Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 693
- Application software 600
- Engineering & Applied Sciences 492
- Historia 486
- History 440
- Java (Computer program language) 404
- Computer Science 396
- Python (Computer program language) 308
- Computer programming 291
- Classes socials 233
- Web site development 227
- Design 223
- Programming 222
- Història 212
- Microsoft .NET Framework 193
- Education 188
- Management 181
- Web sites 178
- Computer software 177
- Programming languages (Electronic computers) 171
- Clases sociales 170
- Ensenyament 158
- JavaScript (Computer program language) 155
- Computer programs 154
- Object-oriented programming (Computer science) 154
- C# (Computer program language) 151
- Social aspects 138
- C++ (Computer program language) 133
- Social conditions 128
- Software engineering 122
-
11081Publicado 2018Tabla de Contenidos: “…-- Client-side versus server-side APIs -- Client-side APIs -- Server-side APIs -- Where scripting is supported -- Access controls -- Business rules -- Client scripts and catalog client scripts -- Condition builder (and the URL) -- Default value -- Script includes -- UI actions -- UI policies and catalog UI policies -- UI scripts -- Workflow activities -- Integrated development environment -- Script tree -- Script auto-completion -- Script editor macros -- Documentation macro -- For-loop macro -- GlideRecord macros -- Demo -- Summary -- Chapter 9: The Server-Side Glide API -- The structure of an API class -- Server-side APIs -- GlideRecord -- Initialize -- Example usage -- addQuery() -- Available query operators -- Example usage -- addActiveQuery() -- addNullQuery() and addNotNullQuery() -- Example usage -- canRead(), canWrite(), canCreate(), and canDelete() -- Example usage -- deleteRecord() and deleteMultiple() -- Example usage -- get() -- Example usage -- getDisplayValue() -- Example usage…”
Libro electrónico -
11082por Agency for Healthcare Research and Quality (US)Tabla de Contenidos: “…Utilization of antihypertensive drug classes among Medicare beneficiaries with hypertension, 2007 to 2009 -- Raymond R Townsend, Charles E Leonard, Karla López de Nava, Teresa Molina, Christina Kang-Yi, and Cristin P Freeman. -- Published: November 16, 2011. -- FINDINGS -- DATA SOURCE -- STUDY PERIOD -- DEFINITIONS AND METHODS -- ADDITIONAL FINDINGS AVAILABLE ONLINE -- REFERENCES -- Acknowledgments -- Anticancer Biologics -- Data Points #7. …”
Publicado 2011
Seriada digital -
11083Publicado 2008Tabla de Contenidos: “…Quiz -- Foundation Topics -- VLSM -- Manual Route Summarization -- Autosummarization and Discontiguous Classful Networks -- Exam Preparation Tasks -- Review All the Key Topics -- Complete the Tables and Lists from Memory…”
Libro electrónico -
11084Publicado 2004Tabla de Contenidos: “…Selecting your cluster -- 2.1 Platform -- 2.1.1 IA32 (and x86) -- 2.1.2 AMD64 (and x86-64) -- 2.1.3 Platform selection -- 2.2 Server types and models -- 2.2.1 1U "Pizza-box" - x335 -- 2.2.2 AMD64 "Pizza-box" - e325 -- 2.2.3 2U 2P - x345 -- 2.2.4 4P - x365 -- 2.2.5 HS20 (2-way -- 14 Blades in a 7U unit) -- 2.2.6 Server selection -- 2.3 Storage -- 2.3.1 Localized vs. centralized storage topologies -- 2.3.2 Enterprise Storage Servers (ESSs) -- 2.3.3 DS4000 series -- 2.3.4 Direct Attached Fibre Storage (EXP) -- 2.3.5 Direct-attached SCSI storage (ServeRAIDTM) -- 2.3.6 Network Attached Storage (NAS) -- 2.3.7 Storage selection -- 2.4 Network interconnect -- 2.4.1 InfiniBand option -- 2.4.2 Network selection -- 2.5 Linux distribution -- 2.5.1 Validated enterprise-class Linux distributions -- 2.5.2 Linux distribution selection -- 2.6 Sample configurations -- 2.6.1 A 32-bit configuration -- 2.6.2 A Scaled-out 32-bit configuration -- 2.6.3 A 64-bit benchmark configuration -- 2.6.4 A 4-way building block -- 2.7 Summary -- Chapter 3. …”
Libro electrónico -
11085Publicado 2005Tabla de Contenidos: “…Common migration issues -- 5.1 J2EE application server compability -- 5.1.1 Differences in J2EE implementations -- 5.1.2 Using vendor-specific features -- 5.1.3 Class loader related problems -- 5.1.4 Deployment descriptors -- 5.2 Application portability -- 5.2.1 Application packaging -- 5.2.2 Use of native code -- 5.2.3 Database-related issues -- 5.2.4 JMS -- 5.2.5 JNDI -- 5.2.6 J2EE application clients -- 5.3 J2EE 1.3 to 1.4 migration considerations -- 5.3.1 Enterprise Java Beans -- 5.3.2 Java Server Pages -- 5.3.3 Servlets -- Chapter 6. …”
Libro electrónico -
11086por DuBois, Paul, 1956-Tabla de Contenidos: “…H: Perl DBI API Reference -- H.1 Writing Scripts -- H.2 DBI Methods -- H.3 DBI Utility Functions -- H.4 DBI Attributes -- H.5 DBI Environment Variables -- I: PHP API Reference -- I.1 Writing PHP Scripts -- I.2 PDO Classes -- I.3 PDO Methods -- Index…”
Publicado 2009
Libro electrónico -
11087Publicado 2017Tabla de Contenidos: “…. -- Applying softmax activation to obtain a predicted class -- Getting ready -- How to do it... -- Defining the cost function used for optimization -- Getting ready -- How to do it... -- How it works... -- Performing gradient descent cost optimization -- Getting ready -- How to do it... -- Executing the graph in a TensorFlow session -- Getting ready -- How to do it... -- How it works... -- Evaluating the performance on test data -- Getting ready -- How to do it…”
Libro electrónico -
11088Publicado 2019Tabla de Contenidos: “…Testing reactive code -- Reactive architectures and testing -- Test granularity -- The pyramid of dependencies -- Unit-testing basics -- Testing reactive chains -- TestObservable class -- Synchronous or asynchronous -- Coffee break -- Writing tests for view models -- Choosing what to test -- Testing the GameViewModel initial state -- Testing partial observable chains -- Testing Connect Four drop logic -- Summary -- Part 3. …”
Libro electrónico -
11089Publicado 2012Tabla de Contenidos: “…-- Get Prepared -- How to Save Time on This Chapter -- Site Location Guidelines -- Basic Principles of Wind Resource Evaluation -- Know Your (Wind) Class -- Maps Are Not Gospel -- Wind Shear -- Ways of the Wind: Assessing Average Annual Wind Speed -- Not for Your Eyes Only -- Beaufort Wind Force Scale -- Griggs-Putnam Index of Deformity -- Data-Driven Pyramid of Wind Assessment -- Global Wind Maps -- Regional Wind Maps -- Climatic and Meteorological Data -- Wind Energy Roses -- Professional Wind Analysis Services -- Anemometers -- Bringing It All Together -- Tower Types and Site Evaluation -- Tilt-Up Towers -- Fixed Guyed Towers -- Freestanding Towers -- Consider Maintenance -- Siting for Roof-Mount Micro-Turbines -- Social Friction Factor -- Summary -- 6 How to Finance Small Wind Power -- Cost Breakdowns for a Small Wind System -- Electricity Costs Last a Lifetime -- What Is It Worth to You?…”
Libro electrónico -
11090Publicado 2004Tabla de Contenidos: “…Implications of transition -- 4.1 Items to check before and after the transition -- 4.1.1 Data saved by the transition tools -- 4.2 RRA (Restricted Root Access) -- 4.3 BIS (Boot Install Server) -- 4.4 Kerberos -- 4.5 Security on PSSP versus CSM -- 4.6 File collections -- 4.7 User management -- 4.8 Monitoring -- 4.8.1 Differences in monitoring between PSSP to CSM -- 4.8.2 Sample of monitoring item -- 4.9 Custom SDR classes -- 4.10 Customer scripts for specific tasks -- 4.11 Node-to-node access within CSM, RPD -- 4.12 sysctl -- 4.13 NTP -- 4.14 Automount…”
Libro electrónico -
11091Publicado 2022Tabla de Contenidos: “…Goals -- Requirements Classifications -- Requirements Level Classification -- Requirements Specifications Types -- Functional Requirements -- Nonfunctional Requirements -- Domain Requirements -- Domain Vocabulary Understanding -- Requirements Engineering Activities -- Requirements Elicitation/Discovery -- Requirements Analysis and Agreement -- Requirements Representation -- Requirements Validation -- Requirements Management -- Bodies of Knowledge -- The Requirements Engineer -- Requirements Engineer Roles -- Requirements Engineer as Software or Systems Engineer -- Requirements Engineer as Subject Matter Expert -- Requirements Engineer as Architect -- Requirements Engineer as Business Process Expert -- Ignorance as Virtue -- Role of the Customer -- Problems with Traditional Requirements Engineering -- Complexity -- Gold-Plating and Ridiculous Requirements -- Obsolete Requirements -- Four Dark Corners -- Difficulties in Enveloping System Behavior -- The Danger of "All" in Specifications -- Exercises -- References -- 2 Preparing for Requirements Elicitation -- Product Business Goals and Mission Statements -- Encounter with a Customer -- Identifying the System Boundaries -- Context Diagrams -- Stakeholders -- Negative Stakeholders -- Stakeholder Identification -- Stakeholder Identification Questions -- Rich Pictures -- Stakeholder/User Classes -- Stakeholders vs. Use Case Actors -- User Characteristics -- Customer Wants and Needs -- What Do Customers Want? …”
Libro electrónico -
11092Publicado 2024Tabla de Contenidos: “…The power of resize() -- Enter reserve() -- Optimizing with shrink_to_fit() -- Real-world relevance -- Custom allocator basics -- The role and responsibility of an allocator -- Under the hood - the allocator interface -- Trade-offs and the need for custom allocators -- Choosing std::allocator over new, delete, and managed pointers -- Creating a custom allocator -- Custom allocators - the heart of memory flexibility -- Understanding the motivation behind custom allocators -- Memory pools - a popular custom allocator strategy -- Unlocking the potential of custom allocators -- Allocators and container performance -- Why allocators matter in performance -- The performance characteristics of std::allocator -- When to consider alternative allocators -- Profiling - the key to making informed decisions -- Summary -- Chapter 4: Mastering Algorithms with std::vector -- Technical requirements -- Sorting a vector -- Getting started with std::sort -- The engine under the hood - introsort -- Efficiency unparalleled - O(n log n) -- Sorting in descending order -- Sorting custom data types -- Pitfalls and precautions -- Searching elements -- Linear search with std::find -- Binary search techniques -- Using std::lower_bound and std::upper_bound -- Binary search versus linear search - efficiency and versatility -- Manipulating vectors -- Transforming with std::copy -- Reversing elements with std::reverse -- Rotating vectors with std::rotate -- Filling a vector with std::fill -- Putting manipulation to use -- Considerations in manipulation -- Custom comparators and predicates -- Understanding comparators -- The power of predicates -- Crafting effective comparators and predicates -- User-defined structs and classes -- Understanding container invariants and iterator invalidation -- Understanding iterator invalidation -- Strategies to counteract invalidation…”
Libro electrónico -
11093Publicado 2024Tabla de Contenidos: “…6.2 A Special Case of the Proof of Theorem 2.3 (part (1)) -- 6.3 The Remaining Proof of Theorem 2.3 (part (1)) -- 7 Tensors, Hyperplanes, Near Reflections, Constants ( , , K) -- 7.1 Hyperplane -- We Meet the Positive Constant -- 7.2 "Well Separated" -- We Meet the Positive Constant -- 7.3 Upper Bound for Card (E) -- We Meet the Positive Constant K -- 7.4 Theorem 7.11 -- 7.5 Near Reflections -- 7.6 Tensors,Wedge Product, and Tensor Product -- 8 Algebraic Geometry: Approximation-varieties, Lojasiewicz, Quantification: ( , )-Theorem 2.2 (part (2)) -- 8.1 Min-max Optimization and Approximation-varieties -- 8.2 Min-max Optimization and Convexity -- 9 Building -distortions: Near Reflections -- 9.1 Theorem 9.14 -- 9.2 Proof of Theorem 9.14 -- 10 -distorted diffeomorphisms, O(d) and Functions of Bounded Mean Oscillation (BMO) -- 10.1 BMO -- 10.2 The John-Nirenberg Inequality -- 10.3 Main Results -- 10.4 Proof of Theorem 10.17 -- 10.5 Proof of Theorem 10.18 -- 10.6 Proof of Theorem 10.19 -- 10.7 An Overdetermined System -- 10.8 Proof of Theorem 10.16 -- 11 Results: A Revisit of Theorem 2.2 (part (1)) -- 11.1 Theorem 11.21 -- 11.2 blocks -- 11.3 Finiteness Principle -- 12 Proofs: Gluing and Whitney Machinery -- 12.1 Theorem 11.23 -- 12.2 The Gluing Theorem -- 12.3 Hierarchical Clusterings of Finite Subsets of Rd Revisited -- 12.4 Proofs of Theorem 11.27 and Theorem 11.28 -- 12.5 Proofs of Theorem 11.31, Theorem 11.30 and Theorem 11.29 -- 13 Extensions of Smooth Small Distortions [41]: Introduction -- 13.1 Class of Sets E -- 13.2 Main Result -- 14 Extensions of Smooth Small Distortions: First Results -- Lemma 14.1 -- Lemma 14.2 -- Lemma 14.3 -- Lemma 14.4 -- Lemma 14.5 -- 15 Extensions of Smooth Small Distortions: Cubes, Partitions of Unity, Whitney Machinery -- 15.1 Cubes -- 15.2 Partition of Unity -- 15.3 Regularized Distance…”
Libro electrónico -
11094Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Table of Contents -- Preface -- Part 1: Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture -- Chapter 1: Introducing the Vehicle Electrical/Electronic Architecture -- Overview of the basic building blocks of the E/E architecture -- Electronic control units -- Looking at MCU-based ECUs -- Looking at SoC-based ECUs -- Looking inside the MCU and SoC software layers -- ECU domains -- Fuel-based powertrain domain -- Electric drive powertrain domain -- Chassis safety control domain -- Interior cabin domain -- Infotainment and connectivity domain -- Cross-domain -- Exploring the in-vehicle network -- CAN -- FlexRay -- LIN -- UART -- SENT -- GMSL -- I2C -- Ethernet -- J1939 -- Sensors and actuators -- Sensor types -- Actuators -- Exploring the vehicle architecture types -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Zone architecture -- Commercial truck architecture types -- Summary -- Answers to discussion points -- Further reading -- Chapter 2: Cybersecurity Basics for Automotive Use Cases -- Exploring the attack classes -- Passive attacks -- Active attacks -- Identifying security objectives -- Integrity -- Authenticity -- Confidentiality -- Accountability -- Availability -- Cryptography applied to automotive use cases -- Building blocks -- One-way hash functions -- Message authentication code algorithms -- Random number generators -- Public key cryptography -- Key management -- NIST defined security strength -- Chinese cryptography -- PQC algorithms -- Security principles -- Defense in depth -- Domain separation -- Least privilege -- Least sharing -- Mediated access -- Protective defaults -- Anomaly detection -- Distributed privilege -- Hierarchical protection and zero trust -- Minimal trusted elements -- Least persistence…”
Libro electrónico -
11095por Kerim, AbdulrahmanTabla de Contenidos: “…-- Applications of predictive analytics -- Predictive analytics issues with real data -- Partial and scarce training data -- Bias -- Cost -- Case studies of utilizing synthetic data for predictive analytics -- Provinzial and synthetic data -- Healthcare benefits from synthetic data in predictive analytics -- Amazon fraud transaction prediction using synthetic data -- Summary -- Chapter 13: Best Practices for Applying Synthetic Data -- Unveiling the challenges of generating and utilizing synthetic data -- Domain gap -- Data representation -- Privacy, security, and validation -- Trust and credibility -- Domain-specific issues limiting the usability of synthetic data -- Healthcare -- Finance -- Autonomous cars -- Best practices for the effective utilization of synthetic data -- Summary -- Part 5: Current Challenges and Future Perspectives -- Chapter 14: Synthetic-to-Real Domain Adaptation -- The domain gap problem in ML -- Sensitivity to sensors' variations -- Discrepancy in class and feature distributions -- Concept drift -- Approaches for synthetic-to-real domain adaptation -- Domain randomization -- Adversarial domain adaptation -- Feature-based domain adaptation -- Synthetic-to-real domain adaptation - issues and challenges -- Unseen domain -- Limited real data -- Computational complexity -- Synthetic data limitations -- Multimodal data complexity -- Summary -- Chapter 15: Diversity Issues in Synthetic Data -- The need for diverse data in ML -- Transferability -- Better problem modeling -- Security -- Process of debugging -- Robustness to anomalies -- Creativity -- Inclusivity -- Generating diverse synthetic datasets -- Latent space variations…”
Publicado 2023
Libro electrónico -
11096Publicado 2011Tabla de Contenidos: “…Scenario Modeling -- Experimental Results -- Conclusions -- References -- Humanoid Motion Planning in the Goal Reaching Movement of Anthropomorphic Upper Limb -- Introduction -- Method -- Twists and Wrenches -- Second Order Kinematic Model -- Numerical Simulation -- Discussion and Conclusion -- References -- Human Sitting Posture Exposed to Horizontal Perturbation and Implications to Robotic Wheelchairs -- Introduction -- Biomechanics and Motor Control of Sitting Posture -- Vibrational Analysis of Sitting Posture -- Biomechanics and Control Model -- Implications to Robotic Wheelchairs -- Conclusions -- References -- Automatic Circumference Measurement for Aiding in the Estimation of Maximum Voluntary Contraction (MVC) in EMG Systems -- Introduction -- Background -- Design of Automatic Circumference Armband -- Experimental Results and Analysis -- Discussion -- Conclusion and Future Work -- References -- Classification of the Action Surface EMG Signals Based on the Dirichlet Process Mixtures Method -- Introduction -- Methods -- Dirichlet Process Mixture Model -- Feature Extraction -- Materials -- Analysis and Results -- Conclusions -- References -- Displacement Estimation for Foot Rotation Axis Using a Stewart-Platform-Type Assist Device -- Introduction -- Stewart-Platform-Type Ankle-Foot Assist Device -- Control the Posture (Inverse Kinematics) -- Measure the Posture (Forward Kinematics) -- Rotation Axis Estimation of Ankle Joint -- Ankle Joint -- Rotation Axis Estimation -- Experiment and Result -- Conclusions -- References -- Mechanisms and their Applications -- Inverse Kinematics Solution of a Class of Hybrid Manipulators -- Introduction -- Overview of Kinematic Configuration and Modeling -- Inverse Kinematics Solution -- A Numerical Example -- Discussion and Conclusion -- References -- Stiffness Analysis of Clavel's DELTA Robot…”
Libro electrónico -
11097Publicado 2011Tabla de Contenidos: “…Artificial Cognition in Autonomous Assembly Planning Systems -- Introduction -- Definitions -- Cognition -- Self-optimization -- State of the Art -- Software Architectures for Cognitive Technical Systems -- Cognitive Technical Systems in Production Engineering -- Assembly Planning Systems -- The Project "Cognitive Planning and Control System for Production" -- Objectives and Approach -- Cognitive Capabilities of the CCU -- Conclusion and Outlook -- References -- Self-optimization as an Enabler for Flexible and Reconfigurable Assembly Systems -- Introduction -- Self-optimizing Functions for Assembly Systems -- Grasp Planning and Configuration -- Quick Automated Commissioning of Assembly Systems after Reconfiguration -- Planar Alignment for a Bonding Process -- Summary and Outlook -- References -- Flexible Assembly Robotics for Self-optimizing Production -- Introduction -- Self-optimizing Assembly Systems -- Research Results -- Intermediate Conclusion -- Research Roadmap -- Enablers for Flexibility -- Enablers for Cognition -- Enablers for Autonomy -- Conclusion -- References -- Meta-modeling for Manufacturing Processes -- Introduction -- Meta-modeling - Definition of Process-Independent Method -- Definition of Process Properties and Model Requirements (B1) -- Selection of Parameters (B2) -- Determination of Process Domain (B3) -- Selection of Data Source (B4) -- Design and Setup of Experiment (B5) -- Generation of Data (B6) -- Selection of Model Class and Structure (B7) -- Implementation of Model (B8) -- Evaluation of Model Quality (B9) -- Conclusion -- References -- Computational Intelligence -- Control Architecture for Human Friendly Robots Based on Interacting with Human -- Introduction -- Intelligent Human Friendly Robot System -- Control Software Architecture for the Service Robot -- Experimental Result of a Control Software Architecture…”
Libro electrónico -
11098por Rao , K. Rama MohanaTabla de Contenidos: “…Organized Retailing: The New Growth Frontier -- Other Divisions of the Company -- Suppliers -- Intermediaries -- Competitors -- Customer Markets -- Other Publics -- The Macro-environment -- The Demographic Environment -- The Economic Environment -- The Natural Environment -- The Technological Environment -- Industrial Policy 1991: The Focus on Market Economy -- The Political and Legal Environment -- The Social and Cultural Environment -- The Company's Response to the Marketing Environment -- Summary -- Key Terms -- Brief Questions -- Essay Questions -- Assignments -- References -- Chapter 4: The Services Sector in the Indian Economy -- Introduction -- Contribution to the Gross Domestic Product -- Shares of Sub-sectors -- Contribution to Employment -- Reasons for the Growth of Services in India -- Operational Characteristics of Services Sector Enterprises in India -- Economic Affluence -- The Changing Role of Women -- Cultural Changes -- The IT Revolution -- The Conservation of Natural Resources -- The Development of Markets -- The Unbundling of Corporations -- The Increased Consciousness of Healthcare -- Economic Liberalization -- Migration -- Export Potential -- Key Service Businesses in India -- Insurance -- Service Tax -- Transport -- Telecommunications -- IT and ITeS -- Electricity -- Postal Services -- Tourism -- Banking -- Healthcare -- Education -- Entertainment and Media Services -- Retailing -- Summary -- Key Terms -- Brief Questions -- Essay Questions -- Assignments -- References -- Chapter 5: Consumer Behaviour in Services -- Introduction -- Buyers, Consumers and Customers -- Factors Influencing Consumer Behaviour -- Cultural and Social Factors -- Consumers in India -- Middle-class Consumers: The Potential Market for a Host of Services -- Personal and Physical Factors -- Psychological Factors -- How Do Consumers Develop Expectations?…”
Publicado 2011
Libro electrónico -
11099
-
11100