Mostrando 2,281 - 2,300 Resultados de 2,871 Para Buscar '".ec"', tiempo de consulta: 0.07s Limitar resultados
  1. 2281
    por Flores Martínez, Pablo
    Publicado 2011
    Texto completo en Odilo
    Otros
  2. 2282
    por Rivero Gracia, M. Pilar
    Publicado 2010
    Texto completo en Odilo
    Otros
  3. 2283
    por Álvarez Angulo, Teodoro
    Publicado 2013
    Texto completo en Odilo
    Otros
  4. 2284
  5. 2285
  6. 2286
    por Lula Baena
    Publicado 2017
    Texto completo en Odilo
    Otros
  7. 2287
    por Manuela Carmena
    Publicado 2016
    Texto completo en Odilo
    Otros
  8. 2288
    por Viktor Emil Frankl
    Publicado 2013
    Texto completo en Odilo
    Otros
  9. 2289
  10. 2290
  11. 2291
    Publicado 2016
    Tabla de Contenidos: “…Intro -- Evolutionary Computation in Gene Regulatory Network Research -- Contents -- Preface -- Acknowledgments -- Contributors -- I Preliminaries -- 1 A Brief Introduction to Evolutionary and other Nature-Inspired Algorithms -- 1.1 Introduction -- 1.2 Classes of Evolutionary Computation -- 1.2.1 Genetic Algorithms -- 1.2.2 Genetic Programming -- 1.2.3 Evolution Strategy -- 1.2.4 Differential Evolution -- 1.2.5 Swarm Intelligence -- 1.2.6 Multi-Objective EA's -- 1.3 Advantages/Disadvantages of Evolutionary Computation -- 1.4 Application Areas Of EC -- 1.5 Conclusion -- References -- 2 Mathematical Models and Computational Methods for Inference of Genetic Networks -- 2.1 Introduction -- 2.2 Boolean Networks -- 2.3 Probabilistic Boolean Network -- 2.4 Bayesian Network -- 2.5 Graphical Gaussian Modeling -- 2.6 Differential Equations -- 2.7 Time-Varying Network -- 2.8 Conclusion -- References -- 3 Gene Regulatory Networks: Real Data Sources and Their Analysis -- 3.1 Introduction -- 3.2 Biological Data Sources -- 3.2.1 Gene Expression Data -- 3.2.2 Protein-Protein Interaction Data -- 3.2.3 Protein-DNA Interaction Data -- 3.2.4 Gene Ontology -- 3.3 Topological Analysis of Gene Regulatory Networks -- 3.3.1 Node Degree -- 3.3.2 Neighborhood Connectivity -- 3.3.3 Shortest Paths -- 3.3.4 Reconstruction of Transcriptional Regulatory Network -- 3.4 GRN Inference by Integration of Multi-Source Biological Data -- 3.4.1 Gene Module Selection -- 3.4.2 Network Motif Discovery -- 3.4.3 Gene Regulatory Module Inference -- 3.5 Conclusions and Future Directions -- Acknowledgment -- References -- II EAs for Gene Expression Data Analysis and GRN Reconstruction -- 4 Biclustering Analysis of Gene Expression Data Using Evolutionary Algorithms -- 4.1 Introduction -- 4.2 Bicluster Analysis of Data -- 4.3 Biclustering Techniques -- 4.3.1 Distance-Based Techniques…”
    Libro electrónico
  12. 2292
    Tabla de Contenidos: “…Nakanishi -Recent Results at the CERN-EC High Energy Reference Field Facility by C. Birattari, T.Rancati, A. …”
    Libro electrónico
  13. 2293
    Publicado 2018
    Tabla de Contenidos: “…. -- Storing configuration in the environment -- How to do it -- Creating an AWS IAM user and a key pair for ECS -- Getting ready -- How to do it -- Configuring Docker to authenticate with ECR -- Getting ready -- How to do it -- Pushing containers into ECR -- Getting ready -- How to do it -- Creating an ECS cluster -- How to do it…”
    Libro electrónico
  14. 2294
    Publicado 2022
    Tabla de Contenidos: “…-- AWS and the shared responsibility model -- Azure and the shared responsibility model -- GCP and the shared responsibility model -- Command-line tools -- AWS CLI -- Azure CLI -- Google Cloud SDK -- Summary -- Chapter 2: Securing Compute Services -- Technical requirements -- Securing VMs -- Securing Amazon Elastic Compute Cloud (EC2) -- Securing Azure Virtual Machines -- Securing Google Compute Engine (GCE) and VM instances -- Securing managed database services -- Securing Amazon RDS for MySQL -- Securing Azure Database for MySQL -- Securing Google Cloud SQL for MySQL -- Securing containers -- Securing Amazon Elastic Container Service (ECS) -- Securing Amazon Elastic Kubernetes Service (EKS) -- Securing Azure Container Instances (ACI) -- Securing Azure Kubernetes Service (AKS) -- Securing Google Kubernetes Engine (GKE) -- Securing serverless/function as a service -- Securing AWS Lambda -- Securing Azure Functions -- Securing Google Cloud Functions -- Summary -- Chapter 3: Securing Storage Services -- Technical requirements -- Securing object storage -- Securing Amazon Simple Storage Service -- Securing Azure Blob storage -- Securing Google Cloud Storage -- Securing block storage -- Best practices for securing Amazon Elastic Block Store -- Best practices for securing Azure managed disks -- Best practices for securing Google Persistent Disk -- Summary -- Securing file storage -- Securing Amazon Elastic File System -- Securing Azure Files…”
    Libro electrónico
  15. 2295
    por Édouard Martin
    Publicado 2013
    Texto completo en Odilo
    Otros
  16. 2296
    por Jordi Pujol
    Publicado 2010
    Texto completo en Odilo
    Otros
  17. 2297
    por Noam Chomsky
    Publicado 2014
    Texto completo en Odilo
    Otros
  18. 2298
    por Bernie Sanders
    Publicado 2016
    Texto completo en Odilo
    Otros
  19. 2299
    por Alexander von Schönburg
    Publicado 2017
    Texto completo en Odilo
    Otros
  20. 2300
    por Marc Reklau
    Publicado 2016
    Texto completo en Odilo
    Otros