli Configuration Manager -- 3.3 How to deploy Tivoli Configuration Manager components -- 3.3.1 Distributed Configuration Manager components -- 3.3.2 TMR server configuration -- 3.3.3 Components for managed nodes -- 3.3.4 Components for gateways -- 3.3.5 Components for endpoints -- 3.4 Required roles for installation -- 3.5 RDBMS considerations -- 3.6 RIM considerations -- 3.7 General pre-install checks, hints, and tips -- 3.7.1 UNIX -- 3.7.2 Windows Systems on Intel® 486 or Pentium® systems -- 3.8 Installation methods -- 3.9 Overview of Integrated Install -- 3.10 Server Install -- 3.10.1 Typical Server Install -- 3.10.2 Custom Server Install -- 3.10.3 Starting the installation programs -- 3.11 Desktop Install -- 3.11.1 Starting the installation program -- 3.12 Web Gateway Install -- 3.12.1 Web Gateway prerequisites -- 3.12.2 Starting the installation program -- 3.12.3 Multiple endpoints installation -- 3.13 Uninstallation of IBM Tivoli Configuration Manager -- Chapter 4. …”
    Libro electrónico
  9. 22909
    Publicado 2011
    Tabla de Contenidos: “…2.10 Factors Behind the Success of a Construction Organization -- References -- Review Questions -- Chapter 3: Construction Economics -- 3.1 Introduction -- 3.2 Economic Decision-Making -- 3.2.1 Out-of-Pocket Commitment -- 3.2.2 Payback Period -- 3.2.3 Average Annual Rate of Return -- 3.3 Time Value of Money -- 3.4 Cash-Flow Diagrams -- 3.4.1 Project Cash-Flow and Company Cash-Flow Diagrams -- 3.4.2 Using Cash-Flow Diagrams -- 3.5 Using Interest Tables -- 3.6 Evaluating Alternatives by Equivalence -- 3.6.1 Present Worth Comparison -- 3.6.2 Future Worth Comparison -- 3.6.3 Annual Cost and Worth Comparison -- 3.6.4 Rate of Return Method -- 3.7 Effect of Taxation on Comparison of Alternatives -- 3.8 Effect of Inflation on Cash-Flow -- 3.9 Evaluation of Public Projects: Discussion on Benefit-Cost Ratio -- 3.9.1 Benefit/Cost Criteria -- References -- Solved Examples -- Review Questions -- Chapter 4: Client's Estimation of Project Cost -- 4.1 Introduction -- 4.2 Approximate Methods of Estimation -- 4.2.1 Preliminary Estimate for Buildings -- 4.2.2 Preliminary Estimate for Industrial Structures -- 4.3 Types of Estimates -- 4.3.1 Rough Order of Magnitude Estimates -- 4.3.2 Client's Indicative Cost Estimate -- 4.3.3 Client's Preliminary Cost Estimate -- 4.3.4 Client's Detailed Estimate -- 4.3.5 Client's Definitive Estimate -- 4.3.6 Revised Estimate -- 4.3.7 Supplementary Estimates -- 4.3.8 Project Closure Cost -- 4.4 Methods of Structuring Project Costs -- 4.5 Illustrative Cases in Preparation of Estimate -- 4.5.1 Case1: Multi-Level Car Parking Facility -- 4.5.2 Case 2: Preliminary Estimate for Construction of Sewage Treatment Plant -- References -- Solved Examples -- Review Questions -- Chapter 5: Construction Contract -- 5.1 Construction Contract -- 5.2 Contract Document -- 5.2.1 The Contract Drawings -- 5.2.2 The Specifications…”
    Libro electrónico
  10. 22910
    Publicado 2009
    Tabla de Contenidos: “…3.4.1 Thomas Algorithm for Tridiagonal Systems -- 3.4.2 Crank-Nicholson Scheme: Truncation Error, Consistency, and Convergence -- 3.4.3 Dissipative and Dispersive Errors -- 3.4.4 Stability of the Crank-Nicholson Scheme -- 3.5 A Note on Implicit Methods -- 3.6 Leap-frog and DuFort-Frankel Schemes -- 3.6.1 Truncation Error of the DuFort-Frankel Scheme -- 3.6.2 Stability of DuFort-Frankel Scheme -- 3.7 Operator Notation -- 3.8 The Alternating Direction Implicit (ADI) Method -- 3.8.1 ADI Scheme -- 3.8.2 Splitting and Approximate Factorisation -- 3.8.3 Stability of the ADI Scheme -- 3.8.4 Program 3.1: adi.f -- 3.9 Summary -- 3.10 Key Terms -- 3.11 Exercise 3 -- Chapter 4: Equations of Hyperbolic Type -- 4.1 Introduction -- 4.2 Explicit Schemes -- 4.2.1 FTCS Scheme -- 4.2.2 FTFS Scheme -- 4.2.3 Upwind Scheme: First Order -- 4.2.4 Upwind Scheme: Modified Equation -- 4.2.5 The Lax Scheme -- 4.2.6 Consistency of Lax Scheme -- 4.2.7 Lax Scheme: Modified Equation -- 4.2.8 The Leap-Frog Scheme -- 4.3 Lax-Wendroff Scheme and Variants -- 4.3.1 Lax-Wendroff Scheme: Modified Equation -- 4.3.2 Two-Step Lax-Wendroff Scheme -- 4.3.3 The MacCormack Scheme -- 4.3.4 Upwind Scheme: Warming-Beam -- 4.4 Implicit Schemes -- 4.5 More on Upwind Schemes -- 4.6 Scalar Conservation Law: Lax-Wendroff and Related Schemes -- 4.6.1 Program 4.1: Ixmc.f -- 4.6.2 Implicit Schemes for Scalar Conservation Law -- 4.7 Hyperbolic System of Conservation Laws -- 4.7.1 System of Conservation Laws -- 4.8 Second-order Wave Equation -- 4.8.1 Stability of the Leap-Frog Scheme for the Wave Equation -- 4.8.2 An Implicit Scheme for the Second-Order Wave Equation -- 4.8.3 Stability of the Implicit Scheme -- 4.9 Method of Characteristics for Second-order Hyperbolic Equations -- 4.10 Model Convection-Diffusion Equation -- 4.10.1 Steady Convection-Diffusion Equation…”
    Libro electrónico
  11. 22911
    Publicado 2021
    Tabla de Contenidos: “…3.7.1 Installing Docker -- 3.7.2 Checking your Docker installation -- 3.8 Packaging our microservice -- 3.8.1 Creating a Dockerfile -- 3.8.2 Packaging and checking our Docker image -- 3.8.3 Booting our microservice in a container -- 3.9 Publishing our microservice -- 3.9.1 Creating a private container registry -- 3.9.2 Pushing our microservice to the registry -- 3.9.3 Booting our microservice from the registry -- 3.10 Docker review -- 3.11 Continue your learning -- Summary -- 4 Data management for microservices -- 4.1 New tools -- 4.2 Getting the code -- 4.3 Developing microservices with Docker Compose -- 4.3.1 Why Docker Compose? …”
    Libro electrónico
  12. 22912
    por Sountharrajan, S.
    Publicado 2023
    Tabla de Contenidos: “…3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology…”
    Libro electrónico
  13. 22913
    por Tyagi, Amit Kumar
    Publicado 2024
    Tabla de Contenidos: “…3.2 Significance of Volunteer Edge Cloud Concept -- 3.3 Proposed System -- 3.3.1 Smart Contract -- 3.3.2 Order Task Method -- 3.3.3 KubeEdge -- 3.4 Implementation of Volunteer Edge Control -- 3.4.1 Formation of a Cloud Environment -- 3.5 Result Analysis of Volunteer Edge Cloud -- 3.6 Introducing Blockchain-Enabled Internet of Things Systems Using the Serverless Cloud Platform -- 3.7 Introducing Serverless Cloud Platforms -- 3.7.1 IoT Systems -- 3.7.2 JointCloud -- 3.7.3 Computing Without Servers -- 3.7.4 Oracle and Blockchain Technology -- 3.8 Serverless Cloud Platform System Design -- 3.8.1 Aim and Constraints -- 3.8.2 Goals and Challenges -- 3.8.3 HCloud Connections -- 3.8.4 Data Sharing Platform -- 3.8.5 Cloud Manager -- 3.8.6 The Agent -- 3.8.7 Client Library -- 3.8.8 Witness Blockchain -- 3.9 Evaluation of HCloud -- 3.9.1 CPU Utilization -- 3.9.2 Cost Analysis -- 3.10 HCloud-Related Works -- 3.10.1 Serverless -- 3.10.2 Efficiency -- 3.11 Conclusion -- References -- Chapter 4 Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications for Next-Generation Society -- 4.1 Introduction -- 4.2 Background Work -- 4.3 Motivation -- 4.4 Existing Innovations in the Current Society -- 4.5 Expected Innovations in the Next-Generation Society -- 4.6 An Environment with Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.7 Open Issues in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.8 Research Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.9 Legal Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.10 Future Research Opportunities Towards Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications…”
    Libro electrónico
  14. 22914
    por Cerioni, Cristiano
    Publicado 2021
    Tabla de Contenidos: “…Parete interna sud, muro di fase 4 con due diverse tecniche di rifinitura della malta. -- 39. S. Elena all'Esino. Restituzione ipotetica delle principali fasi della chiesa. -- 40. …”
    Libro electrónico
  15. 22915
    por van der Haas, Victoria
    Publicado 2023
    Tabla de Contenidos: “…Multi-molar dentine profile for individual UID_1988.014. -- Figure 39. Scatter plot of dentine and bone δ13C and δ15N values for individual UID_1988.014. -- Figure 40. …”
    Libro electrónico
  16. 22916
    Publicado 2022
    Libro electrónico
  17. 22917
    por Akepogu, Ananda Rao
    Publicado 1900
    Tabla de Contenidos: “…3.3 Types of Algorithms -- 3.3.1 Brute Force Algorithms -- 3.3.2 Divide and Conquer Algorithms -- 3.3.3 Dynamic Programming Algorithms -- 3.3.4 Greedy Algorithms -- 3.3.5 Branch and Bound Algorithms -- 3.3.6 Recursive Algorithms -- 3.3.7 Back Tracking Algorithms -- 3.3.8 Randomized Algorithms -- 3.3.9 Hill Climbing Algorithms -- 3.4 Performance Analysis -- 3.4.1 Properties of the Best Algorithms -- 3.5 Space Complexity -- 3.5.1 Instruction Space -- 3.5.2 Text Section of a Program -- 3.5.3 Data Space -- 3.5.4 Stack Space -- 3.5.5 Calculating the Instruction Space -- 3.5.6 Calculating the Data Space -- 3.5.7 Size of Data Section -- 3.5.8 Size of Rodata Section -- 3.5.9 Size of bss Section -- 3.6 Apriori Analysis -- 3.7 Asymptotic Notation -- 3.7.1 Big oh Notation (O) -- 3.7.2 Omega Notation (Ω) -- 3.7.3 Theta Notation (θ) -- 3.7.4 Little oh Notation(o) -- 3.8 Time Complexity -- 3.8.1 Time Complexity Analysis of Bubble Sort -- 3.8.2 Time Complexity Analysis of Selection Sort -- 3.9 Worst Case, Average Case and Best Case Complexity -- 3.9.1 Worst Case -- 3.9.2 Average Case -- 3.9.3 Best Case -- Summary -- Exercises -- Chapter 4 Arrays -- 4.1 Introduction -- 4.1.1 Array -- 4.2 Array Types -- 4.2.1 Single-dimensional Array -- 4.2.2 Multi-dimensional Array -- 4.2.3 N-dimensional Array -- 4.3 Array Representation -- 4.4 Initializing Arrays -- 4.5 Accessing Values of an Array -- 4.6 Array Operations -- 4.6.1 Traversing -- 4.6.2 Insertion -- 4.6.3 Deletion -- 4.6.4 Sorting -- 4.6.5 Searching -- 4.7 Arrays as Parameters -- 4.8 Character Sequences -- 4.9 Applications -- Summary -- Exercises -- Chapter 5 Linked List -- 5.1 Introduction -- 5.2 Representation of Linked List in Memory -- 5.2.1 Static Representation -- 5.2.2 Dynamic Representation -- 5.3 Singly Linked List -- 5.3.1 Operations -- 5.4 Circular Linked List -- 5.4.1 Merging of Two Circular Lists…”
    Libro electrónico
  18. 22918
    por Kamthane, Ashok N.
    Publicado 2011
    Tabla de Contenidos: “…Exercises -- Chapter 3: Introduction to Operating System -- 3.1 Introduction -- 3.2 Operating System -- 3.2.1 Types of Operating System -- 3.2.2 Different Operating Systems -- 3.2.3 Functions of Operating System -- 3.3 GUI-based Operating System: Windows XP -- 3.4 Features of Windows XP -- 3.5 Starting Windows XP Professional -- 3.6 The Desktop -- 3.6.1 Taskbar -- 3.6.2 Customizing Taskbar -- 3.6.3 Desktop Icons -- 3.6.4 Customizing Desktop -- 3.7 My Computer -- 3.8 Working with Files and Folders -- 3.8.1 Creating Files and Folders -- 3.8.2 Recycle Bin -- 3.9 Windows Explorer -- 3.10 Windows Help and Support Center -- 3.11 Searching in Windows XP 80 -- 3.12 System Utilities in Windows XP -- 3.13 Control Panel -- Summary -- Exercises -- Chapter 4: Introduction to Word Processors -- 4.1 Introduction -- 4.2 Features of a Word Processor -- 4.3 Different Word Processors -- 4.4 Starting Microsoft Office Word 2003 -- 4.4.1 Microsoft Word Environment -- 4.4.2 Getting Help -- 4.5 Working with Word 2003 Documents -- 4.5.1 Creating a New Document -- 4.5.2 Opening an Existing Document -- 4.5.3 Saving a Document -- 4.5.4 Closing a Document and Exiting Microsoft Word -- 4.6 Working with Text -- 4.6.1 Inserting Text -- 4.6.2 Selecting Text -- 4.6.3 Formatting the Text -- 4.6.4 Aligning and Indenting Text -- 4.6.5 Formatting Style -- 4.6.6 Format Painter -- 4.6.7 Using Cut, Copy, and Paste in Word -- 4.6.8 Finding and Replacing Text -- 4.6.9 Undo and Redo -- 4.6.10 Bullets and Numbering -- 4.6.11 Header and Footer -- 4.7 Working with Tables -- 4.7.1 Table Properties -- 4.7.2 Moving and Resizing Table -- 4.7.3 Adding and Deleting Rows and Columns -- 4.8 Checking Spelling and Grammar -- 4.8.1 Using the Auto Spell and Auto Grammar Features -- 4.8.2 Using Spelling and Grammar Dialog Box -- 4.8.3 Using AutoCorrect Options -- 4.8.4 Using Synonyms and Thesaurus…”
    Libro electrónico
  19. 22919
  20. 22920