Mostrando 14,521 - 14,540 Resultados de 15,387 Para Buscar '"The Front"', tiempo de consulta: 0.14s Limitar resultados
  1. 14521
    Publicado 2015
    Tabla de Contenidos: “…Front Cover -- Networks-on-Chip: From Implementations to Programming Paradigms -- Copyright -- Contents in Brief -- Contents -- Preface -- About the Editor-in-Chief and Authors -- Editor-in-Chief -- Authors -- Part I: Prologue -- Chapter 1: Introduction -- 1.1 The dawn of the many-core era -- 1.2 Communication-centric cross-layer optimizations -- 1.3 A baseline design space exploration of NoCs -- 1.3.1 Topology -- 1.3.2 Routing algorithm -- 1.3.3 Flow control -- 1.3.4 Router microarchitecture -- 1.3.5 Performance metric -- 1.4 Review of NoC research -- 1.4.1 Research on topologies -- 1.4.2 Research on unicast routing -- 1.4.3 Research on supporting collective communications -- 1.4.4 Research on flow control -- 1.4.5 Research on router microarchitecture -- 1.5 Trends of real processors -- 1.5.1 The MIT Raw processor -- 1.5.2 The Tilera TILE64 processor -- 1.5.3 The Sony/Toshiba/IBM Cell processor -- 1.5.4 The U.T. …”
    Libro electrónico
  2. 14522
    Publicado 2003
    Tabla de Contenidos: “…Front cover -- Contents -- Figures -- Tables -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Concept and planning -- Chapter 1. …”
    Libro electrónico
  3. 14523
    por Ballard, Chuck
    Publicado 2005
    Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction and overview -- Chapter 1. …”
    Libro electrónico
  4. 14524
    por Moore, Bill
    Publicado 2003
    Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 The development process -- Chapter 1. …”
    Libro electrónico
  5. 14525
    por Allison, Steve
    Publicado 2005
    Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Who should read this book -- Comments welcome -- Summary of changes -- New and revised cryptographic information -- Securing the file system -- Security domains -- Java 2 security -- Enhanced support for Tivoli Access Manager -- Other enhancements -- Information removed or relocated -- Part 1 Introduction to WebSphere and J2EE security -- Chapter 1. …”
    Libro electrónico
  6. 14526
    Publicado 2004
    Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction -- Chapter 1. …”
    Libro electrónico
  7. 14527
    Publicado 2004
    Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Architecting a WebSphere Enterprise solution -- Chapter 1. …”
    Libro electrónico
  8. 14528
    por Cook, Jim
    Publicado 2003
    Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Overview -- Chapter 1. …”
    Libro electrónico
  9. 14529
    por Chamberlain, James
    Publicado 2005
    Tabla de Contenidos: “…Front cover -- Contents -- Figures -- Tables -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction, planning, and installation -- Chapter 1. …”
    Libro electrónico
  10. 14530
    por Moore, Bill
    Publicado 2005
    Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction to business integration -- Chapter 1. …”
    Libro electrónico
  11. 14531
    por Blankertz, Wilfried
    Publicado 2005
    Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- The team who wrote the first edition of this redbook -- Become a published author -- Comments welcome -- Part 1 WebSphere Development Studio Client -- Chapter 1. …”
    Libro electrónico
  12. 14532
    por Kammermann, Markus
    Publicado 2022
    Tabla de Contenidos: “…Auflage -- Kapitel 2: Vorbereitung auf CompTIA A+ -- 2.1 Prüfen Sie Ihr Wissen -- 2.2 Fragen zu einem Computersystem -- 2.2.1 Die Front eines PC-Systems -- 2.2.2 Rückseitige Anschlüsse -- 2.2.3 Blick auf das Mainboard -- Teil I: Alles Blech oder was -- Kapitel 3: Vom Bit bis zum Personal Computer -- 3.1 Die Welt der Elektronik -- 3.1.1 Darstellung von Zahlen -- 3.1.2 Darstellung von Texten -- 3.1.3 Darstellung von Bildern -- 3.1.4 Darstellung von Tönen -- 3.2 Ganz klein und ganz groß -- 3.3 Der Personal Computer -- 3.4 Vom Laptop bis zum Smartphone -- 3.5 Smart sind die Geräte -- 3.5.1 Unterhaltung -- 3.5.2 Wearable Computer -- 3.6 Fragen zu diesem Kapitel -- Kapitel 4: Einblick in die Systemarchitektur -- 4.1 Die Systemzentrale: Der Prozessor -- 4.1.1 Single Core, Dual Core, noch mehr Core -- 4.1.2 Intel Core i und AMD Zen -- 4.1.3 Sockel für Prozessoren -- 4.1.4 Die technische Funktion der CPU -- 4.1.5 Der Cache -- 4.2 Mainboard-Komponenten -- 4.2.1 Das Chipset -- 4.2.2 Der DMA-Controller‌ -- 4.2.3 Der Interrupt-Controller‌ -- 4.2.4 Der Taktgeber‌ -- 4.2.5 Mainboard-Formfaktoren -- 4.3 Der Arbeitsspeicher -- 4.3.1 Aufbau von RAM-Bausteinen -- 4.3.2 Aktuelle RAM-Typen hören auf den Namen DDR -- 4.3.3 Single Channel, Dual Channel, Quad Channel -- 4.3.4 Bauformen -- 4.3.5 Was folgt nach DDR5? …”
    Libro electrónico
  13. 14533
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- Federated Learning -- Copyright -- Contents -- Contributors -- Preface -- 1 Optimization fundamentals for secure federated learning -- 1 Gradient descent-type methods -- 1.1 Introduction -- 1.2 Basic components of GD-type methods -- 1.2.1 Search direction -- 1.2.2 Step-size -- 1.2.3 Proximal operator -- 1.2.4 Momentum -- 1.2.5 Dual averaging variant -- 1.2.6 Structure assumptions -- 1.2.7 Optimality certification -- 1.2.8 Unified convergence analysis -- 1.2.9 Convergence rates and complexity analysis -- 1.2.10 Initial point, warm-start, and restart -- 1.3 Stochastic gradient descent methods -- 1.3.1 The algorithmic template -- 1.3.2 SGD estimators -- 1.3.3 Unified convergence analysis -- 1.4 Concluding remarks -- Acknowledgments -- References -- 2 Considerations on the theory of training models with differential privacy -- 2.1 Introduction -- 2.2 Differential private SGD (DP-SGD) -- 2.2.1 Clipping -- 2.2.2 Mini-batch SGD -- 2.2.3 Gaussian noise -- 2.2.4 Aggregation at the server -- 2.2.5 Interrupt service routine -- 2.2.6 DP principles and utility -- 2.2.7 Normalization -- 2.3 Differential privacy -- 2.3.1 Characteristics of a differential privacy measure -- 2.3.2 (ε,δ)-differential privacy -- 2.3.3 Divergence-based DP measures -- 2.4 Gaussian differential privacy -- 2.4.1 Gaussian DP -- 2.4.2 Subsampling -- 2.4.3 Composition -- 2.4.4 Tight analysis of DP-SGD -- 2.4.5 Strong adversarial model -- 2.4.6 Group privacy -- 2.4.7 DP-SGD's trade-off function -- 2.5 Future work -- 2.5.1 Using synthetic data -- 2.5.2 Adaptive strategies -- 2.5.3 DP proof: a weaker adversarial model -- 2.5.4 Computing environment with less adversarial capabilities -- References -- 3 Privacy-preserving federated learning: algorithms and guarantees -- 3.1 Introduction -- 3.2 Background and preliminaries -- 3.2.1 The FedAvg algorithm…”
    Libro electrónico
  14. 14534
    Publicado 2023
    Tabla de Contenidos: “…Front Cover -- Handbook of Metaheuristic Algorithms -- Copyright -- Contents -- List of figures -- List of tables -- List of algorithms -- List of listings -- About the authors -- Chun-Wei Tsai (1978-) -- Ming-Chao Chiang (1956-) -- Preface -- Part 1 Fundamentals -- 1 Introduction -- 1.1 Why metaheuristic algorithms -- 1.2 Organization of this book -- 2 Optimization problems -- 2.1 Problem definition -- 2.2 Combinatorial optimization problems -- 2.2.1 The one-max and 0-1 knapsack problems -- 2.2.2 The B2D and deceptive problems -- 2.2.3 The traveling salesman problem (TSP) -- 2.3 Continuous optimization problems -- 2.3.1 The single-objective optimization problem -- 2.3.2 The multi-objective optimization problem -- 2.4 Summary -- 3 Traditional methods -- 3.1 Exhaustive search (ES) -- 3.1.1 The basic idea of ES -- 3.1.2 Implementation of ES for the one-max problem -- 3.1.3 Discussion of ES -- 3.2 Hill climbing (HC) -- 3.2.1 The basic idea of HC -- 3.2.2 Implementation of HC for the one-max problem -- 3.2.2.1 Main function -- 3.2.2.2 Search function of HC -- 3.2.2.2.1 Declaration of parameters and functions -- 3.2.2.2.2 The main loop -- 3.2.2.2.3 Additional functions -- 3.2.2.3 Library function -- 3.2.3 Discussion of HC -- 3.3 Comparisons between ES and HC -- 3.3.1 Simulation results of ES and HC for the one-max problem -- 3.3.2 Simulation results of ES and HC for the deceptive problem -- 3.4 Summary of ES and HC -- Supplementary source code -- 4 Metaheuristic algorithms -- 4.1 What is a metaheuristic algorithm? …”
    Libro electrónico
  15. 14535
    Publicado 2022
    Tabla de Contenidos: “…Front Cover -- Cyber-Physical Systems: AI and COVID-19 -- Copyright Page -- Contents -- List of contributors -- 1 AI-based implementation of decisive technology for prevention and fight with COVID-19 -- 1.1 Introduction -- 1.2 Related work -- 1.3 Proposed work -- 1.3.1 Face mask detection -- 1.3.2 Detection of COVID from CT images -- 1.4 Results and analysis -- 1.4.1 Face mask detection -- 1.4.2 CT scan image-based COVID-19 patient identification -- 1.5 Conclusion -- References -- 2 Internet of Things-based smart helmet to detect possible COVID-19 infections -- 2.1 Introduction -- 2.1.1 Epidemiology -- 2.1.2 Treatment -- 2.1.3 Prevention -- 2.1.4 Symptoms -- 2.1.5 Stages of COVID-19 -- 2.1.6 Key merits of IoT for COVID-19 pandemic -- 2.1.7 Internet of Things process required for COVID-19 -- 2.1.8 IoT applications for COVID-19 -- 2.2 Related work -- 2.3 IoT-based smart helmet to detect the infection of COVID-19 -- 2.3.1 Objective -- 2.3.2 Methodology -- 2.3.2.1 Efficiency of smart helmet -- 2.3.2.2 Components of smart helmet -- 2.3.2.2.1 Thermal camera -- 2.3.2.2.2 Optical camera -- 2.3.2.2.3 Arduino Integrated Development Environment (IDE) -- 2.3.2.2.4 Proteus software -- 2.3.2.2.5 Google Location History -- 2.4 Conclusion -- References -- 3 Role of mobile health in the situation of COVID-19 pandemics: pros and cons -- 3.1 Introduction -- 3.2 Implementation of a training module for the mHealth care worker -- 3.3 Government policies for the scale-up of the mHealth services -- 3.4 Popular models of mHealth serving for pandemic COVID-19 -- 3.5 Ethical consideration -- 3.6 Superiority of mHealth services over other available services -- 3.7 Probability of conflict of interest between user and service provider -- 3.8 Legal consideration -- 3.9 Protection of privacy of end-users -- 3.10 Conclusion -- 3.11 Future prospects -- References…”
    Libro electrónico
  16. 14536
    Publicado 2022
    Tabla de Contenidos: “…Front Cover -- 5G IoT and Edge Computing for Smart Healthcare -- Copyright Page -- Contents -- List of contributors -- 1 Edge-IoMT-based enabled architecture for smart healthcare system -- 1.1 Introduction -- 1.2 Applications of an IoMT-based system in the healthcare industry -- 1.3 Application of edge computing in smart healthcare systems -- 1.4 Challenges of using edge computing with IoMT-based system in smart healthcare system -- 1.5 The framework for edge-IoMT-based smart healthcare system -- 1.6 Case study for the application of edge-IoMT-based systems enabled for the diagnosis of diabetes mellitus -- 1.6.1 Experimental results -- 1.7 Future prospects of edge computing for internet of medical things -- 1.8 Conclusions and future research directions -- References -- 2 Physical layer architecture of 5G enabled IoT/IoMT system -- 2.1 Architecture of IoT/IoMT system -- 2.1.1 Sensor layer -- 2.1.2 Gateway layer -- 2.1.3 Network layer -- 2.1.4 Visualization layer -- 2.2 Consideration of uplink healthcare IoT system relying on NOMA -- 2.2.1 Introduction -- 2.2.2 System model -- 2.2.3 Outage probability for UL NOMA -- 2.2.3.1 Outage probability of x1 -- 2.2.3.2 Outage probability of X2 -- 2.2.3.3 Asymptotic -- 2.2.4 Ergodic capacity of UL NOMA -- 2.2.5 Numerical results and discussions -- 2.3 Conclusions -- References -- 3 HetNet/M2M/D2D communication in 5G technologies -- 3.1 Introduction -- 3.2 Heterogenous networks in the era of 5G -- 3.2.1 5G mobile communication standards and enhanced features -- 3.2.2 5G heterogeneous network architecture -- 3.2.3 Intelligent software defined network framework of 5G HetNets -- 3.2.4 Next-Gen 5G wireless network -- 3.2.5 Internet of Things toward 5G and heterogenous wireless networks -- 3.2.6 5G-HetNet H-CRAN fronthaul and TWDM-PON backhaul: QoS-aware virtualization for resource management…”
    Libro electrónico
  17. 14537
    Publicado 2025
    Tabla de Contenidos: “…Front Cover -- Graph Based Multimedia Analysis -- Copyright -- Contents -- List of figures -- List of tables -- Biography -- Foreword -- Preface -- 1 Introduction -- 1.1 Motivation -- 1.2 Chapter organization -- 1.3 Basics of multimedia -- 1.4 Preliminaries of a video -- 1.5 Multimedia problems -- 1.6 Graph based solutions -- 1.7 Other solution models -- 1.8 Organization of the book -- References -- 2 Theoretical foundations -- 2.1 Motivation -- 2.2 Organization -- 2.3 Graph basics -- 2.4 Delaunay graph -- 2.5 Bipartite graph -- 2.6 Minimum spanning tree -- 2.7 Optimum path forest -- 2.8 Random walks on a graph -- 2.9 Knapsack problems -- 2.10 Elementary game theory -- References -- 3 Exocentric video summarization -- 3.1 Motivation -- 3.2 Chapter organization -- 3.3 Related works -- 3.3.1 Related works for exocentric video summarization -- 3.3.2 Related works for scalable exocentric video summarization -- 3.4 Method I: Delaunay graph based solutions for exocentric video summarization -- 3.4.1 Method IA: Constrained Delaunay graph clustering based summary -- 3.4.1.1 Video frame presampling -- 3.4.1.2 Feature extraction -- 3.4.1.3 Elimination of redundant frames -- 3.4.1.4 Delaunay graph based constrained clustering -- 3.4.1.5 Key frame extraction -- 3.4.2 Method IB: Delaunay graph based summary with user customization -- 3.4.3 Method IC: Delaunay graph based summary in enhanced feature space -- 3.5 Method II: A graph modularity based clustering for exocentric video summarization -- 3.5.1 Compressed domain feature extraction -- 3.5.2 Multi-feature fusion -- 3.5.3 Graph modularity based clustering -- 3.5.4 Key frame extraction -- 3.6 Scalable exocentric video summarization with skeleton graph and random walk -- 3.6.1 Extraction of skeleton graph -- 3.6.2 Clustering of skeleton graph via MST -- 3.6.3 Label propagation with random walks…”
    Libro electrónico
  18. 14538
    por Khare, Vikas
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- Cognitive Science, Computational Intelligence, and Data Analytics -- Copyright Page -- Contents -- Foreword -- Overview of the book -- 1 Foundation of analytics -- Abbreviations -- 1.1 Introduction -- 1.2 Concepts of analytics -- 1.2.1 Descriptive analytics -- 1.2.1.1 Five steps in descriptive analytics -- 1.2.1.1.1 State business metrics -- 1.2.1.1.2 Identify data required -- 1.2.1.1.3 Extract and prepare data -- 1.2.1.1.4 Analyze data -- 1.2.1.1.5 Present data -- 1.2.1.2 Use case of descriptive analytics -- 1.2.1.3 Advantages of descriptive analytics -- 1.2.1.4 Disadvantages of descriptive analytics -- 1.2.2 Diagnostic analytics -- 1.2.2.1 Use case of diagnostic analytics -- 1.2.2.2 Advantages of diagnostic analytics -- 1.2.2.3 Disadvantages of diagnostic analytics -- 1.2.3 Predictive analytics -- 1.2.3.1 Use cases of predictive analytics -- 1.2.3.2 Advantages of predictive analytics -- 1.2.3.3 Disadvantages of predictive analytics -- 1.2.4 Prescriptive analytics -- 1.2.4.1 Use case of prescriptive analytics -- 1.2.4.2 Advantages of prescriptive analytics -- 1.2.4.3 Disadvantages of prescriptive analytics -- 1.3 Emerging areas of analytics -- 1.3.1 Data analysis -- 1.3.1.1 Process of data analysis -- 1.3.2 Business analytics -- 1.3.2.1 Common component of business analytics -- 1.3.3 Web analytics and web scrapping -- 1.3.3.1 Use case of web analytics -- 1.3.4 Big data analysis -- 1.3.4.1 Key big data analytics technologies and tools -- 1.3.4.2 Use case of big data analysis -- 1.3.4.3 Advantages of big data analysis -- 1.3.4.4 Disadvantages of big data analysis -- 1.4 Value chain analysis -- 1.4.1 Component of value chain analysis -- 1.4.2 How to conduct value chain analysis? …”
    Libro electrónico
  19. 14539
    por Pazzini, Adalberto
    Publicado 1955
    Libro
  20. 14540
    Publicado 2016
    Tabla de Contenidos: “…Front matter -- Índice -- Presentación -- El album de fotos / Bibliografía de José Antonio Pascual -- Diccionarios -- Nuestros primeros diccionarios etimológicos / La etimología en el DEM, con una breve descripción del «Fichero etimológico» en el Archivo del DEM / Palabras prestadas. …”
    Libro electrónico