Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Machine learning 125
- Computer graphics 121
- Data processing 111
- Python (Computer program language) 109
- Artificial intelligence 106
- Engineering & Applied Sciences 80
- Security measures 77
- Computer networks 74
- Mathematics 74
- Science 70
- Computer security 69
- Development 64
- R (Computer program language) 64
- Design 62
- Ciencias 60
- Programming 60
- Computer programs 59
- Digital techniques 55
- Application software 54
- Data mining 53
- General 51
- machine learning 45
- History of engineering & technology 44
- Mathematical models 44
- Computer programming 41
- Web sites 40
- Technology: general issues 39
- Research & information: general 38
- support vector machine 38
- Image processing 37
-
2501Publicado 2017Tabla de Contenidos: “…Compiler Phase Selection and Ordering -- 6.4. Loop Vectorization -- 6.5. Shared Memory (Multicore) -- 6.6. …”
Libro electrónico -
2502Publicado 2023Tabla de Contenidos: “…Virtualization -- Serverless -- High-Performance Computing (HPC) and Grid Computing -- Peer-to-Peer -- Thin Clients -- Diskless Workstations -- Thin Client Applications -- Embedded Systems and The Internet of Things (IoT) -- Distributed Systems and Edge Computing Systems -- Industrial Control Systems (ICS) -- System Vulnerabilities, Threats, and Countermeasures -- Emanations -- Covert Channels -- Covert Storage Channels -- Covert Timing Channels -- Backdoors -- Malicious Code (Malware) -- Computer Viruses -- Worms -- Trojans -- Rootkits -- Packers -- Logic Bombs -- Antivirus Software -- Server-Side Attacks -- Client-Side Attacks -- Web Architecture and Attacks -- Applets -- Java -- ActiveX -- OWASP -- XML -- Service Oriented Architecture (SOA) -- Database Security -- Polyinstantiation -- Inference and Aggregation -- Inference and Aggregation Controls -- Data Mining -- Data Analytics -- Countermeasures -- Mobile Device Attacks -- Mobile Device Defenses -- Cornerstone Cryptographic Concepts -- Key Terms -- Confidentiality, Integrity, Authentication, and Non-repudiation -- Confusion, Diffusion, Substitution, and Permutation -- Cryptographic Strength -- Monoalphabetic and Polyalphabetic Ciphers -- Modular Math -- Exclusive Or (XOR) -- Data at Rest and Data in Motion -- Protocol Governance -- Types of Cryptography -- Symmetric Encryption -- Stream and Block Ciphers -- Initialization Vectors and Chaining -- DES -- Modes of DES -- Electronic Code Book (ECB) -- Cipher Block Chaining (CBC) -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode (CTR) -- Single DES -- Triple DES -- International Data Encryption Algorithm (IDEA) -- Advanced Encryption Standard (AES) -- Choosing AES…”
Libro electrónico -
2503Publicado 2022Tabla de Contenidos: “…. -- There's more... -- Plotting vector fields with quiver plots -- Getting ready -- How to do it... -- How it works... -- There's more... -- Further reading -- Chapter 3: Calculus and Differential Equations -- Technical requirements -- Primer on calculus -- Working with polynomials and calculus -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Differentiating and integrating symbolically using SymPy -- Getting ready…”
Libro electrónico -
2504Publicado 2023Tabla de Contenidos: “…Continuous integration/continuous delivery (CI/CD) -- Migrating to cloud databases -- Database Migration Service -- System, query, and performance insights -- Summary -- Part 5: DevOps and Databases -- 9 -- Data to AI - Modeling Your Databases for Analytics and ML -- Modeling considerations for analytics, AI, and ML -- Data to AI -- Google Cloud ETL services -- Google Cloud Dataflow at a glance -- Real-world use cases for Google Cloud Dataflow -- Step-by-step guide to Google Cloud Dataflow -- Taking your data to AI -- Summary -- 10 -- Looking Ahead - Designing for LLM Applications -- Capturing the evolution of LLMs -- Getting started with LLMs -- Understanding the underlying principles of LLMs -- Comparing real-world applications of LLMs and traditional analytics -- Understanding the differences in data modeling for traditional analytics and LLMs -- Data model design considerations for applications that use LLMs -- Learning about data modeling principles and techniques -- Ethical and responsible practices -- Hands-on time - building an LLM application -- Step 1 - create a table -- Step 2 - insert data into the table -- Step 3 - create an external connection for BigQuery to access the Vertex AI model -- Step 4 - grant permissions to the service account to access the Vertex AI service -- Step 5 - create the remote model in BigQuery -- Step 6 - query the dataset -- Step 7 - generate text (create an LLM application) using only SQL -- Vector databases -- Summary -- Onward and upward! …”
Libro electrónico -
2505Publicado 2023Tabla de Contenidos: “…Chapter 15: Understanding Monetization Techniques -- Basics of F2P monetization -- Vectors of monetization -- Time -- Difficulty -- Playable content -- Non-playable content -- In-game advertisements -- Establishing a game economy -- Adjusting the monetization strategy -- Balancing player progression -- Gacha -- Weight-based loot tables -- Packaging and opening -- Maintaining consistency -- Kompu gacha -- Box gacha -- Bundles and targeting -- Adjusting your offering based on individual player spending -- Purchase rationalization -- Evaluate your audience! …”
Libro electrónico -
2506por Subrata, GhoshalTabla de Contenidos: “…Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- External Interrupts -- Introduction -- What is an Interrupt? -- Vectored Interrupt -- External Interrupts of 8051 -- Sfrs for External Interrupt -- Tcon -- Ie -- Interrupt Service Routine -- Checklist for Into -- Checklist for Int1 -- Software Interrupts -- Benefits of Interrupt -- Solved Examples -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Timer/Counter Interrupts -- Purpose of a Timer -- Differences Between a Timer and a Counter -- 8051/52 Timers -- Serial Communication and Serial Interrupts -- Introduction -- Serial and Parallel Communications -- Simplex, Full-Duplex and Half-Duplex Communications -- Synchronous and Asynchronous Communications -- Overview of Serial Communication -- How Serial Communication Works -- Serial Data Format -- Baud Rate -- Serial Communication Sfrs -- Sbuf -- Scon -- Pcon -- Modes of Serial Communication -- Mode 0 -- Mode 1 -- Mode 2 -- Mode 3 -- Serial Communication Issues -- Multiprocessor Communication -- Role of Timer in Baud-Rate Generation -- Why 11.0592 MHz? …”
Publicado 2002
Libro electrónico -
2507Publicado 2001Tabla de Contenidos: “…Hardware Handling of Interrupts and Exceptions -- Nested Execution of Exception and Interrupt Handlers -- Initializing the Interrupt Descriptor Table -- Interrupt, Trap, and System Gates -- Preliminary Initialization of the IDT -- Exception Handling -- Saving the Registers for the Exception Handler -- Entering and Leaving the Exception Handler -- Interrupt Handling -- I/O Interrupt Handling -- Interrupt vectors -- IRQ data structures -- IRQ distribution in multiprocessor systems -- Multiple Kernel Mode stacks -- Saving the registers for the interrupt handler -- The do_IRQ( ) function -- The _ _do_IRQ( ) function -- Reviving a lost interrupt -- Interrupt service routines -- Dynamic allocation of IRQ lines -- Interprocessor Interrupt Handling -- Softirqs and Tasklets -- Softirqs -- Data structures used for softirqs -- Handling softirqs -- The do_softirq( ) function -- The _ _do_softirq( ) function -- The ksoftirqd kernel threads -- Tasklets -- Work Queues -- Work queue data structures -- Work queue functions -- The predefined work queue -- Returning from Interrupts and Exceptions -- The entry points -- Resuming a kernel control path -- Checking for kernel preemption -- Resuming a User Mode program -- Checking for rescheduling -- Handling pending signals, virtual-8086 mode, and single stepping -- Kernel Synchronization -- How the Kernel Services Requests -- Kernel Preemption -- When Synchronization Is Necessary -- When Synchronization Is Not Necessary -- Synchronization Primitives -- Per-CPU Variables -- Atomic Operations -- Optimization and Memory Barriers -- Spin Locks -- The spin_lock macro with kernel preemption -- The spin_lock macro without kernel preemption -- The spin_unlock macro -- Read/Write Spin Locks -- Getting and releasing a lock for reading -- Getting and releasing a lock for writing -- Seqlocks -- Read-Copy Update (RCU) -- Semaphores…”
Libro electrónico -
2508Publicado 2013Tabla de Contenidos: “…Technical Controls -- Summary -- References -- Chapter 2: Risk Analysis -- Threat Definition -- Threat Vectors -- Threat Sources and Targets -- Types of Attacks -- Malicious Mobile Code -- Advanced Persistent Threats (APTs) -- Manual Attacks -- Risk Analysis -- Summary -- References -- Chapter 3: Compliance with Standards, Regulations, and Laws -- Information Security Standards -- COBIT -- ISO 27000 Series -- NIST -- Regulations Affecting Information Security Professionals -- The Duty of Care -- Gramm-Leach-Bliley Act (GLBA) -- Sarbanes-Oxley Act -- HIPAA Privacy and Security Rules -- NERC CIP -- PCI DSS: Payment Card Industry Data Security Standard -- Laws Affecting Information Security Professionals -- Hacking Laws -- Electronic Communication Laws -- Other Substantive Laws -- Summary -- References -- Chapter 4: Secure Design Principles -- The CIA Triad and Other Models -- Confidentiality -- Integrity -- Availability -- Additional Concepts -- Defense Models -- The Lollipop Model -- The Onion Model -- Zones of Trust -- Best Practices for Network Defense -- Secure the Physical Environment -- Harden the Operating System -- Keep Patches Updated -- Use an Antivirus Scanner (with Real-Time Scanning)…”
Libro electrónico -
2509Publicado 2013Tabla de Contenidos: “…Science Fundamentals -- Measurements -- Length and Distance -- Area -- Volume and Capacity -- Weight -- Other Units of Measurement -- Gravity, Weight, and Mass -- Density -- Specific Gravity -- Speed -- Velocity -- Force and Motion -- Units of Force -- Newton's First Law of Motion -- Newton's Second Law of Motion -- Friction -- Newton's Third Law of Motion -- Thrust -- Momentum -- Centrifugal and Centripetal Force -- Composition and Resolution of Forces -- Vectors -- Work, Energy, and Power -- Work -- Energy -- Power -- Machines -- Lever -- Pulleys -- Gears and Pulleys -- Inclined Plane -- Screw -- Compound Machines -- Heat -- Measuring Temperature -- Effects of Heat -- Specific Heat -- Change of State -- Expansion -- Laws of Thermodynamics -- Heat Transfer -- Conduction -- Convection -- Radiation -- Effects of Heat on Aircraft Materials -- Fluids -- Properties of Liquids -- Viscosity -- Archimedes' Principle…”
Libro electrónico -
2510Publicado 2022Tabla de Contenidos: “…Objective -- Strategy -- Example -- Case study 3 - CTI for Level 3 organizations -- Objective -- Strategy -- Example -- Installing the MISP platform (optional) -- Summary -- Section 2: Cyber Threat Analytical Modeling and Defensive Mechanisms -- Chapter 6: Cyber Threat Modeling and Adversary Analysis -- Technical requirements -- The strategic threat modeling process -- Identifying and decomposing assets -- Adversaries and threat analysis -- Attack surfaces and threat vectors -- Adversary analysis use case - Twisted Spider -- Identifying countermeasures -- System re-evaluation -- Threat modeling methodologies -- Threat modeling with STRIDE -- Threat modeling with NIST -- Threat modeling use case -- Equifax data breach summary -- Threat modeling for ABCompany -- Advanced threat modeling with SIEM -- User behavior logic -- Benefits of UBA -- UBA selection guide - how it works -- Adversary analysis techniques -- Adversary attack preparation -- Attack preparation countermeasures -- Adversary attack execution -- Attack execution mitigation procedures -- Summary -- Chapter 7: Threat Intelligence Data Sources -- Technical requirements -- Defining the right sources for threat intelligence -- Internal threat intelligence sources -- External threat intelligence sources -- Organization intelligence profile -- Threat feed evaluation -- Threat data quality assessment -- Open Source Intelligence Feeds (OSINT) -- Benefits of open source intelligence -- Open source intelligence portals -- OSINT platform data insights (OSINT framework) -- OSINT limitations and drawbacks -- Malware data for threat intelligence -- Benefits of malware data collection -- Malware components -- Malware data core parameters -- Other non-open source intelligence sources -- Benefits of paid intelligence -- Paid threat intelligence challenges -- Some paid intelligence portals…”
Libro electrónico -
2511por Bordas, St¿phane P. A.Tabla de Contenidos: “…8.2 Conventional BEM Formulation -- 8.2.1 Elasticity -- 8.2.2 Helmholtz Wave Problems -- 8.3 Shortcomings of the Conventional Formulations -- 8.4 Partition of Unity BEM Formulation -- 8.5 XBEM for Accurate Fracture Analysis -- 8.5.1 Williams Expansions -- 8.5.2 Local XBEM Enrichment at Crack Tips -- 8.5.3 Results -- 8.5.4 Auxiliary Equations and Direct Evaluation of Stress Intensity Factors -- 8.5.5 Fracture in Anisotropic Materials -- 8.5.6 Conclusions -- 8.6 XBEM for Short Wave Simulation -- 8.6.1 Background to the Development of Plane Wave Enrichment -- 8.6.2 Plane Wave Enrichment -- 8.6.3 Evaluation of Boundary Integrals -- 8.6.4 Collocation Strategy and Solution -- 8.6.5 Results -- 8.6.6 Choice of Basis Functions -- 8.6.7 Scattering from Sharp Corners -- 8.7 Conditioning and its Control -- 8.8 Conclusions -- References -- 9 Combined Extended Finite Element and Level Set Method (XFE-LSM) for Free Boundary Problems -- 9.1 Motivation -- 9.2 The Level Set Method -- 9.2.1 The Level Set Representation of the Embedded Interface -- 9.2.2 The Basic Level Set Evolution Equation -- 9.2.3 Velocity Extension -- 9.2.4 Level Set Function Update -- 9.2.5 Coupling the Level Set Method with the XFEM -- 9.3 Biofilm Evolution -- 9.3.1 Biofilms -- 9.3.2 Biofilm Modeling -- 9.3.3 Two-Dimensional Model -- 9.3.4 Solution Strategy -- 9.3.5 Variational Form -- 9.3.6 Enrichment Functions -- 9.3.7 Interface Conditions -- 9.3.8 Interface Speed Function -- 9.3.9 Accuracy and Convergence -- 9.3.10 Numerical Results -- 9.4 Conclusion -- Acknowledgment -- References -- 10 XFEM for 3D Fracture Simulation -- 10.1 Introduction -- 10.2 Governing Equations -- 10.3 XFEM Enrichment Approximation -- 10.4 Vector Level Set -- 10.5 Computation of Stress Intensity Factor -- 10.5.1 Brittle Material -- 10.5.2 Ductile Material -- 10.6 Numerical Simulations…”
Publicado 2023
Libro electrónico -
2512por Dave, Parag H.Tabla de Contenidos: “…Efficiency of Recursion -- Complexity -- The Notion of Complexity -- Profiling -- Suppressing Multiplicative Constants -- Counting Dominant Operations -- Growth-Rate -- Upper Bounds -- Asymptotic Growth-Rate -- The 'O' Notation -- Discussion -- Simplified Definition of 'O' -- 'O' Notation Rules -- Analyzing Growth of Exotic Functions -- Derivative Rule -- Order-of-Magnitude Comparisons -- Doubling Comparisons -- Estimating Complexity Experimentally -- Experimental comparison of sorting procedures -- Key Terms -- Summary -- Exercises -- Web Resources -- Examples of Complexity Calculation -- Objectives -- Examples from the Sorting World -- Bucket Sort -- Radix Sort -- Simple Insertion Sort -- Quick Sort -- Heap sort-using a Tree to Sort -- Merge Sort -- Summary of Complexity and Characteristics of Sorting Algorithms -- Complexity of Set Operations and Mappings -- Sets Implementation Using an Unordered Array -- Binary Search Principle -- Binary Search Trees -- Bit Vectors -- Analysis Of Hashing -- The Trie Principle -- Sets vs. …”
Publicado 1900
Libro electrónico -
2513Publicado 2019Tabla de Contenidos: “…Review 2: Matrices and Vectors -- 9.4. Linear Systems in Normal Form -- 9.5. …”
Libro electrónico -
2514Publicado 2024Tabla de Contenidos: “…-- Understanding IoT communication -- IoT communication layers -- IoT communication models -- IoT communication protocols -- Attack vectors for IoT devices -- Access control -- Firmware attacks -- Web attacks -- Network service/communication protocol attacks -- Unencrypted local data storage -- Confidentiality and integrity issues -- Cloud computing attacks -- Malicious updates -- Insecure APIs -- Mobile application threats -- Other attacks -- An IoT hacking methodology -- Understanding OT -- An OT hacking methodology -- Best practices for securing IoT/OT -- Lab - discovering IoT devices -- Summary -- Assessment…”
Libro electrónico -
2515Publicado 2024Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - A Whirlwind of Stable Diffusion -- Chapter 1: Introducing Stable Diffusion -- Evolution of the Diffusion model -- Before Transformer and Attention -- Transformer transforms machine learning -- CLIP from OpenAI makes a big difference -- Generate images -- DALL-E 2 and Stable Diffusion -- Why Stable Diffusion -- Which Stable Diffusion to use -- Why this book -- References -- Chapter 2: Setting Up the Environment for Stable Diffusion -- Hardware requirements to run Stable Diffusion -- GPU -- System memory -- Storage -- Software requirements -- CUDA installation -- Installing Python for Windows, Linux, and macOS -- Installing PyTorch -- Running a Stable Diffusion pipeline -- Using Google Colaboratory -- Using Google Colab to run a Stable Diffusion pipeline -- Summary -- References -- Chapter 3: Generating Images Using Stable Diffusion -- Logging in to Hugging Face -- Generating an image -- Generation seed -- Sampling scheduler -- Changing a model -- Guidance scale -- Summary -- References -- Chapter 4: Understanding the Theory Behind Diffusion Models -- Understanding the image-to-noise process -- A more efficient forward diffusion process -- The noise-to-image training process -- The noise-to-image sampling process -- Understanding Classifier Guidance denoising -- Summary -- References -- Chapter 5: Understanding How Stable Diffusion Works -- Stable Diffusion in latent space -- Generating latent vectors using diffusers -- Generating text embeddings using CLIP -- Initializing time step embeddings -- Initializing the Stable Diffusion UNet -- Implementing a text-to-image Stable Diffusion inference pipeline -- Implementing a text-guided image-to-image Stable Diffusion inference pipeline -- Summary -- References…”
Libro electrónico -
2516
-
2517Publicado 2018Tabla de Contenidos: “…10.2.2.2 OLSR-FastSync 259 -- 10.2.2.3 Ad Hoc on-Demand Distance Vector and Mesh and Mesh Networks with MObility Management (AODV-MEMO) 260 -- 10.2.2.4 Mobile Party 263 -- 10.2.2.5 Wireless Mesh Mobility Management (WMM) 264 -- 10.2.2.6 LMMesh 265 -- 10.2.2.7 Forward Pointer-Based Routing (FPBR) 266 -- 10.2.3 Multicasting-Based Scheme 267 -- 10.2.3.1 SMesh 267 -- 10.3 Advantages and Disadvantages 268 -- 10.4 Open Research Issues 279 -- 10.5 Conclusion 280 -- Acknowledgement 280 -- References 280 -- 11 TowardsMulti-Operator IPTV Services Over 5G Networks 283 /Gergely Biczók, Manos Dramitinos, Håkon Lønsethagen, LuisM. …”
Libro electrónico -
2518
-
2519
-
2520