Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,231
- Història 1,562
- Universidad Pontificia de Salamanca (España) 1,505
- Documentales 1,157
- Engineering & Applied Sciences 827
- History 658
- Development 588
- Computer Science 583
- Església Catòlica 573
- Mapes 494
- Fonts 482
- Application software 475
- Documents pontificis 415
- Management 404
- Computer programs 359
- HTML (Document markup language) 354
- Design 352
- Web sites 336
- Web site development 318
- Iglesia Católica 297
- Data processing 295
- Fonts històriques 283
- Color 277
- Crítica e interpretación 277
- Documentos 264
- Universidad Pontificia de Salamanca, Facultad de Educación 241
- Política y gobierno 227
- Business & Economics 226
- Computer networks 226
- Operating systems (Computers) 220
-
31381por Moïsé, Evdokia“…Ce document présente des études de cas par pays sur les réformes douanières qui ont eu lieu au Mozambique, en Angola, au Pakistan et au Pérou. …”
Publicado 2005
Capítulo de libro electrónico -
31382Publicado 2024“…Printing long documents with tables can often lead to issues where header rows don’t repeat on every page, or table rows break awkwardly across pages. …”
Vídeo online -
31383por Mancuso, Joseph C.“…A ground-breaking approach to writing with a greater focus on planning and revising documents…”
Publicado 1992
Libro electrónico -
31384
-
31385Publicado 2001Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro
-
31386Publicado 2005Libro
-
31387Publicado 2022Tabla de Contenidos: “…La importancia del juego durante la infancia -- Capítulo 62 Pinolivo, un retrato de infancia -- Capítulo 63 Proyecto READ-COM: estudio de la metodología docente para el aprendizaje lector y buenas prácticas en educación infantil (3-6) -- Capítulo 64 Recogida de información y elaboración de informes de evaluación en infantil -- Capítulo 65 Por uma alimentação saudável: projeto de "boas práticas" na escola viva infância bilíngue, Campo Grande, MS/Brasil -- Capítulo 66 Recursos para enseñar a leer el mundo de forma crítica en infantil: un análisis documental -- Capítulo 67 La danza como recurso educativo -- Capítulo 68 Propuesta metodológica para la evaluación y promoción de la actividad física y el desarrollo cognitivo en metodologías activas en educación infantil -- Capítulo 69 Jaque mate a la inactividad física. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
31388Publicado 2017Tabla de Contenidos: “…2.5.1 Development and Installation -- 2.5.2 Test Run and Acceptance Test -- 2.5.3 Training and Documentation -- 2.6 Examples -- 2.6.1 Diameter Inspection of Rivets -- 2.6.2 Tubing Inspection -- Chapter 3 Lighting in Machine Vision -- 3.1 Introduction -- 3.1.1 Prologue -- 3.1.2 The Involvement of Lighting in the Complex Machine Vision Solution -- 3.2 Demands on Machine Vision lighting -- 3.3 Light used in Machine Vision -- 3.3.1 What is Light? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
31389Publicado 2021Tabla de Contenidos: “…6.1.1 Accuracy for object detection: Label confidence and localization -- 6.1.2 Uncertainty sampling for label confidence and localization in object detection -- 6.1.3 Diversity sampling for label confidence and localization in object detection -- 6.1.4 Active transfer learning for object detection -- 6.1.5 Setting a low object detection threshold to avoid perpetuating bias -- 6.1.6 Creating training data samples for representative sampling that are similar to your predictions -- 6.1.7 Sampling for image-level diversity in object detection -- 6.1.8 Considering tighter masks when using polygons -- 6.2 Applying active learning to semantic segmentation -- 6.2.1 Accuracy for semantic segmentation -- 6.2.2 Uncertainty sampling for semantic segmentation -- 6.2.3 Diversity sampling for semantic segmentation -- 6.2.4 Active transfer learning for semantic segmentation -- 6.2.5 Sampling for image-level diversity in semantic segmentation -- 6.3 Applying active learning to sequence labeling -- 6.3.1 Accuracy for sequence labeling -- 6.3.2 Uncertainty sampling for sequence labeling -- 6.3.3 Diversity sampling for sequence labeling -- 6.3.4 Active transfer learning for sequence labeling -- 6.3.5 Stratified sampling by confidence and tokens -- 6.3.6 Create training data samples for representative sampling that are similar to your predictions -- 6.3.7 Full-sequence labeling -- 6.3.8 Sampling for document-level diversity in sequence labeling -- 6.4 Applying active learning to language generation -- 6.4.1 Calculating accuracy for language generation systems -- 6.4.2 Uncertainty sampling for language generation -- 6.4.3 Diversity sampling for language generation -- 6.4.4 Active transfer learning for language generation -- 6.5 Applying active learning to other machine learning tasks -- 6.5.1 Active learning for information retrieval -- 6.5.2 Active learning for video…”
Libro electrónico -
31390por OECDTabla de Contenidos: “…Modalités de mise en œuvre de l'aide et partenariats de la Suisse -- Partenariats -- La Suisse pourrait mieux tirer parti de ses partenariats -- Le soutien à la coordination entre les donneurs ne se concrétise pas en approches conjointes -- La Suisse établit ses programmes et ses budgets de manière prévisible et flexible -- Un accès insuffisant aux documents freine les efforts de transparence -- L'essentiel (94.3 %) de l'aide allouée par la Suisse aux PMA est non liée -- Action au niveau des pays -- Les progrès modestes en matière d'efficacité du développement contrastent avec l'engagement de la Suisse -- Des analyses contextuelles et un suivi approfondis renforcent les interventions de la Suisse dans les contextes fragiles -- Les conditionnalités politiques pèsent sur le débat public -- Notes -- Références -- Chapitre 6. …”
Publicado 2019
Libro electrónico -
31391por OECDTabla de Contenidos: “…La compétence matérielle des IGAI -- L'identification des documents -- Le coût d'accès -- 3.2.2. Les limites du droit d'accès à l'information -- Le principe -- Les exceptions à l'interdiction de communication de l'information et la protection des lanceurs d'alerte -- 3.2.3. …”
Publicado 2019
Libro electrónico -
31392Publicado 2019Tabla de Contenidos: “…7.3.2 How to Implement -- Step 1: Data Preparation -- Step 2: SOM Modeling Operator and Parameters -- Step 3: Execution and Interpretation -- Visual Model -- Location Coordinates -- Conclusion -- References -- 8 Model Evaluation -- 8.1 Confusion Matrix -- 8.2 ROC and AUC -- 8.3 Lift Curves -- 8.4 How to Implement -- Step 1: Data Preparation -- Step 2: Modeling Operator and Parameters -- Step 3: Evaluation -- Step 4: Execution and Interpretation -- 8.5 Conclusion -- References -- 9 Text Mining -- 9.1 How It Works -- 9.1.1 Term Frequency-Inverse Document Frequency -- 9.1.2 Terminology -- 9.2 How to Implement -- 9.2.1 Implementation 1: Keyword Clustering -- Step 1: Gather Unstructured Data -- Step 2: Data Preparation -- Step 3: Apply Clustering -- 9.2.2 Implementation 2: Predicting the Gender of Blog Authors -- Step 1: Gather Unstructured Data -- Step 2: Data Preparation -- Step 3.1: Identify Key Features -- Step 3.2: Build Models -- Step 4.1: Prepare Test Data for Model Application -- Step 4.2: Applying the Trained Models to Testing Data -- Bias in Machine Learning -- 9.3 Conclusion -- References -- 10 Deep Learning -- 10.1 The AI Winter -- AI Winter: 1970's -- Mid-Winter Thaw of the 1980s -- The Spring and Summer of Artificial Intelligence: 2006-Today -- 10.2 How it works -- 10.2.1 Regression Models As Neural Networks -- 10.2.2 Gradient Descent -- 10.2.3 Need for Backpropagation -- 10.2.4 Classifying More Than 2 Classes: Softmax -- 10.2.5 Convolutional Neural Networks -- 10.2.6 Dense Layer -- 10.2.7 Dropout Layer -- 10.2.8 Recurrent Neural Networks -- 10.2.9 Autoencoders -- 10.2.10 Related AI Models -- 10.3 How to Implement -- Handwritten Image Recognition -- Step 1: Dataset Preparation -- Step 2: Modeling using the Keras Model -- Step 3: Applying the Keras Model -- Step 4: Results -- 10.4 Conclusion -- References -- 11 Recommendation Engines…”
Libro electrónico -
31393Publicado 2018Tabla de Contenidos: “…Methods for HTML DOM document and element prototypes -- 8.5. The events in client side JavaScript -- 8.5.1. …”
Libro electrónico -
31394Publicado 2015Tabla de Contenidos: “…B: HELLOCARMS The Next Generation of Home Equity Lending System Requirements Document -- I Table of Contents -- II Versioning -- III Glossary -- 000 Introduction -- 001 Informal Use Case -- 003 Scope -- 004 System Business Benefits -- 010 Functional System Requirements -- 020 Reliability System Requirements -- 030 Usability System Requirements -- 040 Efficiency System Requirements -- 050 Maintainability System Requirements -- 060 Portability System Requirements -- A Acknowledgement -- C: Answers to Sample Questions -- Index…”
Libro electrónico -
31395Publicado 2023Tabla de Contenidos: “…11.8 Updating ICT from Time to Time and Means of Growth in the Field of Education -- 11.9 People Involved to be Trained for ICT -- 11.10 Adapting to Changes -- 11.11 Institutional Changes and ICT in Teaching -- 11.12 Global Changes and ICT in Teaching -- 11.13 Nationwide Changes and ICT in Teaching -- 11.14 Climatic Changes and ICT in Teaching -- 11.15 Types of Teaching Using ICT in Higher Educational Institutions -- 11.15.1 On Campus Teaching -- 11.15.2 Online Teaching -- 11.15.3 Blended or Hybrid Mode Teaching -- 11.15.3.1 Understanding Blended Learning -- 11.15.3.2 Measures to be Followed in Order to Ensure Effective Blended Learning -- 11.16 Analysis of ICT -- 11.17 People that Use ICT in the Field of Education -- 11.17.1 Teachers and their Use of ICT -- 11.17.2 Students and their Use of ICT -- 11.17.3 Department Heads and their Use of ICT -- 11.17.4 IT Support and their Use of ICT -- 11.18 Ease of Use of ICT -- 11.19 Problems Encountered During ICT-Based Class -- 11.19.1 Technical Problems -- 11.19.2 Non-Technical Problems -- 11.20 Recommendations -- 11.21 Conclusion -- References -- Chapter 12 Digital Tools for Interactive E-Content Development -- 12.1 Introduction -- 12.2 Digital Learning -- 12.3 Theories of Learning -- 12.4 HTML5 Package (H5P) -- 12.4.1 Course Presentation -- 12.4.2 Branching Scenario -- 12.4.3 Interactive Video -- 12.4.4 Slack -- 12.4.5 Camtasia -- 12.4.6 Accordion -- 12.4.7 Agamotto -- 12.4.8 Documentation Tool -- 12.4.9 Image Hotspots -- 12.4.10 Image Juxtaposition -- 12.4.11 Image Sequencing -- 12.4.12 Interactive Book -- 12.5 Conclusion -- References -- Chapter 13 Analysis of Changing Landscape of Virtual Learning in India -- 13.1 Introduction -- 13.2 Affecting Elements in Organizations -- 13.3 Dealing with Exceptional Youngsters -- 13.4 ICT Tools in VL for Flipped, Blended Learning and its Pitfalls…”
Libro electrónico -
31396Publicado 2019Tabla de Contenidos: “…6.8 Challenges Faced by Blockchain Technology -- 6.9 The Future of Blockchain Technology -- 6.10 Conclusion -- References -- 7 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations -- 7.1 Introduction -- 7.1.1 Primary Characteristics of a Distributed System -- 7.1.2 Major Challenges for Distributed Systems -- 7.2 Identifying Cyber Requirements -- 7.3 Popular security mechanisms in Distributed Systems -- 7.3.1 Secure Communication -- 7.3.1.1 Authentication -- 7.3.1.2 Shared Keys Authorship-Based Authentication -- 7.3.1.3 Key Distribution Center-Based Authentication -- 7.3.1.4 Public key encryption based authentication -- 7.3.2 Message Integrity and Confidentiality -- 7.3.2.1 Digital Signatures -- 7.3.2.2 Session Keys -- 7.3.3 Access Controls -- 7.3.3.1 Access Control Matrix -- 7.3.3.2 Protection Domains -- 7.3.3.3 Trusted Code -- 7.3.3.4 Denial of Service -- 7.4 Service Level Agreements -- 7.4.1 Types of SLAs -- 7.4.2 Critical Areas for SLAs -- 7.4.2.1 Examining the Network -- 7.4.2.2 Forensics -- 7.4.2.3 Managing Records/Documents -- 7.4.2.4 Backing Up Data -- 7.5 The Cuckoo's Egg in the Context of IT Security -- 7.6 Searching and Seizing Computer-Related Evidence -- 7.6.1 Computerized Search Warrants -- 7.6.1.1 Particularity -- 7.6.1.2 Reasonable Time Period for Examining Seized Electronic Equipment -- 7.6.1.3 Irrational Retention of Seized Data -- 7.6.2 Searching and Seizing -- 7.7 Conclusion -- References -- 8 Distributed Computing Security: Issues and Challenges -- 8.1 Introduction -- 8.2 Security Issues and Challenges -- 8.2.1 Confidentiality, Integrity and Availability -- 8.2.2 Authentication and Access Control Issue -- 8.2.3 Broken Authentication, Session and Access -- 8.3 Security Issues and Challenges in Advanced Areas -- 8.4 Conclusion -- References…”
Libro electrónico -
31397Publicado 2024Tabla de Contenidos: “…-- Integrating Beagle Security into our security pipeline -- Automating testing with Python -- Ensuring reliability and resilience in automated workflows -- Robust error-handling mechanisms -- Implementing retry logic -- Building idempotent operations -- Automated testing and validation -- Documentation and knowledge sharing -- Security and access control -- Implementing a logger for security pipelines -- Summary -- Chapter 7: Creating Custom Security Automation Tools with Python -- Designing and developing tailored security automation tools -- Integrating external data sources and APIs for enhanced functionality -- Extending tool capabilities with Python libraries and frameworks -- pandas -- scikit-learn -- Summary -- Part 4: Python Defense Strategies for Robust Security -- Chapter 8: Secure Coding Practices with Python -- Understanding secure coding fundamentals -- Principles of secure coding -- Common security vulnerabilities -- Input validation and sanitization with Python -- Input validation -- Input sanitization -- Preventing code injection and execution attacks -- Preventing SQL injection -- Preventing command injection -- Data encryption and Python security libraries -- Symmetric encryption -- Asymmetric encryption -- Hashing -- Secure deployment strategies for Python applications -- Environment configuration -- Dependency management…”
Libro electrónico -
31398por Liang, Y.Tabla de Contenidos: “…-- 1.3 Programming Languages -- 1.4 Operating Systems -- 1.5 The History of Python -- 1.6 Getting Started with Python -- 1.7 Programming Style and Documentation -- 1.8 Programming Errors -- 1.9 Getting Started with Graphics Programming -- Chapter 2. …”
Publicado 2022
Libro electrónico -
31399por Zalbide, MikelTabla de Contenidos: “…Characteristics of the documents which have to be dated -- 2.1.2. Measurement patterns chosen by SHB -- 2.2. …”
Publicado 2024
Libro electrónico -
31400por Arhippainen, HeikkiTabla de Contenidos: “…WebFacing environment -- 2.1 Selecting the right system -- 2.1.1 Hardware considerations -- 2.1.2 Using IBM Eserver Workload Estimator to plan a server configuration -- 2.1.3 Software considerations -- 2.1.4 WebFacing server -- 2.2 WebFacing performance considerations -- 2.2.1 OS/400 operating system -- 2.2.2 WebFacing server -- 2.2.3 WebFacing subsystem -- 2.2.4 Java Virtual Machine considerations -- 2.2.5 WebSphere Application Server -- 2.2.6 The WebFacing application -- 2.3 References to other resources of documentation -- Chapter 3. Guidance for using this redbook -- 3.1 IBM WebFacing Tool scenario in this redbook -- 3.2 Sample 5250 application -- 3.3 Converting the sample 5250 application -- 3.4 Comparing the WebFacing application with the 5250 application -- 3.5 Improving the WebFacing application -- 3.5.1 Refining the generated user interface -- 3.5.2 Integrating with other Web applications -- Part 2 Moving to a WebFacing application -- Chapter 4. 5250 sample application -- 4.1 Setting up the environment -- 4.1.1 Restoring the FLGHT400 library -- 4.1.2 Setting up the user profile -- 4.2 Application overview -- 4.2.1 The Flight Reservation System -- 4.2.2 Application files -- 4.2.3 The database files -- 4.3 Using the Flight Reservation System application -- 4.3.1 Starting the application -- 4.3.2 Creating a new reservation -- 4.3.3 Generating reports…”
Publicado 2004
Libro electrónico