Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,115
- Development 1,048
- Historia 949
- Application software 932
- Management 862
- History 855
- Computer programs 812
- Computer Science 774
- Data processing 585
- Artificial intelligence 518
- Leadership 474
- Python (Computer program language) 457
- Computer networks 417
- Business 415
- Business & Economics 414
- Operating systems (Computers) 396
- Web site development 389
- Programming 385
- Design 380
- Social aspects 375
- Computer programming 361
- Power resources 356
- Política y gobierno 343
- Cloud computing 340
- Electrónica 339
- Web sites 333
- Politics and government 330
- Database management 328
- Machine learning 317
- Java (Computer program language) 300
-
32181Publicado 2020“…The papers selected exhibit latest advancements in a variety of topics in physical design, including emerging challenges for current and future process technologies, FPGA architectures, placement, detailed routing, floorplanning and interconnect planning, partitioning techniques, manufacturability and yield optimization, timing and crosstalk issues, analysis and management of power dissipation, hardware security, placement and routing approaches of networks on chips, gate sizing and clock skew scheduling, and application of machine-learning based techniques to physical design. …”
Libro electrónico -
32182Publicado 2022“…The ISPD 2022 program is complemented by invited talks on topics ranging across analog design automation; 3D IC design; packaging; and advanced algorithmic techniques for performance optimization and power minimization such as machine learning and Lagrangian relaxation. …”
Libro electrónico -
32183Publicado 2023“…What you will learn Use GNNs to build feature-rich graphs for bot detection and engineer graph-powered embeddings and features Discover how to apply ML techniques in the cybersecurity domain Apply state-of-the-art algorithms such as transformers and GNNs to solve security-related issues Leverage ML to solve modern security issues such as deep fake detection, machine-generated text identification, and stylometric analysis Apply privacy-preserving ML techniques and use differential privacy to protect user data while training ML models Build your own portfolio with end-to-end ML projects for cybersecurity Who this book is for This book is for machine learning practitioners interested in applying their skills to solve cybersecurity issues. …”
Libro electrónico -
32184Publicado 2023“…By the end of this game development book, you'll have gained a better understanding of Godot 4 and will be equipped with various powerful techniques to enhance your Godot game development efficiency. …”
Libro electrónico -
32185por Canadian Agency for Drugs and Technologies in Health“…The manufacturer noted that the broader (full trial) population was used to develop predictive functions to avoid breaking randomization and avoid reducing the predictive power of the risk equations from a smaller sample size. …”
Publicado 2017
Libro electrónico -
32186por Geier, Eric, 1984-“…We show you how to harness the power of Vista while keeping the look and feel of your XP. …”
Publicado 2008
Libro electrónico -
32187Publicado 2008“…• How to download and install applications from Apple's online App Store • The key trouble-shooting tips you've got to know • How to get your favorite photos onto your iPhone, tips for using its built-in camera, and how to make the most of the iPhone's surprisingly powerful photo features • The tips you've got to know to use your iPhone's built-in iPod features, including watching videos, podcasts, TV shows and movies (you're going to amazed at some of the cool things you can do) • How to use the iPhone's built-in applications to organize your life (you'll learn things in this chapter you didn't know the iPhone could do!) …”
Libro electrónico -
32188por Finke, Joshua Samuel“…To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. n Understand Cisco Unified Communications Manager architecture and components n Evaluate CUCM deployment models n Set up and configure CUCM services n Implement and harden IP phones n Manage user accounts n Configure Catalyst(R) switches for power over Ethernet and voice VLAN requirements n Deploy MGCP and H.323 gateways n Configure call routing and digit manipulation n Set up calling privileges and call coverage n Deploy various media resources, features, and applications n Establish Presence-enabled speed dials and lists n Implement Cisco Unified Manager Assistant and Cisco Unified Mobile This volume is in the Foundation Learning Guide Series offered by Cisco Press(R). …”
Publicado 2011
Libro electrónico -
32189Publicado 2020“…After all, theories have a genuine heuristic power, theories make visible, they open doors, they let us understand something anew. …”
Libro electrónico -
32190Publicado 2020“…Code used in the book is provided to help you understand the concepts in practice and write your own web crawler to power your business ideas. You will: Understand web scraping, its applications/uses, and how to avoid web scraping by hitting publicly available rest API endpoints to directly get data Develop a web scraper and crawler from scratch using lxml and BeautifulSoup library, and learn about scraping from JavaScript-enabled pages using Selenium Use AWS-based cloud computing with EC2, S3, Athena, SQS, and SNS to analyze, extract, and store useful insights from crawled pages Use SQL language on PostgreSQL running on Amazon Relational Database Service (RDS) and SQLite using SQLalchemy Review sci-kit learn, Gensim, and spaCy to perform NLP tasks on scraped web pages such as name entity recognition, topic clustering (Kmeans, Agglomerative Clustering), topic modeling (LDA, NMF, LSI), topic classification (naive Bayes, Gradient Boosting Classifier) and text similarity (cosine distance-based nearest neighbors) Handle web archival file formats and explore Common Crawl open data on AWS Illustrate practical applications for web crawl data by building a similar website tool and a technology profiler similar to builtwith.com Write scripts to create a backlinks database on a web scale similar to Ahrefs.com, Moz.com, Majestic.com, etc., for search engine optimization (SEO), competitor research, and determining website domain authority and ranking Use web crawl data to build a news sentiment analysis system or alternative financial analysis covering stock market trading signals Write a production-ready crawler in Python using Scrapy framework and deal with practical workarounds for Captchas, IP rotation, and more…”
Libro electrónico -
32191Publicado 2019“…In course No. 5, I will present fuzzing, which is one of the most powerful vulnerability detection techniques, and I’ll show you how you c..…”
-
32192Publicado 2013“…Paul DuBois' MySQL , Fifth Edition, is the definitive guide to fully exploiting all the power and versatility of MySQL 5.5 and MySQL 5.6 Contents at a Glance Part I: General MySQL Use Chapter 1 Getting Started with MySQL Chapter 2 Using SQL to Manage Data Chapter 3 Data Types Chapter 4 Views and Stored Programs Chapter 5 Query Optimization Part II: Using MySQL Programming Interfaces Chapter 6 Introduction to MySQL Programming Chapter 7 Writing MySQL Programs Using C Chapter 8 Writing MySQL Programs Using Perl DBI Chapter 9 Writing MySQL Programs Using PHP Part III: MySQL Administration Chapter 10 Introduction to MySQL Administration Chapter 11 The MySQL Data Directory Chapter 12 General MySQL Administration Chapter 13 Security and Access Control Chapter 14 Database Maintenance, Backups, and Replication Part IV: Appendixes Appendix A Software Required to Use This Book Appendix B Data Type Reference Appendix C Operator and Function Reference Appendix D System, Status, and User Variable Reference Appendix E SQL Syntax Reference Appendix F MySQL Program Reference Appendix G C API Reference Appendix H Perl DBI API Reference Appendix I PHP API Reference…”
Libro electrónico -
32193Publicado 2022“…What you will learn Load data into BigQuery and materialize its output for downstream consumption Build data pipeline orchestration using Cloud Composer Develop Airflow jobs to orchestrate and automate a data warehouse Build a Hadoop data lake, create ephemeral clusters, and run jobs on the Dataproc cluster Leverage Pub/Sub for messaging and ingestion for event-driven systems Use Dataflow to perform ETL on streaming data Unlock the power of your data with Data Studio Calculate the GCP cost estimation for your end-to-end data solutions Who this book is for This book is for data engineers, data analysts, and anyone looking to design and manage data processing pipelines using GCP. …”
Libro electrónico -
32194
Grabación musical -
32195Publicado 2000“…This generation has to stand on its own in its attempts to transform the social inheritance and it lives in a feeling of being driven by the power of social change. There is also a methodological purpose connected with this study. …”
Libro electrónico -
32196Publicado 2022“…This includes ArcGIS professionals, intermediate ArcGIS Pro users, ArcGIS Pro power users, students, and people who want to move from being a GIS Technician to GIS Analyst; GIS Analyst to GIS Programmer; or GIS Developer/Programmer to a GIS Architect. …”
Libro electrónico -
32197por Tan, Zhiyong“…Fortunately, with a little careful prep work you can turn those open-ended questions and whiteboard sessions into your competitive advantage! In this powerful book, Zhiyong Tan reveals practical interview techniques and insights about system design that have earned developers job offers from Amazon, Apple, ByteDance, PayPal, and Uber. …”
Publicado 2024
Libro electrónico -
32198Publicado 2005“…Even if everyone agrees that the concept of 'empowerment' refers to notions of choice, of power and of change, the diversity of definitions suggested here confirms that under no circumstances does a universal conception of it exist. …”
Libro electrónico -
32199Publicado 2023“…Throughout the course, you will harness the power of rendering in both Eevee and Cycles X, unleashing the full potential of Blender's capabilities. …”
Video -
32200Publicado 2023“…By the end of this book, you will have gained comprehensive knowledge about EDA and mastered the powerful set of EDA techniques and tools required for analyzing both structured and unstructured data to derive valuable insights. …”
Libro electrónico