Mostrando 3,221 - 3,240 Resultados de 3,384 Para Buscar '"Po"', tiempo de consulta: 0.09s Limitar resultados
  1. 3221
    Publicado 2017
    Tabla de Contenidos: “…Fitzek, On Goodput and Energy Measurements of Network Coding Schemes in the Raspberry Pi, Reprinted from: Electronics 2016, 5(4), 66; doi: 10.3390/electronics5040066 -- Wajdi Hajji and Fung Po Tso, Understanding the Performance of Low Power Raspberry Pi Cloud for Big Data, Reprinted from: Electronics 2016, 5(2), 29; doi: 10.3390/electronics5020029 -- Jochen Schlobohm, Andreas Pösch and Eduard Reithmeier, A Raspberry Pi Based Portable Endoscopic 3D Measurement System, Reprinted from: Electronics 2016, 5(3), 43; doi: 10.3390/electronics5030043 -- Vittorio Pasquali, Riccardo Gualtieri, Giuseppe D'Alessandro, Maria Granberg, David Hazlerigg, Marco Cagnetti and Fabio Leccese, Monitoring and Analyzing of Circadian and Ultradian Locomotor Activity, Based on Raspberry-Pi, Reprinted from: Electronics 2016, 5(3), 58; doi: 10.3390/electronics5030058 -- Fabio Leccese, Marco Cagnetti, Stefano Di Pasquale, Sabino Giarnetti and Maurizio Caciotta, A New Power Quality Instrument Based on Raspberry-Pi, Reprinted from: Electronics 2016, 5(4), 64; doi: 10.3390/electronics5040064 -- Ulf Jennehag, Stefan Forsstrom and Federico V. …”
    Libro electrónico
  2. 3222
    Publicado 2016
    Tabla de Contenidos: “…-- Logical Limits -- The speed of light -- Granularity and extra vSwitch or network transitions -- Standardization above the network layer -- The capabilities of old stuff-The "brownfield" of dreams -- Common sense -- NFV Without SFC -- Conclusion -- End Notes -- 3 ETSI NFV ISG -- Introduction -- Getting Chartered -- European Telecommunications Institute -- NFV at ETSI -- Organization -- Impact on 3GPP -- Digesting ETSI Output -- Output -- Terminology -- Architecture-General -- Architecture-Big Blocks and Reference Points -- Use Cases -- Virtualization Requirements -- Gap Analysis -- PoC Observations -- A Look Back-White Paper 3 -- Future Directions -- Open Platform for NFV…”
    Libro electrónico
  3. 3223
    por Liu, Chang
    Publicado 2021
    Tabla de Contenidos: “…Missbrauchsabwehr in der StPO durch Ablehnungsgründe -- a) Gründe für die Ablehnung eines Beweisantrags -- b) Missbrauchsbekämpfung durch die gesetzlichen Ablehnungsgründe -- 2. …”
    Libro electrónico
  4. 3224
  5. 3225
    por Beckmann, Gustav Adolf, author
    Publicado 2019
    Libro electrónico
  6. 3226
  7. 3227
    Publicado 2018
    Libro electrónico
  8. 3228
    por Morgan, George A. 1936-
    Publicado 2006
    “…Understanding and Evaluating Research in Applied and Clinical Settings features:*short, independent, chapters that do not have to be read in order;*a guide to understanding why a particular statistic was selected;*an emphasis on effects sizes including measures of risk po…”
    Libro electrónico
  9. 3229
    Publicado 2017
    Libro
  10. 3230
  11. 3231
  12. 3232
  13. 3233
  14. 3234
    Publicado 2019
    Tabla de Contenidos: “…Access to Google Scholar since PoP (Publish or Perish) -- 5.2.3. The Web of Science (WoS) -- 5.2.4. …”
    Libro electrónico
  15. 3235
    Publicado 2023
    Tabla de Contenidos: “…Getting started with Responsible AI in your organization -- Regulatory compliance in Azure Policy for Azure Machine Learning -- Azure Security Benchmark -- Federal Risk and Authorization Management Program -- New Zealand Information Security Manual (restricted) -- NIST SP 800-53 Rev. 5 -- Reserve Bank of India IT Framework for Banks v2016 -- Compliance auditing and reporting -- Azure portal -- Azure Resource Graph Explorer -- Compliance automation in Azure -- Azure Blueprints -- IaC -- Summary -- Part 2: Securing Your Data -- Chapter 4: Data Protection and Governance -- Working with data governance in Azure -- Identifying challenges -- Exploring benefits -- Getting started using cloud data best practices -- Exploring Azure tools and resources -- Storing and retrieving data in Azure Machine Learning -- Connecting datastores -- Adding data assets -- Encrypting and securing data -- Encryption at rest -- Encryption in transit -- Exploring backup and recovery -- Reviewing backup options for your datastores -- Recovering your workspace -- Summary -- Chapter 5: Data Privacy and Responsible AI Best Practices -- Technical requirements -- Working with Python -- Running a notebook in Azure Machine Learning -- Installing the SmartNoise SDK -- Installing Fairlearn -- Discovering and protecting sensitive data -- Identifying sensitive data -- Exploring data anonymization -- Introducing differential privacy -- Mitigating fairness -- Fairlearn -- Working with model interpretability -- Exploring the Responsible AI dashboard -- Exploring FL and secure multi-party computation -- FL with Azure Machine Learning -- Summary -- Further reading -- Part 3: Securing and Monitoring Your AI Environment -- Chapter 6: Managing and Securing Access -- Working with the PoLP -- Authenticating with Microsoft Entra ID -- Implementing RBAC -- Working with built-in roles…”
    Libro electrónico
  16. 3236
    Publicado 2009
    Tabla de Contenidos: “…9.9 Predefined Schema Simple Types -- 9.10 EMF Extensions -- Part III: Using the EMF Generator -- Chapter 10 EMF Generator Patterns -- 10.1 Modeled Classes -- 10.2 Attributes -- 10.3 References -- 10.4 Feature Maps -- 10.5 Operations -- 10.6 Class Inheritance -- 10.7 Reflective Methods -- 10.8 Factories and Packages -- 10.9 Switch Classes and Adapter Factories -- 10.10 Alternative Generator Patterns -- 10.11 Customizing Generated Code -- Chapter 11 EMF.Edit Generator Patterns -- 11.1 Item Providers -- 11.2 Item Provider Adapter Factories -- 11.3 Editor -- 11.4 Action Bar Contributor -- 11.5 Wizard -- 11.6 Plug-Ins -- Chapter 12 Running the Generators -- 12.1 EMF Code Generation -- 12.2 The Generator UI -- 12.3 Generator Model Properties -- 12.4 The Command-Line Generator Tools -- 12.5 The Generator Ant Tasks -- 12.6 The Template Format -- Chapter 13 Example-Implementing a Model and Editor -- 13.1 Getting Started -- 13.2 Generating the Model -- 13.3 Implementing Volatile Features -- 13.4 Implementing Data Types -- 13.5 Running the ExtendedPO2 Editor -- 13.6 Restricting Reference Targets -- 13.7 Splitting the Model into Multiple Packages -- 13.8 Editing Multiple Resources Concurrently -- Part IV: Programming with EMF -- Chapter 14 Exploiting Metadata -- 14.1 Packages -- 14.2 Reflection -- 14.3 Dynamic EMF -- 14.4 Extended Metadata -- Chapter 15 Persistence -- 15.1 Overview of the Persistence Framework -- 15.2 The EMF Persistence API -- 15.3 XML Resources -- 15.4 EMF Resource and Resource Factory Implementations -- 15.5 Performance Considerations -- 15.6 Custom Storage for Active Objects -- Chapter 16 Client Programming Toolbox -- 16.1 Tree Iterators and Switches -- 16.2 Adapters -- 16.3 Cross-Referencers -- 16.4 Copying Objects -- 16.5 Comparing Objects -- Chapter 17 The Change Model -- 17.1 Describing a Change -- 17.2 Change Recording…”
    Libro electrónico
  17. 3237
    Publicado 2022
    Libro electrónico
  18. 3238
    Publicado 2023
    Libro electrónico
  19. 3239
  20. 3240
    991005024249706719