Mostrando 723,321 - 723,340 Resultados de 725,270 Para Buscar '"L."', tiempo de consulta: 1.69s Limitar resultados
  1. 723321
    Publicado 2004
    Tabla de Contenidos: “…CSM advanced features implementation -- 4.1 Building a Linux repository for pSeries -- 4.1.1 Setting up the network installation server -- 4.1.2 Red Hat repository -- 4.1.3 SUSE LINUX SLES8 repository -- 4.1.4 SUSE LINUX SLES9 repository -- 4.1.5 Creating the autoinstallation files -- 4.1.6 Install the CSM client on Linux -- 4.2 Install Linux using the AIX NIM server -- 4.2.1 Switch the netboot method from BOOTP to DHCP -- 4.2.2 Prepare AIX 5L V5.x NIM machine definitions -- 4.2.3 Activating NIM clients to create entries in /etc/bootptab -- 4.2.4 Converting BOOTP information to DHCP syntax -- 4.2.5 Deallocate NIM clients to remove entries from /etc/bootptab -- 4.2.6 Deactivate BOOTP service from inetd -- 4.2.7 Configure and activate DHCP -- 4.2.8 Booting Linux on pSeries -- 4.3 CSM performance, scalability, and challenges -- 4.3.1 Firewall -- 4.3.2 WAN network -- Chapter 5. …”
    Libro electrónico
  2. 723322
    Tabla de Contenidos: “…Co2 Emissions Per Unit of Gross Electricity Production in Oecd Countries, 2008 -- Internalising the External Costs of Ghg Emissions -- Climate Change Mitigation Policies in France: The Grenelle De L'Environnement -- Table 4.2. Implicit Carbon Price Based on Excise Tax Content, 2009Q3 -- Figure 4.4. …”
    Libro electrónico
  3. 723323
    Publicado 2016
    Tabla de Contenidos: “…-- Autohbw: Move Selected Allocations to MCDRAM -- Memkind/FASTMEM: Explicit Usage of MCDRAM -- Explicit memory usage in C/C++: memkind -- C++ notes -- Explicit memory usage in Fortran: FASTMEM -- Fortran FASTMEM failure modes -- ALLOCATE prefers MCDRAM -- ALLOCATE requires MCDRAM -- Query Memory Mode and MCDRAM Available -- SNC Performance Implications of Allocation and Threading -- Allocation With SNC -- How to Not Hard Code the NUMA Node Numbers -- Approaches to Determining What to Put in MCDRAM -- Approach 1: Observing or Emulating MCDRAM Effects -- Stage 1: Code modification -- Stage 2: Manual Execution -- Stage 3: Autotuning Configuration (Optional) -- Approach 2: Using Intel VTune to Determine MCDRAM Candidate Data Structures -- Stage 1: Profiling Data Collection -- Stage 2: Profiling Data Analysis -- Stage 3: Code Modification -- Results Analysis of the Two Approaches -- Summary of Two Approaches to ``What Goes in MCDRAM ́ ́ -- Why Rebooting Is Required to Change Modes -- BIOS -- Save/Restore/Change All BIOS Setting -- Summary -- For More Information -- Chapter 4: Knights Landing architecture -- Tile architecture -- Core and VPU -- Front-end unit -- Allocation unit -- Integer execution unit -- Memory execution unit -- Vector processing unit -- Threading -- L2 Architecture -- Cluster modes -- All-to-All Cluster Mode -- Quadrant Cluster Mode -- SNC-4 Mode -- Hemisphere Cluster and SNC-2 Modes -- Cluster Mode Summary -- Memory interleaving -- Memory modes -- Cache Mode -- Flat Mode -- Hybrid Mode -- Capacity, Bandwidth, Latency -- Interactions of cluster and memory modes -- Summary -- For More Information -- Chapter 5: Intel Omni-Path Fabric -- Overview -- Host Fabric Interface -- Intel OPA Switches -- Intel OPA Management -- Performance and Scalability -- Extreme Message Rates -- Low Latency…”
    Libro electrónico
  4. 723324
    Publicado 2018
    Tabla de Contenidos: “…12.2.3 CAPABILITY MODEL FOR ADAPTATION MECHANISM -- 12.3 EXPRESSION OF CONFORMANCE-BASED DYNAMICAL ADAPTATION -- 12.3.1 νRULE: SYNTAX AND SEMANTICS -- 12.3.2 CONFORMANCE RELATIONSHIPS BY νRULES -- 12.3.3 FUNCTION IDENTIFICATION ACCORDING TO νRULES-BASED ADAPTATION LOGIC -- 12.4 SUMMARY -- 13 - Other Nonfunctionality Patterns -- 13.1 INTRODUCTION -- 13.1.1 PROBLEM-ORIENTED NONFUNCTIONAL REQUIREMENT PATTERNS -- 13.1.2 STRUCTURE OF A PROBLEM-ORIENTED NONFUNCTIONAL REQUIREMENT PATTERN -- 13.1.3 PROCESS OF USING A PROBLEM-ORIENTED NONFUNCTIONAL REQUIREMENT PATTERN -- 13.2 PROBLEM-ORIENTED NONFUNCTIONAL REQUIREMENT PATTERNS AND THEIR CONCERNS -- 13.2.1 AUTHORIZATION PATTERN -- 13.2.2 BUFFER PATTERN -- 13.2.3 INDEX PATTERN -- 13.2.4 LOG PATTERN -- 13.2.5 PERCEPTION AND REACTION PATTERN -- 13.2.6 ENCRYPTION AND DECRYPTION PATTERN -- 13.3 A CASE STUDY -- 13.4 DISCUSSION -- Part Four References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Back Cover…”
    Libro electrónico
  5. 723325
    por Meyers, Michael, 1961-
    Publicado 2012
    Tabla de Contenidos: “…Bad Communications -- Common TCP/IP Applications -- The World Wide Web -- Telnet -- E-mail -- FTP -- Internet Applications -- Chapter Review -- Questions -- Answers -- Chapter 10 Network Naming -- Historical/Conceptual -- DNS -- Test Specific -- How DNS Works -- Name Spaces -- DNS Servers -- Troubleshooting DNS -- WINS -- Configuring WINS Clients -- Troubleshooting WINS -- Diagnosing TCP/IP Networks -- Chapter Review -- Questions -- Answers -- Chapter 11 Securing TCP/IP -- Test Specific -- Making TCP/IP Secure -- Encryption -- Nonrepudiation -- Authentication -- Authorization -- TCP/IP Security Standards -- Authentication Standards -- Encryption Standards -- Combining Authentication and Encryption -- Secure TCP/IP Applications -- HTTPS -- SCP -- SFTP -- SNMP -- LDAP -- NTP -- Chapter Review -- Questions -- Answers -- Chapter 12 Advanced Networking Devices -- Client/Server and Peer-to-Peer Topologies -- Historical/Conceptual -- Client/Server -- Peer-to-Peer -- Test Specific -- Client/Server and Peer-to-Peer Today -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs…”
    Libro electrónico
  6. 723326
    Publicado 2022
    Tabla de Contenidos: “…Bhattacharya 9.1 Lossless Audio Coding 303 9.2 Lossy Audio Coding 305 9.3 Psychoacoustics 307 9.3.1 Critical Bands and Absolute Threshold 308 9.3.2 Masking 309 9.4 ISO-MPEG1 Audio Coding 314 9.4.1 Filter Banks 315 9.4.2 Psychoacoustic Models 318 9.4.3 Dynamic Bit Allocation and Coding 321 9.5 MPEG-2 Audio Coding 322 9.6 MPEG-2 Advanced Audio Coding 322 9.7 MPEG-4 Audio Coding 334 9.8 Spectral Band Replication 336 9.9 Constrained Energy Lapped Transform -- Gain and Shape Coding 339 9.9.1 Gain Quantization 341 9.9.2 Shape Quantization 344 9.9.3 Range Coding 345 9.9.4 CELT Decoding 345 9.10 JS Applet -- Psychoacoustics 346 9.11 Exercises 347 References 348 10 Nonlinear Processing 355; M. Holters, L.…”
    Libro electrónico
  7. 723327
    Publicado 2016
    Tabla de Contenidos: “…Chapter 13 Wireless Communication and Control -- Introduction to Wireless Communications -- Bluetooth Communications -- Installing a Bluetooth Adapter -- Android App Development with Bluetooth -- Wi-Fi Communications -- Installing a Wi-Fi Adapter -- The NodeMCU Wi-Fi Slave Processor -- ZigBee Communications -- Introduction to XBee Devices -- XBee Configuration -- An XBee AT Mode Example -- An XBee API Mode Example -- Near Field Communication -- Summary -- Chapter 14 Raspberry Pi with a Rich User Interface -- Rich UI RPi Architectures -- The RPi as a General-Purpose Computer -- RPi with an LCD Touchscreen -- Virtual Network Computing (VNC) -- Fat-Client Applications -- Rich UI Application Development -- Introduction to GTK+ on the RPi -- Introduction to Qt on the RPi -- Qt Primer -- Qt Concepts -- Qt Development Tools -- A First Qt Creator Example -- A Qt Weather GUI Application -- Remote UI Application Development -- Fat-Client Qt GUI Application -- Multithreaded Server Applications -- The Multithreaded Weather Server -- Summary -- Further Reading -- Chapter 15 Images, Video, and Audio -- Capturing Images and Video -- The RPi Camera -- USB Webcams -- Video4Linux2 (V4L2) -- Streaming Video -- Image Processing and Computer Vision -- Image Processing with OpenCV -- Computer Vision with OpenCV -- Boost -- Raspberry Pi Audio -- Core Audio Software Tools -- Audio Devices for the RPi -- Text-to-Speech -- Summary -- Further Reading -- Chapter 16 Kernel Programming -- Introduction -- Why Write Kernel Modules? …”
    Libro electrónico
  8. 723328
    por Belew, Shannon
    Publicado 2024
    Tabla de Contenidos: “…Safety for young users -- Other online policies -- Complying With the Law -- Let's talk about GDPR -- The importance of ADA -- Lesser known policies that could incur fines -- Book 2 Legal and Accounting -- Chapter 1 Minding the Law -- Keeping Your Business Legal -- Federal tax identification number -- Resale certificate -- Business bank account -- Employee forms -- Zoning for Business (at Home) -- Obtaining Business Licenses -- Chapter 2 Choosing the Right Foundation: From Partnerships to Corporations -- Strategizing for the Best Organization -- Operating Alone as a Sole Proprietor -- Fictitious name registration -- Marriage and the sole proprietorship -- Sharing the Load with a Partnership -- Limited Liability Company -- Making It Official with Incorporation -- Different flavors of corporations -- The choice to incorporate -- Changing Your Organization as It Grows -- Chapter 3 The Trademark-and- Copyright Two-Step -- Understanding Why Trademarks and Copyrights Matter -- Making Your (Trade)Mark -- Protecting Your Investment with Copyrights -- Establishing Registration Yourself -- Getting your trademark -- Filing for copyright -- Retaining Professional Assistance -- Chapter 4 Accounting for Taxes (and Then Some) -- The Tax Man Cometh - Again and Again -- Income tax -- Employment tax -- Sales tax -- By the Numbers: Accounting Basics -- Determining periods and methods -- And now, your balance sheet -- A quick glimpse: The P&amp -- L -- Choosing Software to Make Your Tasks Easy -- Going online? …”
    Libro electrónico
  9. 723329
    Publicado 2017
    Tabla de Contenidos: “…The audio tools -- The ALSA utils -- Madplay -- Mplayer -- Sox -- The USB audio device class -- Managing sound devices -- Adding an audio codec -- A simple oscilloscope -- Summary -- Chapter 16: Video devices - V4L -- What is a video device? -- The electrical lines -- Video on the BeagleBone Black -- Video on the SAMA5D3 Xplained -- Video on the Wandboard -- Video in Linux -- The video tools -- The USB video class device -- Managing video devices -- Streaming video over the Web -- Capturing motion -- Summary -- Chapter 17: Analog-to-Digital Converters - ADC -- What is an analog-to-digital converter device? …”
    Libro electrónico
  10. 723330
    Publicado 2017
    Tabla de Contenidos: “…10.6.1 Chemical Nonequilibrium Turbulent Flow in a Scramjet Nozzle -- 10.6.1.1 Some Results -- 10.6.2 Shock Wave-Boundary Layer Interactions -- 10.7 CONCLUSIONS -- REFERENCES -- 11 - Measuring Techniques -- 11.1 INTRODUCTION -- 11.2 TEMPERATURE MEASUREMENT -- 11.3 FLOW MEASUREMENT -- 11.3.1 Typical Flow Meters -- 11.3.2 Two-Phase Flow Measurements -- 11.3.3 Microscale Fluid Flow Measurement -- 11.4 LIQUID MASS GAUGING IN MICROGRAVITY -- 11.4.1 Review -- 11.4.2 Compression of Mass Gauging -- 11.4.2.1 Description of Ground Experiments -- 11.4.2.1.1 Experimental Apparatus -- 11.4.2.1.2 Experimental Procedures -- 11.4.2.2 Test Results and Discussion -- 11.4.2.2.1 Normal Tests -- 11.4.2.2.2 Attitude Disturbance Tests -- 11.4.2.2.3 Heat Transfer Tests -- 11.4.3 Summary and Concluding Remarks -- REFERENCES -- 1: Governing Equations for Momentum, Mass, and Energy Transport -- A1.1 CONTINUITY EQUATION (MASS CONSERVATION EQUATION) -- A1.2 THE NAVIER-STOKES EQUATIONS -- A1.2.1 The Stress Tensor σij -- A1.2.2 The Navier-Stokes Equations for Two-Dimensional and Incompressible Flows -- A1.2.3 Derivation of the Complete Temperature Field Equation -- A1.2.3.1 Determination of ΔE ̇ -- A1.2.3.2 Determination of the Heat Transfer Rate Q ̇ -- A1.2.3.3 Determination of the Work Rate W ̇ -- A1.2.3.3.1 The Energy Equation in its Primary Form -- A1.2.3.3.2 Rewriting the Energy Equation -- A1.3 THE BOUNDARY LAYER FORM OF THE TEMPERATURE FIELD EQUATION -- A1.4 BOUNDARY LAYER EQUATIONS FOR THE LAMINAR CASE -- A1.5 DIMENSIONLESS GROUPS AND RULES OF SIMILARITY -- REFERENCES -- 2: Dimensionless Numbers of Relevance in Aerospace Heat Transfer -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Back Cover…”
    Libro electrónico
  11. 723331
    Publicado 2002
    Tabla de Contenidos: “…Introduction -- 1.1 What is VERITAS Foundation Suite for AIX -- 1.1.1 Additional VERITAS products on AIX 5L Version 5.1 -- 1.1.2 Other supported platforms of VERITAS Foundation Suite -- 1.1.3 VERITAS NetBackup on AIX -- 1.2 IBM-VERITAS relationship -- 1.2.1 History of VERITAS -- 1.2.2 Joint agreements, offerings, and activities -- 1.2.3 VERITAS programs focused on interoperability -- 1.3 VERITAS Foundation Suite on the AIX Bonus Pack -- 1.4 Why use VERITAS Foundation Suite on AIX -- 1.5 Support for LVM and JFS for AIX -- Chapter 2. …”
    Libro electrónico
  12. 723332
    por Funatomi, Takuya
    Publicado 2024
    Tabla de Contenidos: “…Integral field spectroscopy with lenslet arrays (IFS-L) -- 4.4.5. Filter array camera (FAC) -- 4.4.6. …”
    Libro electrónico
  13. 723333
    Publicado 2003
    Tabla de Contenidos: “…-- 12.4 Business rules and system rules -- 12.5 Business rules -- 12.6 Business system rules -- 12.7 Rules and business processes -- 12.8 The physical location of rules -- 12.9 Rules and formal logic -- 12.10 Logic and the Rule archetype pattern -- 12.11 RuleElement -- 12.12 Operator -- 12.13 Proposition -- 12.14 Variable and DateVariable -- 12.15 RuleContext -- 12.16 Rule -- 12.17 Rule evaluation -- 12.18 ActivityRule -- 12.19 RuleSet -- 12.20 RuleOverride -- 12.21 Summary -- Summary -- Archetype glossary -- Bibliography -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M.…”
    Libro electrónico
  14. 723334
    Publicado 2002
    Tabla de Contenidos: “…Additional material -- Locating the Web material -- Using the Web material -- How to use the Web material -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources…”
    Libro electrónico
  15. 723335
    Publicado 2013
    Tabla de Contenidos: “…7 Limits of the Welfarist Approach and Alternatives -- 7.1 Issues with the Welfarist Approach -- 7.2 Alternatives -- A.1 Formal Derivation of the Optimal Nonlinear Tax Rate -- A.2 Optimal Bottom Tax Rate in the Mirrlees Model -- Appendix -- Acknowledgments -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Z.…”
    Libro electrónico
  16. 723336
    Publicado 2022
    Tabla de Contenidos: “…Chapter 10: Semantic Role Labeling with BERT-Based Transformers -- Getting started with SRL -- Defining semantic role labeling -- Visualizing SRL -- Running a pretrained BERT-based model -- The architecture of the BERT-based model -- Setting up the BERT SRL environment -- SRL experiments with the BERT-based model -- Basic samples -- Sample 1 -- Sample 2 -- Sample 3 -- Difficult samples -- Sample 4 -- Sample 5 -- Sample 6 -- Questioning the scope of SRL -- The limit of predicate analysis -- Redefining SRL -- Summary -- Questions -- References -- Chapter 11: Let Your Data Do the Talking: Story, Questions, and Answers -- Methodology -- Transformers and methods -- Method 0: Trial and error -- Method 1: NER first -- Using NER to find questions -- Location entity questions -- Person entity questions -- Method 2: SRL first -- Question-answering with ELECTRA -- Project management constraints -- Using SRL to find questions -- Next steps -- Exploring Haystack with a RoBERTa model -- Exploring Q&amp -- A with a GTP-3 engine -- Summary -- Questions -- References -- Chapter 12: Detecting Customer Emotions to Make Predictions -- Getting started: Sentiment analysis transformers -- The Stanford Sentiment Treebank (SST) -- Sentiment analysis with RoBERTa-large -- Predicting customer behavior with sentiment analysis -- Sentiment analysis with DistilBERT -- Sentiment analysis with Hugging Face's models' list -- DistilBERT for SST -- MiniLM-L12-H384-uncased -- RoBERTa-large-mnli -- BERT-base multilingual model -- Sentiment analysis with GPT-3 -- Some Pragmatic I4.0 thinking before we leave -- Investigating with SRL -- Investigating with Hugging Face -- Investigating with the GPT-3 playground -- GPT-3 code -- Summary -- Questions -- References -- Chapter 13: Analyzing Fake News with Transformers -- Emotional reactions to fake news…”
    Libro electrónico
  17. 723337
    por Baumgartner, Manfred
    Publicado 2021
    Tabla de Contenidos: “…2.2.1 Verantwortlichkeiten -- 2.2.2 Exkurs: Evaluierung von Automatisierungswerkzeugen -- Unterstützte Technologien -- Möglichkeiten der Testfallbeschreibung und Modularisierung -- Zielgruppe -- Integration in die Werkzeuglandschaft -- Proof of Concept -- Schulungen, Support und Dokumentation -- Lizenzmodell -- 2.2.3 Exkurs: Evaluieren leicht gemacht -- Vorbereitung der Szenarien -- Vorbereitung des Testrechners -- Installation des Werkzeugs und Erstellung des Arbeitsbereichs -- Erstellen des ersten Szenarios -- Refactoring und Parametrierung des ersten Szenarios -- Umsetzung weiterer Szenarien -- Integration in den Entwicklungsprozess -- Abschluss -- 2.2.4 Typische Herausforderungen -- Inkompatibilität bei Werkzeugschnittstellen -- Verändertes SUT wird nicht mehr vom Testwerkzeug unterstützt -- GUI-Elemente können vom Testwerkzeug nicht vollständig genutzt werden -- Bedienung des Testwerkzeugs ist kompliziert -- Beeinträchtigung des SUT durch das Testwerkzeug -- Änderungen des SUT durch das Werkzeug -- Fehlende Ressourcen -- Updates -- Auswirkung auf die IT-Sicherheit -- Fehlende Portabilität -- 2.3 Auslegung auf Testbarkeit und Automatisierung -- 3 Die generische Testautomatisierungsarchitektur -- 3.1 Einführung in die generische Testautomatisierungsarchitektur (gTAA) -- 3.1.1 Warum eine gute Testautomatisierungsarchitektur so wichtig ist -- 3.1.2 Entwicklung von Testautomatisierungslösungen -- S - Das Single-Responsibility-Prinzip oder auch die fest definierte Aufgabe -- O - Das Open/Closed-Prinzip oder auch Erweiterbarkeit -- L - Das Liskov-Substitution-Prinzip oder auch die Ersetzbarkeit -- I - Das Interface-Segregation-Prinzip oder die Komponentensegregation -- D - Das Dependency-Inversion-Prinzip oder die Abhängigkeitsumkehr -- 3.1.3 Die Schichten der gTAA -- Die einzelnen Schichten im Detail -- Steckbrief: Testgenerierungsschicht…”
    Libro electrónico
  18. 723338
    Publicado 2012
    Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
    Libro electrónico
  19. 723339
    Publicado 2023
    Tabla de Contenidos: “…McGinty, Kevin M. Murphy and Amber L. Hauvermale -- Seed Dormancy and Preharvest Sprouting in Quinoa (Chenopodium quinoa Willd) -- Reprinted from: Plants 2021, 10, 458, doi:10.3390/plants10030458 503 -- Juan A. …”
    Libro electrónico
  20. 723340
    Publicado 2023
    Tabla de Contenidos: “…-- 7.2.2 Consequences of privacy regulatory requirements -- 7.3 Protecting privacy by modifying the input -- 7.3.1 Applications and limitations -- 7.4 Protecting privacy when publishing data -- 7.4.1 Implementing data sanitization operations in Python -- 7.4.2 k-anonymity -- 7.4.3 Implementing k-anonymity in Python -- Summary -- 8 Privacy-preserving data management and operations -- 8.1 A quick recap of privacy protection in data processing and mining -- 8.2 Privacy protection beyond k-anonymity -- 8.2.1 l-diversity -- 8.2.2 t-closeness…”
    Libro electrónico