Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Society & social sciences 164
- Cloud computing 121
- Educación pedagogía 93
- Amazon Web Services (Firm) 86
- Descripción y viajes 72
- Historia 71
- Development 60
- Web services 58
- Humanities 51
- Application software 47
- Historia / General 43
- Computer networks 36
- Ciencias Políticas / General 33
- Derecho comunitario 31
- Examinations 31
- Certification 29
- Usos y costumbres 29
- Electronic data processing personnel 28
- Història 28
- Computer security 27
- Economics, finance, business & management 27
- Comunidad Económica Europea 25
- Governance 25
- Security measures 24
- Competencia económica 23
- Computer software 22
- Business & Economics 20
- Management 20
- Engineering & Applied Sciences 18
- Amazon.com (Firm) 17
-
2281
-
2282
-
2283
-
2284
-
2285
-
2286
-
2287
-
2288
-
2289
-
2290
-
2291Publicado 2016Tabla de Contenidos: “…Intro -- Evolutionary Computation in Gene Regulatory Network Research -- Contents -- Preface -- Acknowledgments -- Contributors -- I Preliminaries -- 1 A Brief Introduction to Evolutionary and other Nature-Inspired Algorithms -- 1.1 Introduction -- 1.2 Classes of Evolutionary Computation -- 1.2.1 Genetic Algorithms -- 1.2.2 Genetic Programming -- 1.2.3 Evolution Strategy -- 1.2.4 Differential Evolution -- 1.2.5 Swarm Intelligence -- 1.2.6 Multi-Objective EA's -- 1.3 Advantages/Disadvantages of Evolutionary Computation -- 1.4 Application Areas Of EC -- 1.5 Conclusion -- References -- 2 Mathematical Models and Computational Methods for Inference of Genetic Networks -- 2.1 Introduction -- 2.2 Boolean Networks -- 2.3 Probabilistic Boolean Network -- 2.4 Bayesian Network -- 2.5 Graphical Gaussian Modeling -- 2.6 Differential Equations -- 2.7 Time-Varying Network -- 2.8 Conclusion -- References -- 3 Gene Regulatory Networks: Real Data Sources and Their Analysis -- 3.1 Introduction -- 3.2 Biological Data Sources -- 3.2.1 Gene Expression Data -- 3.2.2 Protein-Protein Interaction Data -- 3.2.3 Protein-DNA Interaction Data -- 3.2.4 Gene Ontology -- 3.3 Topological Analysis of Gene Regulatory Networks -- 3.3.1 Node Degree -- 3.3.2 Neighborhood Connectivity -- 3.3.3 Shortest Paths -- 3.3.4 Reconstruction of Transcriptional Regulatory Network -- 3.4 GRN Inference by Integration of Multi-Source Biological Data -- 3.4.1 Gene Module Selection -- 3.4.2 Network Motif Discovery -- 3.4.3 Gene Regulatory Module Inference -- 3.5 Conclusions and Future Directions -- Acknowledgment -- References -- II EAs for Gene Expression Data Analysis and GRN Reconstruction -- 4 Biclustering Analysis of Gene Expression Data Using Evolutionary Algorithms -- 4.1 Introduction -- 4.2 Bicluster Analysis of Data -- 4.3 Biclustering Techniques -- 4.3.1 Distance-Based Techniques…”
Libro electrónico -
2292por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Nakanishi -Recent Results at the CERN-EC High Energy Reference Field Facility by C. Birattari, T.Rancati, A. …”
Publicado 1998
Libro electrónico -
2293Publicado 2018Tabla de Contenidos: “…. -- Storing configuration in the environment -- How to do it -- Creating an AWS IAM user and a key pair for ECS -- Getting ready -- How to do it -- Configuring Docker to authenticate with ECR -- Getting ready -- How to do it -- Pushing containers into ECR -- Getting ready -- How to do it -- Creating an ECS cluster -- How to do it…”
Libro electrónico -
2294Publicado 2022Tabla de Contenidos: “…-- AWS and the shared responsibility model -- Azure and the shared responsibility model -- GCP and the shared responsibility model -- Command-line tools -- AWS CLI -- Azure CLI -- Google Cloud SDK -- Summary -- Chapter 2: Securing Compute Services -- Technical requirements -- Securing VMs -- Securing Amazon Elastic Compute Cloud (EC2) -- Securing Azure Virtual Machines -- Securing Google Compute Engine (GCE) and VM instances -- Securing managed database services -- Securing Amazon RDS for MySQL -- Securing Azure Database for MySQL -- Securing Google Cloud SQL for MySQL -- Securing containers -- Securing Amazon Elastic Container Service (ECS) -- Securing Amazon Elastic Kubernetes Service (EKS) -- Securing Azure Container Instances (ACI) -- Securing Azure Kubernetes Service (AKS) -- Securing Google Kubernetes Engine (GKE) -- Securing serverless/function as a service -- Securing AWS Lambda -- Securing Azure Functions -- Securing Google Cloud Functions -- Summary -- Chapter 3: Securing Storage Services -- Technical requirements -- Securing object storage -- Securing Amazon Simple Storage Service -- Securing Azure Blob storage -- Securing Google Cloud Storage -- Securing block storage -- Best practices for securing Amazon Elastic Block Store -- Best practices for securing Azure managed disks -- Best practices for securing Google Persistent Disk -- Summary -- Securing file storage -- Securing Amazon Elastic File System -- Securing Azure Files…”
Libro electrónico -
2295
-
2296
-
2297
-
2298
-
2299
-
2300