Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 476
- Historia 336
- Management 303
- Development 295
- Application software 236
- Data processing 219
- Computer networks 216
- Security measures 204
- Research 175
- Computer security 170
- Politics and government 155
- Social aspects 143
- Web site development 138
- Prevention 136
- Information technology 129
- Computer programs 128
- Design 122
- Biblia 119
- Història 117
- Hagiografia 114
- Design and construction 106
- Web sites 105
- Engineering & Applied Sciences 103
- Computer software 100
- JavaScript (Computer program language) 100
- Digital techniques 97
- Programming 96
- Technological innovations 96
- Database management 93
- Psychological aspects 91
-
14521Publicado 2015Tabla de Contenidos: “…Front Cover -- Networks-on-Chip: From Implementations to Programming Paradigms -- Copyright -- Contents in Brief -- Contents -- Preface -- About the Editor-in-Chief and Authors -- Editor-in-Chief -- Authors -- Part I: Prologue -- Chapter 1: Introduction -- 1.1 The dawn of the many-core era -- 1.2 Communication-centric cross-layer optimizations -- 1.3 A baseline design space exploration of NoCs -- 1.3.1 Topology -- 1.3.2 Routing algorithm -- 1.3.3 Flow control -- 1.3.4 Router microarchitecture -- 1.3.5 Performance metric -- 1.4 Review of NoC research -- 1.4.1 Research on topologies -- 1.4.2 Research on unicast routing -- 1.4.3 Research on supporting collective communications -- 1.4.4 Research on flow control -- 1.4.5 Research on router microarchitecture -- 1.5 Trends of real processors -- 1.5.1 The MIT Raw processor -- 1.5.2 The Tilera TILE64 processor -- 1.5.3 The Sony/Toshiba/IBM Cell processor -- 1.5.4 The U.T. …”
Libro electrónico -
14522Publicado 2003Tabla de Contenidos: “…Front cover -- Contents -- Figures -- Tables -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Concept and planning -- Chapter 1. …”
Libro electrónico -
14523por Ballard, ChuckTabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction and overview -- Chapter 1. …”
Publicado 2005
Libro electrónico -
14524por Moore, BillTabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 The development process -- Chapter 1. …”
Publicado 2003
Libro electrónico -
14525por Allison, SteveTabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Who should read this book -- Comments welcome -- Summary of changes -- New and revised cryptographic information -- Securing the file system -- Security domains -- Java 2 security -- Enhanced support for Tivoli Access Manager -- Other enhancements -- Information removed or relocated -- Part 1 Introduction to WebSphere and J2EE security -- Chapter 1. …”
Publicado 2005
Libro electrónico -
14526Publicado 2004Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction -- Chapter 1. …”
Libro electrónico -
14527Publicado 2004Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Architecting a WebSphere Enterprise solution -- Chapter 1. …”
Libro electrónico -
14528por Cook, JimTabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Overview -- Chapter 1. …”
Publicado 2003
Libro electrónico -
14529por Chamberlain, JamesTabla de Contenidos: “…Front cover -- Contents -- Figures -- Tables -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction, planning, and installation -- Chapter 1. …”
Publicado 2005
Libro electrónico -
14530por Moore, BillTabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction to business integration -- Chapter 1. …”
Publicado 2005
Libro electrónico -
14531por Blankertz, WilfriedTabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- The team who wrote the first edition of this redbook -- Become a published author -- Comments welcome -- Part 1 WebSphere Development Studio Client -- Chapter 1. …”
Publicado 2005
Libro electrónico -
14532por Kammermann, MarkusTabla de Contenidos: “…Auflage -- Kapitel 2: Vorbereitung auf CompTIA A+ -- 2.1 Prüfen Sie Ihr Wissen -- 2.2 Fragen zu einem Computersystem -- 2.2.1 Die Front eines PC-Systems -- 2.2.2 Rückseitige Anschlüsse -- 2.2.3 Blick auf das Mainboard -- Teil I: Alles Blech oder was -- Kapitel 3: Vom Bit bis zum Personal Computer -- 3.1 Die Welt der Elektronik -- 3.1.1 Darstellung von Zahlen -- 3.1.2 Darstellung von Texten -- 3.1.3 Darstellung von Bildern -- 3.1.4 Darstellung von Tönen -- 3.2 Ganz klein und ganz groß -- 3.3 Der Personal Computer -- 3.4 Vom Laptop bis zum Smartphone -- 3.5 Smart sind die Geräte -- 3.5.1 Unterhaltung -- 3.5.2 Wearable Computer -- 3.6 Fragen zu diesem Kapitel -- Kapitel 4: Einblick in die Systemarchitektur -- 4.1 Die Systemzentrale: Der Prozessor -- 4.1.1 Single Core, Dual Core, noch mehr Core -- 4.1.2 Intel Core i und AMD Zen -- 4.1.3 Sockel für Prozessoren -- 4.1.4 Die technische Funktion der CPU -- 4.1.5 Der Cache -- 4.2 Mainboard-Komponenten -- 4.2.1 Das Chipset -- 4.2.2 Der DMA-Controller -- 4.2.3 Der Interrupt-Controller -- 4.2.4 Der Taktgeber -- 4.2.5 Mainboard-Formfaktoren -- 4.3 Der Arbeitsspeicher -- 4.3.1 Aufbau von RAM-Bausteinen -- 4.3.2 Aktuelle RAM-Typen hören auf den Namen DDR -- 4.3.3 Single Channel, Dual Channel, Quad Channel -- 4.3.4 Bauformen -- 4.3.5 Was folgt nach DDR5? …”
Publicado 2022
Libro electrónico -
14533Publicado 2024Tabla de Contenidos: “…Front Cover -- Federated Learning -- Copyright -- Contents -- Contributors -- Preface -- 1 Optimization fundamentals for secure federated learning -- 1 Gradient descent-type methods -- 1.1 Introduction -- 1.2 Basic components of GD-type methods -- 1.2.1 Search direction -- 1.2.2 Step-size -- 1.2.3 Proximal operator -- 1.2.4 Momentum -- 1.2.5 Dual averaging variant -- 1.2.6 Structure assumptions -- 1.2.7 Optimality certification -- 1.2.8 Unified convergence analysis -- 1.2.9 Convergence rates and complexity analysis -- 1.2.10 Initial point, warm-start, and restart -- 1.3 Stochastic gradient descent methods -- 1.3.1 The algorithmic template -- 1.3.2 SGD estimators -- 1.3.3 Unified convergence analysis -- 1.4 Concluding remarks -- Acknowledgments -- References -- 2 Considerations on the theory of training models with differential privacy -- 2.1 Introduction -- 2.2 Differential private SGD (DP-SGD) -- 2.2.1 Clipping -- 2.2.2 Mini-batch SGD -- 2.2.3 Gaussian noise -- 2.2.4 Aggregation at the server -- 2.2.5 Interrupt service routine -- 2.2.6 DP principles and utility -- 2.2.7 Normalization -- 2.3 Differential privacy -- 2.3.1 Characteristics of a differential privacy measure -- 2.3.2 (ε,δ)-differential privacy -- 2.3.3 Divergence-based DP measures -- 2.4 Gaussian differential privacy -- 2.4.1 Gaussian DP -- 2.4.2 Subsampling -- 2.4.3 Composition -- 2.4.4 Tight analysis of DP-SGD -- 2.4.5 Strong adversarial model -- 2.4.6 Group privacy -- 2.4.7 DP-SGD's trade-off function -- 2.5 Future work -- 2.5.1 Using synthetic data -- 2.5.2 Adaptive strategies -- 2.5.3 DP proof: a weaker adversarial model -- 2.5.4 Computing environment with less adversarial capabilities -- References -- 3 Privacy-preserving federated learning: algorithms and guarantees -- 3.1 Introduction -- 3.2 Background and preliminaries -- 3.2.1 The FedAvg algorithm…”
Libro electrónico -
14534Publicado 2023Tabla de Contenidos: “…Front Cover -- Handbook of Metaheuristic Algorithms -- Copyright -- Contents -- List of figures -- List of tables -- List of algorithms -- List of listings -- About the authors -- Chun-Wei Tsai (1978-) -- Ming-Chao Chiang (1956-) -- Preface -- Part 1 Fundamentals -- 1 Introduction -- 1.1 Why metaheuristic algorithms -- 1.2 Organization of this book -- 2 Optimization problems -- 2.1 Problem definition -- 2.2 Combinatorial optimization problems -- 2.2.1 The one-max and 0-1 knapsack problems -- 2.2.2 The B2D and deceptive problems -- 2.2.3 The traveling salesman problem (TSP) -- 2.3 Continuous optimization problems -- 2.3.1 The single-objective optimization problem -- 2.3.2 The multi-objective optimization problem -- 2.4 Summary -- 3 Traditional methods -- 3.1 Exhaustive search (ES) -- 3.1.1 The basic idea of ES -- 3.1.2 Implementation of ES for the one-max problem -- 3.1.3 Discussion of ES -- 3.2 Hill climbing (HC) -- 3.2.1 The basic idea of HC -- 3.2.2 Implementation of HC for the one-max problem -- 3.2.2.1 Main function -- 3.2.2.2 Search function of HC -- 3.2.2.2.1 Declaration of parameters and functions -- 3.2.2.2.2 The main loop -- 3.2.2.2.3 Additional functions -- 3.2.2.3 Library function -- 3.2.3 Discussion of HC -- 3.3 Comparisons between ES and HC -- 3.3.1 Simulation results of ES and HC for the one-max problem -- 3.3.2 Simulation results of ES and HC for the deceptive problem -- 3.4 Summary of ES and HC -- Supplementary source code -- 4 Metaheuristic algorithms -- 4.1 What is a metaheuristic algorithm? …”
Libro electrónico -
14535Publicado 2022Tabla de Contenidos: “…Front Cover -- Cyber-Physical Systems: AI and COVID-19 -- Copyright Page -- Contents -- List of contributors -- 1 AI-based implementation of decisive technology for prevention and fight with COVID-19 -- 1.1 Introduction -- 1.2 Related work -- 1.3 Proposed work -- 1.3.1 Face mask detection -- 1.3.2 Detection of COVID from CT images -- 1.4 Results and analysis -- 1.4.1 Face mask detection -- 1.4.2 CT scan image-based COVID-19 patient identification -- 1.5 Conclusion -- References -- 2 Internet of Things-based smart helmet to detect possible COVID-19 infections -- 2.1 Introduction -- 2.1.1 Epidemiology -- 2.1.2 Treatment -- 2.1.3 Prevention -- 2.1.4 Symptoms -- 2.1.5 Stages of COVID-19 -- 2.1.6 Key merits of IoT for COVID-19 pandemic -- 2.1.7 Internet of Things process required for COVID-19 -- 2.1.8 IoT applications for COVID-19 -- 2.2 Related work -- 2.3 IoT-based smart helmet to detect the infection of COVID-19 -- 2.3.1 Objective -- 2.3.2 Methodology -- 2.3.2.1 Efficiency of smart helmet -- 2.3.2.2 Components of smart helmet -- 2.3.2.2.1 Thermal camera -- 2.3.2.2.2 Optical camera -- 2.3.2.2.3 Arduino Integrated Development Environment (IDE) -- 2.3.2.2.4 Proteus software -- 2.3.2.2.5 Google Location History -- 2.4 Conclusion -- References -- 3 Role of mobile health in the situation of COVID-19 pandemics: pros and cons -- 3.1 Introduction -- 3.2 Implementation of a training module for the mHealth care worker -- 3.3 Government policies for the scale-up of the mHealth services -- 3.4 Popular models of mHealth serving for pandemic COVID-19 -- 3.5 Ethical consideration -- 3.6 Superiority of mHealth services over other available services -- 3.7 Probability of conflict of interest between user and service provider -- 3.8 Legal consideration -- 3.9 Protection of privacy of end-users -- 3.10 Conclusion -- 3.11 Future prospects -- References…”
Libro electrónico -
14536Publicado 2022Tabla de Contenidos: “…Front Cover -- 5G IoT and Edge Computing for Smart Healthcare -- Copyright Page -- Contents -- List of contributors -- 1 Edge-IoMT-based enabled architecture for smart healthcare system -- 1.1 Introduction -- 1.2 Applications of an IoMT-based system in the healthcare industry -- 1.3 Application of edge computing in smart healthcare systems -- 1.4 Challenges of using edge computing with IoMT-based system in smart healthcare system -- 1.5 The framework for edge-IoMT-based smart healthcare system -- 1.6 Case study for the application of edge-IoMT-based systems enabled for the diagnosis of diabetes mellitus -- 1.6.1 Experimental results -- 1.7 Future prospects of edge computing for internet of medical things -- 1.8 Conclusions and future research directions -- References -- 2 Physical layer architecture of 5G enabled IoT/IoMT system -- 2.1 Architecture of IoT/IoMT system -- 2.1.1 Sensor layer -- 2.1.2 Gateway layer -- 2.1.3 Network layer -- 2.1.4 Visualization layer -- 2.2 Consideration of uplink healthcare IoT system relying on NOMA -- 2.2.1 Introduction -- 2.2.2 System model -- 2.2.3 Outage probability for UL NOMA -- 2.2.3.1 Outage probability of x1 -- 2.2.3.2 Outage probability of X2 -- 2.2.3.3 Asymptotic -- 2.2.4 Ergodic capacity of UL NOMA -- 2.2.5 Numerical results and discussions -- 2.3 Conclusions -- References -- 3 HetNet/M2M/D2D communication in 5G technologies -- 3.1 Introduction -- 3.2 Heterogenous networks in the era of 5G -- 3.2.1 5G mobile communication standards and enhanced features -- 3.2.2 5G heterogeneous network architecture -- 3.2.3 Intelligent software defined network framework of 5G HetNets -- 3.2.4 Next-Gen 5G wireless network -- 3.2.5 Internet of Things toward 5G and heterogenous wireless networks -- 3.2.6 5G-HetNet H-CRAN fronthaul and TWDM-PON backhaul: QoS-aware virtualization for resource management…”
Libro electrónico -
14537Publicado 2025Tabla de Contenidos: “…Front Cover -- Graph Based Multimedia Analysis -- Copyright -- Contents -- List of figures -- List of tables -- Biography -- Foreword -- Preface -- 1 Introduction -- 1.1 Motivation -- 1.2 Chapter organization -- 1.3 Basics of multimedia -- 1.4 Preliminaries of a video -- 1.5 Multimedia problems -- 1.6 Graph based solutions -- 1.7 Other solution models -- 1.8 Organization of the book -- References -- 2 Theoretical foundations -- 2.1 Motivation -- 2.2 Organization -- 2.3 Graph basics -- 2.4 Delaunay graph -- 2.5 Bipartite graph -- 2.6 Minimum spanning tree -- 2.7 Optimum path forest -- 2.8 Random walks on a graph -- 2.9 Knapsack problems -- 2.10 Elementary game theory -- References -- 3 Exocentric video summarization -- 3.1 Motivation -- 3.2 Chapter organization -- 3.3 Related works -- 3.3.1 Related works for exocentric video summarization -- 3.3.2 Related works for scalable exocentric video summarization -- 3.4 Method I: Delaunay graph based solutions for exocentric video summarization -- 3.4.1 Method IA: Constrained Delaunay graph clustering based summary -- 3.4.1.1 Video frame presampling -- 3.4.1.2 Feature extraction -- 3.4.1.3 Elimination of redundant frames -- 3.4.1.4 Delaunay graph based constrained clustering -- 3.4.1.5 Key frame extraction -- 3.4.2 Method IB: Delaunay graph based summary with user customization -- 3.4.3 Method IC: Delaunay graph based summary in enhanced feature space -- 3.5 Method II: A graph modularity based clustering for exocentric video summarization -- 3.5.1 Compressed domain feature extraction -- 3.5.2 Multi-feature fusion -- 3.5.3 Graph modularity based clustering -- 3.5.4 Key frame extraction -- 3.6 Scalable exocentric video summarization with skeleton graph and random walk -- 3.6.1 Extraction of skeleton graph -- 3.6.2 Clustering of skeleton graph via MST -- 3.6.3 Label propagation with random walks…”
Libro electrónico -
14538por Khare, VikasTabla de Contenidos: “…Front Cover -- Cognitive Science, Computational Intelligence, and Data Analytics -- Copyright Page -- Contents -- Foreword -- Overview of the book -- 1 Foundation of analytics -- Abbreviations -- 1.1 Introduction -- 1.2 Concepts of analytics -- 1.2.1 Descriptive analytics -- 1.2.1.1 Five steps in descriptive analytics -- 1.2.1.1.1 State business metrics -- 1.2.1.1.2 Identify data required -- 1.2.1.1.3 Extract and prepare data -- 1.2.1.1.4 Analyze data -- 1.2.1.1.5 Present data -- 1.2.1.2 Use case of descriptive analytics -- 1.2.1.3 Advantages of descriptive analytics -- 1.2.1.4 Disadvantages of descriptive analytics -- 1.2.2 Diagnostic analytics -- 1.2.2.1 Use case of diagnostic analytics -- 1.2.2.2 Advantages of diagnostic analytics -- 1.2.2.3 Disadvantages of diagnostic analytics -- 1.2.3 Predictive analytics -- 1.2.3.1 Use cases of predictive analytics -- 1.2.3.2 Advantages of predictive analytics -- 1.2.3.3 Disadvantages of predictive analytics -- 1.2.4 Prescriptive analytics -- 1.2.4.1 Use case of prescriptive analytics -- 1.2.4.2 Advantages of prescriptive analytics -- 1.2.4.3 Disadvantages of prescriptive analytics -- 1.3 Emerging areas of analytics -- 1.3.1 Data analysis -- 1.3.1.1 Process of data analysis -- 1.3.2 Business analytics -- 1.3.2.1 Common component of business analytics -- 1.3.3 Web analytics and web scrapping -- 1.3.3.1 Use case of web analytics -- 1.3.4 Big data analysis -- 1.3.4.1 Key big data analytics technologies and tools -- 1.3.4.2 Use case of big data analysis -- 1.3.4.3 Advantages of big data analysis -- 1.3.4.4 Disadvantages of big data analysis -- 1.4 Value chain analysis -- 1.4.1 Component of value chain analysis -- 1.4.2 How to conduct value chain analysis? …”
Publicado 2024
Libro electrónico -
14539por Pazzini, Adalberto
Publicado 1955Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
14540Publicado 2016Tabla de Contenidos: “…Front matter -- Índice -- Presentación -- El album de fotos / Bibliografía de José Antonio Pascual -- Diccionarios -- Nuestros primeros diccionarios etimológicos / La etimología en el DEM, con una breve descripción del «Fichero etimológico» en el Archivo del DEM / Palabras prestadas. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico