Mostrando 1,061 - 1,080 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.13s Limitar resultados
  1. 1061
    Publicado 2023
    Tabla de Contenidos: “…Labels -- Issue workflows -- Editing files safely with commits, branches, and merge requests -- Commit history -- Merging one Git branch into another -- The three amigos - issues, branches, and merge requests -- When two amigos are enough -- How are issues and merge requests different? …”
    Libro electrónico
  2. 1062
    Publicado 2016
    Tabla de Contenidos: “…Information necessary for safe and enjoyable driving -- 7.4.2.1. Category 1: guidance for routing -- 7.4.2.2. …”
    Libro electrónico
  3. 1063
    Publicado 2010
    Tabla de Contenidos: “…-- Working with Browser Items -- Mouseless Browser Navigation -- Chapter 8: Working with Clips in the Viewer -- Anatomy of the Viewer -- Transport controls -- Clip-marking controls -- Pop-up selectors -- View selectors -- Playhead Sync pop-up menu -- Timecode navigation and display -- Working with Clips in the Viewer -- Playing clips -- JKL Keys: The Way to Move -- FCP 7 Update: Multi-Touch Gestures Support -- Other ways to move: jogging, scrubbing, and shuttling -- Navigating with Timecode -- FCP Protocol: Entering Timecode Numbers -- Working with In and Out Points -- Other Ways to Set In and Out Points -- About Subclips -- Marking Shortcuts -- FCP Protocol: Subclips Are Master Clips, Too -- Using Markers -- On the Fly: Working With Markers During Playback -- Adjusting the Viewer Display -- Changing magnification and window size in the Viewer or Canvas -- Wireframes in the Viewer -- Viewing overlays -- Viewing Title Safe and Action Safe boundaries -- Viewing Timecode overlays -- Viewing with different backgrounds -- Chapter 9: Basic Editing -- Basic Editing Overview -- Basic Editing Step-by-Step -- Many Ways to Make an Edit -- FCP Protocol: Three-Point Editing -- Specifying target tracks -- Moving the playhead -- FCP Protocol: Editing Multiple Tracks in Final Cut Pro…”
    Libro electrónico
  4. 1064
    Publicado 2022
    Tabla de Contenidos: “…-- Can I Just Copy and Paste the Code? -- How Safe Is PHP? -- What's New in PHP 8? -- What Software Do I Need to Write PHP? …”
    Libro electrónico
  5. 1065
    por Gurfinkel, Arie
    Publicado 2024
    Tabla de Contenidos: “…4.1 Generating Attractor Caches from Sub-Games -- 4.2 Constructing Sub-games from Abstract Strategy Templates -- 5 Game Solving with Abstract Template-Based Caching -- 6 Experimental Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Learning -- Bisimulation Learning -- 1 Introduction -- 2 Illustrative Example -- 3 Stutter-Insensitive Bisimulations of Deterministic Transition Systems -- 3.1 Model Checking -- 4 Counterexample-Guided Bisimulation Learning -- 4.1 Learner-Verifier Framework for Bisimulation Learning -- 4.2 Binary Decision Tree Partition Templates -- 5 Experimental Evaluation -- 5.1 Discrete-Time Clock Synchronization -- 5.2 Conditional Termination -- 6 Conclusion -- References -- Regular Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Regular Languages -- 3.2 Rational Transductions -- 3.3 Markov Decision Processes -- 4 Regular Markov Decision Processes -- 4.1 Undecidability of Values -- 4.2 Discounted Optimization -- 4.3 Finiteness Conditions -- 4.4 Q-Learning in RMDPs -- 5 Deep Regular Reinforcement Learning -- 5.1 Token Passing -- 5.2 Duplicating Pebbles -- 5.3 Shunting Yard Algorithm -- 5.4 Modified Tangrams -- 6 Conclusion -- References -- LTL Learning on GPUs -- 1 Introduction -- 2 Formal Preliminaries -- 3 High-Level Structure of the Algorithm -- 4 In-Memory Representation of Search Space -- 5 Correctness and Complexity of the Branch-Free Implementation of Temporal Operators -- 6 Relaxed Uniqueness Checks -- 7 Divide &amp -- Conquer -- 8 Evaluation of Algorithm Performance -- 9 Conclusion -- References -- Safe Exploration in Reinforcement Learning by Reachability Analysis over Learned Models -- 1 Introduction -- 2 Problem Setup -- 3 Verified Exploration Through Learned Models -- 3.1 Symbolic Environment Models -- 3.2 Shielding for Verified Safe Exploration…”
    Libro electrónico
  6. 1066
    por O'Sullivan, Bryan
    Publicado 2009
    Tabla de Contenidos: “…-- A Naive Finding Function -- Predicates: From Poverty to Riches, While Remaining Pure -- Sizing a File Safely -- The Acquire-Use-Release Cycle -- A Domain-Specific Language for Predicates…”
    Libro electrónico
  7. 1067
    Publicado 2012
    Tabla de Contenidos: “…Operational Procedures -- Workplace Safety and Safe Equipment Handling -- Cable Management -- Using Appropriate Tools -- Fire Safety -- Lifting and Moving Equipment -- Exercise 1-1: Research Lifting Guidelines -- Hot Components -- Electrical Safety -- Electrostatic Discharge (ESD) -- Exercise 1-2: ESD-Proofing Your Workspace -- Electromagnetic Interference (EMI) -- Working Safely with Power Supplies -- Display Devices -- Printers -- Compressed Air -- Environmental Concerns for IT Professionals -- Working in a Harsh Environment -- Disposing of Computing Waste -- Exercise 1-3: Researching Recycling Centers -- Professionalism and Proper Communication -- Professionalism -- Dealing with Prohibited Content and Prohibited Activities -- Defining Prohibited Content and Behavior -- Policies Concerning Prohibited Content and Behavior -- Responding to the Discovery of Prohibited Content and/or Behavior -- Two-Minute Drill -- Self Test -- Self Test Answers -- 2. …”
    Libro electrónico
  8. 1068
    Publicado 2018
    Tabla de Contenidos: “…Parallel sort algorithm -- 65. Thread-safe logging to the console -- 66. Customer service system -- Solutions -- 61. …”
    Libro electrónico
  9. 1069
    Publicado 2023
    Tabla de Contenidos: “…-- "What is the purpose of the safe area in Auto Layout, and how do you ensure that your views are properly positioned within the safe area?" …”
    Libro electrónico
  10. 1070
    Publicado 2018
    Tabla de Contenidos: “…ANDROID SOFTWARE STACK [18] -- FIGURA 2. ARQUITECTURA DE SAFE CANDY -- FIGURA 3. MARCO DE TRABAJO PARA EL ANÁLISIS ESTÁTICO -- FIGURA 4. …”
    Enlace del recurso
    Libro electrónico
  11. 1071
    Publicado 2018
    Tabla de Contenidos: “…The case study of Tor Vergata (Rome, Italy) -- chapter New ornaments’ influence on the character of modern cities -- part, History and arts -- chapter Arabian urban text art: Between cultural identity and artistic identity -- chapter The remaining houses of the two pearl merchants Ahmed Munawar Rifai and Hussein Bin Yahiya Rifai in the Farasan Islands in the 14th century AH/20th century AD: A study of aesthetic and artistic values -- part, City as an organism -- part, Architecture -- chapter Architecture of the 21st century museum as a catalytic phenomenon in the evolving cultural identity of a city -- chapter Conserving historical areas through the roles of main cities: Urban identity in the era of globalisation -- chapter Entrance gateway of Kerala temples: Assessing the form of a Kerala temple gopuram through material and construction -- chapter Expression of cultural identity in the contemporary urban built form of Kathmandu -- chapter Reimagining city identity through safe and sustainable public environments -- chapter Smart grids, smart cities, interior spaces and human behaviour: An interactive development process -- part, History and arts -- chapter Identity in transformation of rural Egyptian villages -- chapter Metaphysics and identity in architecture: Peter Eisenman’s Wexner Center for the Arts as case study -- chapter Immersing the landscape in its music: The case of iso-polyphony in South Albania -- chapter The changing image of Istanbul through its monuments (1923–1973) -- chapter The cumulative effect of an interdisciplinary project -- chapter Unearthing the spatial archetypes of two indigenous South Asian cities: The walled city of Old Delhi and Old Dhaka -- part, Planning and approaching the city…”
    Libro electrónico
  12. 1072
    por Loshin, Peter
    Publicado 2013
    Tabla de Contenidos: “…1.6.7 Business People and IT Professionals1.6.8 Others; 1.6.9 The Benefit of Having Diverse Users; 1.7 How Do I Use Tor; 1.7.1 Plan Ahead and Learn Tor Now; 1.7.2 TBB or Tails; 1.7.3 Tor Browser Bundle; 1.7.4 Tails; 1.7.5 What Can Go Wrong; 1.8 Using Tor Safely; 1.8.1 Use the Tor Browser; 1.8.2 Don't Open Documents; 1.8.3 Don't Install or Enable Browser Plugins; 1.8.4 Avoid Websites that Are Not HTTPS-Enabled; 1.8.5 Use Bridges/Find Company; 2 Using the Tor Browser Bundle; 2.1 What Is Bundled in the Tor Browser Bundle; 2.1.1 Vidalia; 2.1.2 Tor; 2.1.3 Mozilla Firefox ESR+Torbutton…”
    Libro electrónico
  13. 1073
    Publicado 2016
    Tabla de Contenidos: “…-- Part 1 The Board -- Chapter 1 Meet the Raspberry Pi -- A Trip Around the Board -- Model A/B -- Model A+/B+ -- Raspberry Pi 2 -- Raspberry Pi 3 -- Raspberry Pi Zero -- A Bit of Background -- ARM Versus x86 -- Windows Versus Linux -- Chapter 2 Getting Started with the Raspberry Pi -- Connecting a Display -- Composite Video -- HDMI Video -- DSI Video -- Connecting Audio -- Connecting a Keyboard and Mouse -- Installing NOOBS on an SD Card -- Connecting External Storage -- Connecting the Network -- Wired Networking -- Wireless Networking -- Connecting Power -- Installing the Operating System -- Installing Using NOOBS -- Installing Manually -- Connecting Bluetooth Devices -- Chapter 3 Linux System Administration -- Linux: An Overview -- Linux Basics -- Introducing Raspbian -- About Raspbian's Parent, Debian -- Alternatives to Raspbian -- Using External Storage Devices -- Creating a New User Account -- File System Layout -- Logical Layout -- Physical Layout -- Installing and Uninstalling Software -- Managing Software Graphically -- Managing Software at the Command Line -- Finding the Software You Want -- Installing Software -- Uninstalling Software -- Upgrading Software -- Shutting the Pi Down Safely -- Chapter 4 Troubleshooting -- Keyboard and Mouse Diagnostics -- Power Diagnostics -- Display Diagnostics -- Boot Diagnostics -- Network Diagnostics -- Chapter 5 Network Configuration -- Wired Networking -- Connecting to a Wired Network via the GUI -- Connecting to a Wired Network via the Console -- Testing Your Connectivity -- Wireless Networking -- Connecting to a Wireless Network via the GUI…”
    Libro electrónico
  14. 1074
    Publicado 2023
    Tabla de Contenidos: “…Large classes -- Switches -- Primitive Obsession -- Middle man -- Message chains -- Feature envy methods -- Divergent change -- Shotgun Surgery -- God object -- Summary -- Further reading -- Chapter 4: Testing -- Why you should test (often) -- Identifying and fixing defects -- Ensuring quality and reliability -- Customer satisfaction -- Compliance and standards -- Security -- Integration and compatibility -- Confidence and peace of mind -- Unit testing -- JUnit framework -- Integration testing -- Mockito -- Contract testing -- Be safe - checking and improving your test coverage -- What is test coverage? …”
    Libro electrónico
  15. 1075
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Table of Contents -- Title Page -- Copyright -- Dedication -- Introduction -- Eight Feedback Styles -- Pushing Past Style to Completion -- Collaboration Is Key -- Note -- 1 Why Feedback Hurts -- How the Human Brain Processes Feedback -- Better Feedback Can Be Learned -- Completion with Kindness -- Notes -- 2 The Good, the Bad, and the Ugly of Review -- Defining the Creator‐Reviewer Relationship -- Good Feedback Is about Feeling Safe -- What Is Kind Review? -- Feedback Is Always Personal -- 3 Receiving Feedback: Tough Skin, Tough Love, or Tough -- Face Your Anxieties -- Learn the Levels of Feedback -- Manage Feedback Before You Burn Out -- 4 Giving Feedback -- Polish the Idea to Make It Shine -- Improve through Process -- Editing Is Not Creating -- Take a Hot Minute and Reflect -- 5 Taste Is an Unconscious Bias -- Feedback Is a Personal Opinion of Quality -- Risk Avoidance Can Be an Unconscious Bias -- Use Taste to Be Inclusive -- 6 Feedback Styles -- The Eight Review Styles -- When Styles Meet -- It's Part of Who You Are -- 7 Kind Collaborator -- Attributes of the Kind Collaborator -- How to Manage a Kind Collaborator -- How to Become a Kind Collaborator -- 8 Perfect Pass‐Through -- Attributes of a Perfect Pass‐Through -- Why a Perfect Pass‐Through Is Dangerous -- How to Manage a Perfect Pass‐Through -- What to Do If You Are a Perfect Pass‐Through -- 9 Vague Vocalist -- Attributes of the Vague Vocalist -- Why the Vague Vocalist Is Dangerous -- How to Manage a Vague Vocalist -- What to Do If You Are a Vague Vocalist -- 10 Land Mine -- Attributes of a Land Mine -- Why a Land Mine Is Dangerous -- How to Manage a Land Mine -- What to Do If You Are a Land Mine -- 11 Silent but Deadly -- Attributes of a Silent but Deadly -- Why a Silent but Deadly Is Dangerous -- How to Manage a Silent but Deadly -- What to Do If You Are a Silent but Deadly…”
    Libro electrónico
  16. 1076
    Publicado 2016
    Tabla de Contenidos: “…Chapter 2 With Power Comes Responsibility: Hewlett-Packard, Target, the Cops, and the NSA Deduce Your Secrets (ethics) 37 How do we safely harness a predictive machine that can foresee job resignation, pregnancy, and crime? …”
    Libro electrónico
  17. 1077
    por Loy, Marc
    Publicado 2005
    Tabla de Contenidos: “…Working with Photoshop 7.0 and below; 2.3.3. Safe zones…”
    Libro electrónico
  18. 1078
    por Greenwald, Rick
    Publicado 2004
    Tabla de Contenidos: “…Data Guard; 1.9.4.3. Fail Safe; 1.9.4.4. Oracle Real Application Clusters; 1.9.4.5. …”
    Libro electrónico
  19. 1079
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- How to Use This Book -- Chapter 1: Working with Data -- Conversion Between Data Types -- Safe Number Conversion -- Conversion from Number to String and Back -- Boolean Conversions -- String to Data and Back -- Dates, Timestamps, and ISO 8601 Format -- Extracting Data from Dictionaries and Arrays -- Complex Data Types -- Extracting Data from Dictionary -- Extracting Data from Array -- Summary -- Chapter 2: Working with JSON and Other Popular Formats -- How Devices Exchange Data -- What Are Serialization and Deserialization -- Working with JSON -- Parsing JSON to Dictionary or Array -- Generating JSON from Dictionary or Array -- Working with XML -- Parsing XML -- Generating XML -- Working with YAML -- URL-Encoded Strings -- Serialization and Deserialization -- Serializing an Object -- Deserializing an Object -- Coding Keys -- Using @propertyWrapper -- Unit Conversion -- Distance and Length Units -- Area Units -- Volume Units -- Weight Units -- Summary -- Chapter 3: Working with Strings -- Analyzing String Content -- First, Last, and Other Names -- Email Address -- Password -- Phone Number -- Gender -- Date of Birth -- Credit Card Information -- Base64 and Hex Encoding -- Base64 Encoding -- Hex Encoding -- MD5, SHA, and Other Hashes -- MD5 Hash -- SHA Hashes -- Hashable Protocol and Swift Hashes -- Salt -- Integer Indexing -- Localization -- NSLocalizedString Macro -- Files with Translations -- LocalizedStringKey Struct -- Syntactic Sugar -- Summary -- Chapter 4: UIKit and Storyboards -- Navigation Between App Screens -- Screens, Windows, and Views -- Navigation in iOS Apps -- Scenes -- Going Back -- Replacing Root View -- Modifying UINavigationController Stack -- Removing Elements from the Navigation Stack…”
    Libro electrónico
  20. 1080
    Publicado 2023
    Tabla de Contenidos: “…-- Chapter 6: Adding a Registration and Login Form for Our Users -- Technical requirements -- Creating a sign-up screen -- Understanding Vertical Layout Group -- Creating a sign-in screen -- Placing the player -- Summary -- Chapter 7: Building an NPC That Allows Us to Travel -- Technical requirements -- Choosing an aspect -- Bringing the NPC to life -- Triggering when we are close -- Showing the available worlds in a window -- Mobile support -- Traveling to the selected world -- Canvas -- NPC -- PlayerInstance -- Summary -- Chapter 8: Acquiring a House -- Technical requirements -- The concept of home -- Enabling a user to obtain a home -- Adding a trigger to the Prefab of the house -- Programming script to acquire a house -- Linking a house to a player -- Understanding what an NFT is -- Converting a house to an NFT -- IPFS -- Goerli -- ChainSafe -- MetaMask -- Mining cryptocurrencies -- Programming the generation of the NFT -- Summary -- Chapter 9: Turning Our World into a Multiplayer Room -- Technical requirements -- Getting started with Photon SDK -- Pricing -- Signing up for Photon SDK -- Creating a new application -- Installing Photon SDK -- Photon life cycle -- Regions -- Rooms -- Lobby -- Synchronizing movements and animations in the network -- Preparing the player Prefab -- Disabling other players' scripts -- Creating the network logic script -- Adapting login for multiplayer support -- Adapting world navigation for multiplayer support -- Testing the changes -- Testing synchronization with another user -- Introducing ParrelSync -- Installing ParrelSync -- Summary -- Chapter 10: Adding Text and a Voice Chat to the Room -- Technical requirements -- Getting started with Photon Chat -- Introduction to the Photon Chat SDK -- Creating a Photon Chat project…”
    Libro electrónico