Mostrando 2,501 - 2,520 Resultados de 2,927 Para Buscar '"Vector"', tiempo de consulta: 0.15s Limitar resultados
  1. 2501
    Publicado 2017
    Tabla de Contenidos: “…Compiler Phase Selection and Ordering -- 6.4. Loop Vectorization -- 6.5. Shared Memory (Multicore) -- 6.6. …”
    Libro electrónico
  2. 2502
    Publicado 2023
    Tabla de Contenidos: “…Virtualization -- Serverless -- High-Performance Computing (HPC) and Grid Computing -- Peer-to-Peer -- Thin Clients -- Diskless Workstations -- Thin Client Applications -- Embedded Systems and The Internet of Things (IoT) -- Distributed Systems and Edge Computing Systems -- Industrial Control Systems (ICS) -- System Vulnerabilities, Threats, and Countermeasures -- Emanations -- Covert Channels -- Covert Storage Channels -- Covert Timing Channels -- Backdoors -- Malicious Code (Malware) -- Computer Viruses -- Worms -- Trojans -- Rootkits -- Packers -- Logic Bombs -- Antivirus Software -- Server-Side Attacks -- Client-Side Attacks -- Web Architecture and Attacks -- Applets -- Java -- ActiveX -- OWASP -- XML -- Service Oriented Architecture (SOA) -- Database Security -- Polyinstantiation -- Inference and Aggregation -- Inference and Aggregation Controls -- Data Mining -- Data Analytics -- Countermeasures -- Mobile Device Attacks -- Mobile Device Defenses -- Cornerstone Cryptographic Concepts -- Key Terms -- Confidentiality, Integrity, Authentication, and Non-repudiation -- Confusion, Diffusion, Substitution, and Permutation -- Cryptographic Strength -- Monoalphabetic and Polyalphabetic Ciphers -- Modular Math -- Exclusive Or (XOR) -- Data at Rest and Data in Motion -- Protocol Governance -- Types of Cryptography -- Symmetric Encryption -- Stream and Block Ciphers -- Initialization Vectors and Chaining -- DES -- Modes of DES -- Electronic Code Book (ECB) -- Cipher Block Chaining (CBC) -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode (CTR) -- Single DES -- Triple DES -- International Data Encryption Algorithm (IDEA) -- Advanced Encryption Standard (AES) -- Choosing AES…”
    Libro electrónico
  3. 2503
    Publicado 2022
    Tabla de Contenidos: “…. -- There's more... -- Plotting vector fields with quiver plots -- Getting ready -- How to do it... -- How it works... -- There's more... -- Further reading -- Chapter 3: Calculus and Differential Equations -- Technical requirements -- Primer on calculus -- Working with polynomials and calculus -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Differentiating and integrating symbolically using SymPy -- Getting ready…”
    Libro electrónico
  4. 2504
    Publicado 2023
    Tabla de Contenidos: “…Continuous integration/continuous delivery (CI/CD) -- Migrating to cloud databases -- Database Migration Service -- System, query, and performance insights -- Summary -- Part 5: DevOps and Databases -- 9 -- Data to AI - Modeling Your Databases for Analytics and ML -- Modeling considerations for analytics, AI, and ML -- Data to AI -- Google Cloud ETL services -- Google Cloud Dataflow at a glance -- Real-world use cases for Google Cloud Dataflow -- Step-by-step guide to Google Cloud Dataflow -- Taking your data to AI -- Summary -- 10 -- Looking Ahead - Designing for LLM Applications -- Capturing the evolution of LLMs -- Getting started with LLMs -- Understanding the underlying principles of LLMs -- Comparing real-world applications of LLMs and traditional analytics -- Understanding the differences in data modeling for traditional analytics and LLMs -- Data model design considerations for applications that use LLMs -- Learning about data modeling principles and techniques -- Ethical and responsible practices -- Hands-on time - building an LLM application -- Step 1 - create a table -- Step 2 - insert data into the table -- Step 3 - create an external connection for BigQuery to access the Vertex AI model -- Step 4 - grant permissions to the service account to access the Vertex AI service -- Step 5 - create the remote model in BigQuery -- Step 6 - query the dataset -- Step 7 - generate text (create an LLM application) using only SQL -- Vector databases -- Summary -- Onward and upward! …”
    Libro electrónico
  5. 2505
    Publicado 2023
    Tabla de Contenidos: “…Chapter 15: Understanding Monetization Techniques -- Basics of F2P monetization -- Vectors of monetization -- Time -- Difficulty -- Playable content -- Non-playable content -- In-game advertisements -- Establishing a game economy -- Adjusting the monetization strategy -- Balancing player progression -- Gacha -- Weight-based loot tables -- Packaging and opening -- Maintaining consistency -- Kompu gacha -- Box gacha -- Bundles and targeting -- Adjusting your offering based on individual player spending -- Purchase rationalization -- Evaluate your audience! …”
    Libro electrónico
  6. 2506
    por Subrata, Ghoshal
    Publicado 2002
    Tabla de Contenidos: “…Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- External Interrupts -- Introduction -- What is an Interrupt? -- Vectored Interrupt -- External Interrupts of 8051 -- Sfrs for External Interrupt -- Tcon -- Ie -- Interrupt Service Routine -- Checklist for Into -- Checklist for Int1 -- Software Interrupts -- Benefits of Interrupt -- Solved Examples -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Timer/Counter Interrupts -- Purpose of a Timer -- Differences Between a Timer and a Counter -- 8051/52 Timers -- Serial Communication and Serial Interrupts -- Introduction -- Serial and Parallel Communications -- Simplex, Full-Duplex and Half-Duplex Communications -- Synchronous and Asynchronous Communications -- Overview of Serial Communication -- How Serial Communication Works -- Serial Data Format -- Baud Rate -- Serial Communication Sfrs -- Sbuf -- Scon -- Pcon -- Modes of Serial Communication -- Mode 0 -- Mode 1 -- Mode 2 -- Mode 3 -- Serial Communication Issues -- Multiprocessor Communication -- Role of Timer in Baud-Rate Generation -- Why 11.0592 MHz? …”
    Libro electrónico
  7. 2507
    Publicado 2001
    Tabla de Contenidos: “…Hardware Handling of Interrupts and Exceptions -- Nested Execution of Exception and Interrupt Handlers -- Initializing the Interrupt Descriptor Table -- Interrupt, Trap, and System Gates -- Preliminary Initialization of the IDT -- Exception Handling -- Saving the Registers for the Exception Handler -- Entering and Leaving the Exception Handler -- Interrupt Handling -- I/O Interrupt Handling -- Interrupt vectors -- IRQ data structures -- IRQ distribution in multiprocessor systems -- Multiple Kernel Mode stacks -- Saving the registers for the interrupt handler -- The do_IRQ( ) function -- The _ _do_IRQ( ) function -- Reviving a lost interrupt -- Interrupt service routines -- Dynamic allocation of IRQ lines -- Interprocessor Interrupt Handling -- Softirqs and Tasklets -- Softirqs -- Data structures used for softirqs -- Handling softirqs -- The do_softirq( ) function -- The _ _do_softirq( ) function -- The ksoftirqd kernel threads -- Tasklets -- Work Queues -- Work queue data structures -- Work queue functions -- The predefined work queue -- Returning from Interrupts and Exceptions -- The entry points -- Resuming a kernel control path -- Checking for kernel preemption -- Resuming a User Mode program -- Checking for rescheduling -- Handling pending signals, virtual-8086 mode, and single stepping -- Kernel Synchronization -- How the Kernel Services Requests -- Kernel Preemption -- When Synchronization Is Necessary -- When Synchronization Is Not Necessary -- Synchronization Primitives -- Per-CPU Variables -- Atomic Operations -- Optimization and Memory Barriers -- Spin Locks -- The spin_lock macro with kernel preemption -- The spin_lock macro without kernel preemption -- The spin_unlock macro -- Read/Write Spin Locks -- Getting and releasing a lock for reading -- Getting and releasing a lock for writing -- Seqlocks -- Read-Copy Update (RCU) -- Semaphores…”
    Libro electrónico
  8. 2508
    Publicado 2013
    Tabla de Contenidos: “…Technical Controls -- Summary -- References -- Chapter 2: Risk Analysis -- Threat Definition -- Threat Vectors -- Threat Sources and Targets -- Types of Attacks -- Malicious Mobile Code -- Advanced Persistent Threats (APTs) -- Manual Attacks -- Risk Analysis -- Summary -- References -- Chapter 3: Compliance with Standards, Regulations, and Laws -- Information Security Standards -- COBIT -- ISO 27000 Series -- NIST -- Regulations Affecting Information Security Professionals -- The Duty of Care -- Gramm-Leach-Bliley Act (GLBA) -- Sarbanes-Oxley Act -- HIPAA Privacy and Security Rules -- NERC CIP -- PCI DSS: Payment Card Industry Data Security Standard -- Laws Affecting Information Security Professionals -- Hacking Laws -- Electronic Communication Laws -- Other Substantive Laws -- Summary -- References -- Chapter 4: Secure Design Principles -- The CIA Triad and Other Models -- Confidentiality -- Integrity -- Availability -- Additional Concepts -- Defense Models -- The Lollipop Model -- The Onion Model -- Zones of Trust -- Best Practices for Network Defense -- Secure the Physical Environment -- Harden the Operating System -- Keep Patches Updated -- Use an Antivirus Scanner (with Real-Time Scanning)…”
    Libro electrónico
  9. 2509
    Publicado 2013
    Tabla de Contenidos: “…Science Fundamentals -- Measurements -- Length and Distance -- Area -- Volume and Capacity -- Weight -- Other Units of Measurement -- Gravity, Weight, and Mass -- Density -- Specific Gravity -- Speed -- Velocity -- Force and Motion -- Units of Force -- Newton's First Law of Motion -- Newton's Second Law of Motion -- Friction -- Newton's Third Law of Motion -- Thrust -- Momentum -- Centrifugal and Centripetal Force -- Composition and Resolution of Forces -- Vectors -- Work, Energy, and Power -- Work -- Energy -- Power -- Machines -- Lever -- Pulleys -- Gears and Pulleys -- Inclined Plane -- Screw -- Compound Machines -- Heat -- Measuring Temperature -- Effects of Heat -- Specific Heat -- Change of State -- Expansion -- Laws of Thermodynamics -- Heat Transfer -- Conduction -- Convection -- Radiation -- Effects of Heat on Aircraft Materials -- Fluids -- Properties of Liquids -- Viscosity -- Archimedes' Principle…”
    Libro electrónico
  10. 2510
    Publicado 2022
    Tabla de Contenidos: “…Objective -- Strategy -- Example -- Case study 3 - CTI for Level 3 organizations -- Objective -- Strategy -- Example -- Installing the MISP platform (optional) -- Summary -- Section 2: Cyber Threat Analytical Modeling and Defensive Mechanisms -- Chapter 6: Cyber Threat Modeling and Adversary Analysis -- Technical requirements -- The strategic threat modeling process -- Identifying and decomposing assets -- Adversaries and threat analysis -- Attack surfaces and threat vectors -- Adversary analysis use case - Twisted Spider -- Identifying countermeasures -- System re-evaluation -- Threat modeling methodologies -- Threat modeling with STRIDE -- Threat modeling with NIST -- Threat modeling use case -- Equifax data breach summary -- Threat modeling for ABCompany -- Advanced threat modeling with SIEM -- User behavior logic -- Benefits of UBA -- UBA selection guide - how it works -- Adversary analysis techniques -- Adversary attack preparation -- Attack preparation countermeasures -- Adversary attack execution -- Attack execution mitigation procedures -- Summary -- Chapter 7: Threat Intelligence Data Sources -- Technical requirements -- Defining the right sources for threat intelligence -- Internal threat intelligence sources -- External threat intelligence sources -- Organization intelligence profile -- Threat feed evaluation -- Threat data quality assessment -- Open Source Intelligence Feeds (OSINT) -- Benefits of open source intelligence -- Open source intelligence portals -- OSINT platform data insights (OSINT framework) -- OSINT limitations and drawbacks -- Malware data for threat intelligence -- Benefits of malware data collection -- Malware components -- Malware data core parameters -- Other non-open source intelligence sources -- Benefits of paid intelligence -- Paid threat intelligence challenges -- Some paid intelligence portals…”
    Libro electrónico
  11. 2511
    por Bordas, St¿phane P. A.
    Publicado 2023
    Tabla de Contenidos: “…8.2 Conventional BEM Formulation -- 8.2.1 Elasticity -- 8.2.2 Helmholtz Wave Problems -- 8.3 Shortcomings of the Conventional Formulations -- 8.4 Partition of Unity BEM Formulation -- 8.5 XBEM for Accurate Fracture Analysis -- 8.5.1 Williams Expansions -- 8.5.2 Local XBEM Enrichment at Crack Tips -- 8.5.3 Results -- 8.5.4 Auxiliary Equations and Direct Evaluation of Stress Intensity Factors -- 8.5.5 Fracture in Anisotropic Materials -- 8.5.6 Conclusions -- 8.6 XBEM for Short Wave Simulation -- 8.6.1 Background to the Development of Plane Wave Enrichment -- 8.6.2 Plane Wave Enrichment -- 8.6.3 Evaluation of Boundary Integrals -- 8.6.4 Collocation Strategy and Solution -- 8.6.5 Results -- 8.6.6 Choice of Basis Functions -- 8.6.7 Scattering from Sharp Corners -- 8.7 Conditioning and its Control -- 8.8 Conclusions -- References -- 9 Combined Extended Finite Element and Level Set Method (XFE-LSM) for Free Boundary Problems -- 9.1 Motivation -- 9.2 The Level Set Method -- 9.2.1 The Level Set Representation of the Embedded Interface -- 9.2.2 The Basic Level Set Evolution Equation -- 9.2.3 Velocity Extension -- 9.2.4 Level Set Function Update -- 9.2.5 Coupling the Level Set Method with the XFEM -- 9.3 Biofilm Evolution -- 9.3.1 Biofilms -- 9.3.2 Biofilm Modeling -- 9.3.3 Two-Dimensional Model -- 9.3.4 Solution Strategy -- 9.3.5 Variational Form -- 9.3.6 Enrichment Functions -- 9.3.7 Interface Conditions -- 9.3.8 Interface Speed Function -- 9.3.9 Accuracy and Convergence -- 9.3.10 Numerical Results -- 9.4 Conclusion -- Acknowledgment -- References -- 10 XFEM for 3D Fracture Simulation -- 10.1 Introduction -- 10.2 Governing Equations -- 10.3 XFEM Enrichment Approximation -- 10.4 Vector Level Set -- 10.5 Computation of Stress Intensity Factor -- 10.5.1 Brittle Material -- 10.5.2 Ductile Material -- 10.6 Numerical Simulations…”
    Libro electrónico
  12. 2512
    por Dave, Parag H.
    Publicado 1900
    Tabla de Contenidos: “…Efficiency of Recursion -- Complexity -- The Notion of Complexity -- Profiling -- Suppressing Multiplicative Constants -- Counting Dominant Operations -- Growth-Rate -- Upper Bounds -- Asymptotic Growth-Rate -- The 'O' Notation -- Discussion -- Simplified Definition of 'O' -- 'O' Notation Rules -- Analyzing Growth of Exotic Functions -- Derivative Rule -- Order-of-Magnitude Comparisons -- Doubling Comparisons -- Estimating Complexity Experimentally -- Experimental comparison of sorting procedures -- Key Terms -- Summary -- Exercises -- Web Resources -- Examples of Complexity Calculation -- Objectives -- Examples from the Sorting World -- Bucket Sort -- Radix Sort -- Simple Insertion Sort -- Quick Sort -- Heap sort-using a Tree to Sort -- Merge Sort -- Summary of Complexity and Characteristics of Sorting Algorithms -- Complexity of Set Operations and Mappings -- Sets Implementation Using an Unordered Array -- Binary Search Principle -- Binary Search Trees -- Bit Vectors -- Analysis Of Hashing -- The Trie Principle -- Sets vs. …”
    Libro electrónico
  13. 2513
    Publicado 2019
    Tabla de Contenidos: “…Review 2: Matrices and Vectors -- 9.4. Linear Systems in Normal Form -- 9.5. …”
    Libro electrónico
  14. 2514
    Publicado 2024
    Tabla de Contenidos: “…-- Understanding IoT communication -- IoT communication layers -- IoT communication models -- IoT communication protocols -- Attack vectors for IoT devices -- Access control -- Firmware attacks -- Web attacks -- Network service/communication protocol attacks -- Unencrypted local data storage -- Confidentiality and integrity issues -- Cloud computing attacks -- Malicious updates -- Insecure APIs -- Mobile application threats -- Other attacks -- An IoT hacking methodology -- Understanding OT -- An OT hacking methodology -- Best practices for securing IoT/OT -- Lab - discovering IoT devices -- Summary -- Assessment…”
    Libro electrónico
  15. 2515
    Publicado 2024
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - A Whirlwind of Stable Diffusion -- Chapter 1: Introducing Stable Diffusion -- Evolution of the Diffusion model -- Before Transformer and Attention -- Transformer transforms machine learning -- CLIP from OpenAI makes a big difference -- Generate images -- DALL-E 2 and Stable Diffusion -- Why Stable Diffusion -- Which Stable Diffusion to use -- Why this book -- References -- Chapter 2: Setting Up the Environment for Stable Diffusion -- Hardware requirements to run Stable Diffusion -- GPU -- System memory -- Storage -- Software requirements -- CUDA installation -- Installing Python for Windows, Linux, and macOS -- Installing PyTorch -- Running a Stable Diffusion pipeline -- Using Google Colaboratory -- Using Google Colab to run a Stable Diffusion pipeline -- Summary -- References -- Chapter 3: Generating Images Using Stable Diffusion -- Logging in to Hugging Face -- Generating an image -- Generation seed -- Sampling scheduler -- Changing a model -- Guidance scale -- Summary -- References -- Chapter 4: Understanding the Theory Behind Diffusion Models -- Understanding the image-to-noise process -- A more efficient forward diffusion process -- The noise-to-image training process -- The noise-to-image sampling process -- Understanding Classifier Guidance denoising -- Summary -- References -- Chapter 5: Understanding How Stable Diffusion Works -- Stable Diffusion in latent space -- Generating latent vectors using diffusers -- Generating text embeddings using CLIP -- Initializing time step embeddings -- Initializing the Stable Diffusion UNet -- Implementing a text-to-image Stable Diffusion inference pipeline -- Implementing a text-guided image-to-image Stable Diffusion inference pipeline -- Summary -- References…”
    Libro electrónico
  16. 2516
    por Uccelli, Arturo
    Publicado 1945
    Libro
  17. 2517
    Publicado 2018
    Tabla de Contenidos: “…10.2.2.2 OLSR-FastSync 259 -- 10.2.2.3 Ad Hoc on-Demand Distance Vector and Mesh and Mesh Networks with MObility Management (AODV-MEMO) 260 -- 10.2.2.4 Mobile Party 263 -- 10.2.2.5 Wireless Mesh Mobility Management (WMM) 264 -- 10.2.2.6 LMMesh 265 -- 10.2.2.7 Forward Pointer-Based Routing (FPBR) 266 -- 10.2.3 Multicasting-Based Scheme 267 -- 10.2.3.1 SMesh 267 -- 10.3 Advantages and Disadvantages 268 -- 10.4 Open Research Issues 279 -- 10.5 Conclusion 280 -- Acknowledgement 280 -- References 280 -- 11 TowardsMulti-Operator IPTV Services Over 5G Networks 283 /Gergely Biczók, Manos Dramitinos, Håkon Lønsethagen, LuisM. …”
    Libro electrónico
  18. 2518
    por Rodrigañez, Eduardo
    Publicado 1947
    Libro
  19. 2519
    por Gómez Perretta, C.
    Publicado 1951
    Libro
  20. 2520
    por Bricard, Raoul
    Publicado 1955
    Libro