Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
16861Publicado 2018Tabla de Contenidos: “…-- Towards Open (Shared) Knowledge -- The GEOSS Case -- Big Data Infrastructure Services: The GEOSS Common Infrastructure (GCI) Big Data Strategy -- Content Harmonization and Information/Knowledge Generation: The Brokering Framework -- The Brokering framework -- The DAB -- More (Value) knowledge to reduce Volume -- From Data to Knowledge: the GEOSS Knowledge Base and High-Performance Data Analytics -- The DIKW pattern -- The GEOSS Knowledge Base -- High-Performance Analytics and GEOSS -- Conclusions -- References -- Cyber-Infrastructure for Data-Intensive Geospatial Computing -- Introduction -- Settlement Mapping Tool (SMTOOL) -- Toolbox for Urban Mobility Simulations (TUMS) -- Global Dataset -- Framework -- OD Tables -- Resolution -- Unified Network and Population Database -- Big Data -- Urban Information System (UrbIS) -- Leveraging Big Data to Understand Urban Impact on Environment and Climate -- Conclusions -- References -- Machine Learning Applications for Earth Observation -- Introduction -- What Is Machine Learning? …”
Libro electrónico -
16862
-
16863Publicado 2021Tabla de Contenidos: “…Implementing token-based authentication -- Checking Swagger UI -- Summary -- Chapter 10: Performance Enhancement with Redis -- Technical requirements -- In-memory caching in ASP.NET Core -- Enabling in-memory caching in ASP.NET Core -- Distributed caching -- Setting up and running Redis -- For Windows users -- For macOS users -- For Linux or Ubuntu users -- Implementing Redis in ASP.NET Core 5 -- Code update -- Summary -- Section 3: Frontend Development -- Chapter 11: Vue.js Fundamentals in a Todo App -- Technical requirements -- Starting a project using the Vue CLI -- Files and folders generated by the Vue CLI -- Getting started with a Vue component -- Writing a Vue component -- Common features in a Vue component -- Writing local states in a Vue component -- Adding a function in a Vue component -- Looping in an array in a Vue component -- If-else conditions in a Vue component -- Creating and passing props -- Life cycle hooks in a Vue component -- Summary -- Further reading -- Chapter 12: Using a UI Component Library and Creating Routes and Navigations -- Technical requirements -- Using a third-party UI component library -- Setting up a Vue.js project and installing a UI component library -- Other third-party UI libraries -- Adding navigation bars -- Writing page components -- Setting up Vue Router with lazy loading and eager loading -- Summary -- Chapter 13: Integrating a Vue.js Application with ASP.NET Core -- Technical requirements -- Putting ASP.NET Core Web API and a Vue.js app together as a single unit -- Introducing Cross-Origin Resource Sharing or CORS -- Enabling a CORS policy in ASP.NET Core -- Summary -- Chapter 14: Simplifying State Management with Vuex and Sending GET HTTP Requests -- Technical requirements -- Understanding complex state management -- Understanding global state -- Sending an HTTP request in Vue.js…”
Libro electrónico -
16864Publicado 2018Tabla de Contenidos: “…Derived column data types -- Product dimension integration -- R script transformation -- M editing tools -- Advanced Editor -- Visual Studio Code -- Visual Studio -- Summary -- Chapter 3: Designing Import and DirectQuery Data Models -- Dataset layers -- Dataset objectives -- Competing objectives -- External factors -- The Data Model -- The Relationships View -- The Data View -- The Report View -- Fact tables -- Fact table columns -- Fact column data types -- Fact-to-dimension relationships -- Dimension tables -- Hierarchies -- Custom sort -- Bridge tables -- Parameter tables -- Measure groups -- Last refreshed date -- Measure support logic -- Relationships -- Uniqueness -- Ambiguity -- Single-direction relationships -- Direct flights only -- Bidirectional relationships -- Shared dimensions -- Date dimensions -- The CROSSFILTER function -- Model metadata -- Visibility -- Column metadata -- Default Summarization -- Data format -- Data category -- Field descriptions -- Optimizing performance -- Import -- Columnar compression -- Memory analysis via DMVs -- DirectQuery -- Optimized DAX functions -- Columnstore and HTAP -- Summary -- Chapter 4: Developing DAX Measures and Security Roles -- DAX measures -- Filter context -- SQL equivalent -- Measure evaluation process -- Row context -- Scalar and table functions -- The CALCULATE() function -- Related tables -- The FILTER() function -- DAX variables -- Base measures -- Measure support expressions -- KPI Targets -- Current and prior periods -- Date intelligence metrics -- Current versus prior and growth rates -- Rolling periods -- Dimension metrics -- Missing dimensions -- Ranking metrics -- Dynamic ranking measures -- Security roles -- Dynamic row-level security -- Performance testing -- DAX Studio -- Tracing a Power BI dataset via DAX Studio -- Summary -- Chapter 5: Creating and Formatting Power BI Reports…”
Libro electrónico -
16865Publicado 2022Tabla de Contenidos: “…-- Top Concerns of Management -- Do Not Fight the Tide -- Remote Working Is Older Than You May Think -- Productivity and Job Performance -- Adjusting to the New Work and Home Balance -- Social Isolation -- Employee Engagement -- Maintaining Growth and Profitability -- Let's Get to Work -- Notes -- Chapter 2 The Remote Workspace: Set Up Your Mind and Your Space -- Your Work Zone: Distinguished from the Rest of the House -- Choosing Your Space -- Good Lighting -- Broadband -- Monitors -- Grab a Seat -- Invest in Yourself -- Add Privacy If Needed -- Set Healthy Boundaries with Family and Friends -- No Is a Powerful Asset -- Self-Motivation from Home Can Be Perilous -- Productive Procrastination -- Work and Play -- Your Mental Space -- Take Breaks and Don't Feel Guilty -- You Are Not a Machine -- Replenish Your Resources -- Take Breaks Early -- Take Better Breaks -- Create a Morning Routine Different from When You Were Commuting -- Set Daily Goals -- Tasks vs. …”
Libro electrónico -
16866Publicado 2021Tabla de Contenidos: “…The architecture of 6G -- 4.2.1. Network performance of 6G -- 4.2.2. Space network -- 4.2.3. …”
Libro electrónico -
16867Publicado 2016Tabla de Contenidos: “…Past OECD recommendations on education policy -- Figure 25. Education performance has improved though skills remain weak on average -- Figure 26. …”
Libro electrónico -
16868por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Intro -- Table des matières -- Statistiques de base de l'Islande -- Évaluation et recommandations -- I. Performance économique et perspectives -- Graphique 1. …”
Publicado 2004
Libro electrónico -
16869Publicado 2014Tabla de Contenidos: “…2.2.2.2 Query Freshness Features2.2.3 Experiment Results; 2.2.3.1 Datasets; 2.2.3.2 Click Datasets; 2.2.3.3 Preference Pair Selection; 2.2.3.4 Temporal Feature Implementation; 2.2.3.5 Baselines and Evaluation Metrics; 2.2.4 Analysis of JRFL; 2.2.4.1 Convergency; 2.2.4.2 Relevance and Freshness Learning; 2.2.4.3 Query Weight Analysis; 2.2.5 Ranking Performance; 2.3 News Clustering; 2.3.1 Architecture of the System; 2.3.2 Offline Clustering; 2.3.2.1 Feature Vector Generation; 2.3.2.2 Minhash Signature Generation; 2.3.2.3 Duplicate Detection; 2.3.2.4 Locality-Sensitive Hashing…”
Libro electrónico -
16870Publicado 2018Tabla de Contenidos: “…Splitting videos into frames -- Approaches for classifying videos -- Fusing parallel CNN for video classification -- Classifying videos over long periods -- Streaming two CNN's for action recognition -- Using 3D convolution for temporal learning -- Using trajectory for classification -- Multi-modal fusion -- Attending regions for classification -- Extending image-based approaches to videos -- Regressing the human pose -- Tracking facial landmarks -- Segmenting videos -- Captioning videos -- Generating videos -- Summary -- Chapter 10: Deployment -- Performance of models -- Quantizing the models -- MobileNets -- Deployment in the cloud -- AWS -- Google Cloud Platform -- Deployment of models in devices -- Jetson TX2 -- Android -- iPhone -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
16871Publicado 2018Tabla de Contenidos: “…. -- .textFile(...) method -- .map(...) method -- Partitions and performance -- Overview of RDD transformations -- Getting ready -- How to do it... -- .map(...) transformation -- .filter(...) transformation -- .flatMap(...) transformation -- .distinct() transformation -- .sample(...) transformation -- .join(...) transformation -- .repartition(...) transformation -- .zipWithIndex() transformation -- .reduceByKey(...) transformation…”
Libro electrónico -
16872Publicado 2017“…Master the principles to make applications robust, scalable and responsive About This Book Implement concurrent applications using the Java 9 Concurrency API and its new components Improve the performance of your applications and process more data at the same time, taking advantage of all of your resources Construct real-world examples related to machine learning, data mining, natural language processing, and more Who This Book Is For This book is for competent Java developers who have basic understanding of concurrency, but knowledge of effective implementation of concurrent programs or usage of streams for making processes more efficient is not required What You Will Learn Master the principles that every concurrent application must follow See how to parallelize a sequential algorithm to obtain better performance without data inconsistencies and deadlocks Get the most from the Java Concurrency API components Separate the thread management from the rest of the application with the Executor component Execute phased-based tasks in an efficient way with the Phaser components Solve problems using a parallelized version of the divide and conquer paradigm with the Fork / Join framework Find out how to use parallel Streams and Reactive Streams Implement the ?…”
Libro electrónico -
16873Publicado 2014Tabla de Contenidos: “…3.6.1 Simple hedge fund3.6.2 The master/feeder structure; 3.6.3 EU UCITS-compliant funds; 3.7 Establishment of the fund; 3.7.1 Process; 3.7.2 Documentation; 3.8 Management and performance fees; 3.8.1 Management fee; 3.8.2 Performance fee; 3.8.3 Hurdle rate; 3.8.4 High water mark; 3.8.5 Redemption fees; 3.9 Other key terms; 3.9.1 Liquidity; 3.9.2 Lock-ups; 3.9.3 Gating provisions; 3.9.4 Capacity; 3.9.5 Early stage or seed investors; 3.9.6 Key man; 3.9.7 Equalization; 3.10 The use of side pockets; 3.11 Regulation; 3.12 Some conclusions…”
Libro electrónico -
16874Publicado 2015Tabla de Contenidos: “…2.2 Hardware Trade-offs2.2.1 Performance Increase with Frequency, and its Limitations; 2.2.2 Superscalar Execution; 2.2.3 Very Long Instruction Word; 2.2.4 SIMD and Vector Processing; 2.2.5 Hardware Multithreading; 2.2.6 Multicore Architectures; 2.2.7 Integration: Systems-on-Chip and the APU; 2.2.8 Cache Hierarchies and Memory Systems; 2.3 The Architectural Design Space; 2.3.1 CPU Designs; Low-power CPUs; Mainstream desktop CPUs; Server CPUs; 2.3.2 GPU Architectures; Handheld GPUs; At the high end: AMD Radeon R9 290X and NVIDIA GeForce GTX 780; 2.3.3 APU and APU-like Designs; 2.4 Summary…”
Libro electrónico -
16875Publicado 2023Tabla de Contenidos: “…Attack phase - Delivery -- Example controls for Delivery -- Insights from ATT& -- CK -- Attack phase - Exploitation -- Example controls for Exploitation -- Insights from ATT& -- CK -- Attack phase - Installation -- Example controls for Installation -- Insights from ATT& -- CK -- Attack phase - Command and Control (C2) -- Example controls for C2 -- Insights from ATT& -- CK -- Attack phase - Reconnaissance II -- Example controls for Reconnaissance II -- Insights from ATT& -- CK -- Attack phase - Actions on Objectives -- Example controls for Actions on Objectives -- Insights from ATT& -- CK -- Conclusion -- Summary -- References -- Chapter 11: Measuring Performance and Effectiveness -- Introduction -- Using vulnerability management data -- Assets under management versus total assets -- Known unpatched vulnerabilities -- Unpatched vulnerabilities by severity -- Vulnerabilities by product type -- Measuring the performance and efficacy of an Attack-Centric Strategy -- Performing intrusion reconstructions -- Using intrusion reconstruction results -- Identifying lame controls -- Learning from failure -- Identifying helpful vendors -- Informing internal assessments -- Adversary emulations leveraging ATT& -- CK -- Summary -- References -- Chapter 12: Modern Approaches to Security and Compliance -- Introduction -- How is cloud computing different? …”
Libro electrónico -
16876Publicado 2023“…Get insights and guidance on various challenges within the industry and what business levers you can consider to effortlessly lead your business transformation through RISE with SAP Purchase of the print or Kindle book includes a free PDF eBook Key Features Gain actionable insights into end-to-end process performance with process analytics Scale performance and reliability to accelerate your journey to the cloud and beyond Get a clear overview of the enabling tools and services you can leverage for the transformation Book Description If you're unsure whether adopting SAP S/4HANA is the right move for your enterprise, then this book is for you. …”
Libro electrónico -
16877Publicado 2022Tabla de Contenidos: “…Monitoring and measurement -- Reporting -- Continuous improvement -- Risk frameworks -- Understand and Apply Threat Modeling Concepts and Methodologies -- Identifying threats -- Determining and diagramming potential attacks -- Performing reduction analysis -- Remediating threats -- Apply Supply Chain Risk Management (SCRM) Concepts -- Risks associated with hardware, software, and services -- Third-party assessment and monitoring -- Fourth-party risk -- Minimum security requirements -- Service-level agreement requirements -- Establish and Maintain a Security Awareness, Education, and Training Program -- Methods and techniques to present awareness and training -- Periodic content reviews -- Program effectiveness evaluation -- Chapter 4 Asset Security -- Identify and Classify Information and Assets -- Data classification -- Asset classification -- Establish Information and Asset Handling Requirements -- Provision Resources Securely -- Information and asset ownership -- Asset inventory -- Asset management -- Manage Data Life Cycle -- Data roles -- Data collection -- Data location -- Data maintenance -- Data retention -- Data remanence -- Data destruction -- Ensure Appropriate Asset Retention -- End of life -- End of support -- Determine Data Security Controls and Compliance Requirements -- Data states -- Scoping and tailoring -- Standards selection -- Data protection methods -- Chapter 5 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- Threat modeling -- Least privilege (and need to know) -- Defense in depth -- Secure defaults -- Fail securely -- Separation of duties -- Keep it simple -- Zero trust -- Privacy by design -- Trust but verify -- Shared responsibility -- Understand the Fundamental Concepts of Security Models…”
Libro electrónico -
16878Publicado 2003Tabla de Contenidos: “…Manual preference in the tactile modality -- 4.2. Manual performance in the tactile modality -- 4.3. Manual preference, manual performance and manual exploratory procedures -- 5. …”
Libro electrónico -
16879Publicado 2024Tabla de Contenidos: “…-- Pushing rebuilds down the tree -- Avoiding redundant rebuilds -- Avoiding redundant repaints -- Optimizing scroll view performance -- Summary -- Chapter 2: Responsive UIs for All Devices -- Technical requirements -- Understanding the Flutter layout algorithm -- Understanding BoxConstraints -- How do constraints determine the child widget's size? …”
Libro electrónico -
16880Publicado 2024Tabla de Contenidos: “…Act -- The Building Act -- The Water Industry Act -- British, European and International Standards -- Building Research Establishment -- Loss Prevention Certification Board -- Design and Installation Standards -- Energy Performance Certificate -- Part Two-Cold Water and Supply Systems -- Rain Cycle - Sources of Water Supply -- Acidity and Alkalinity in Water -- Filtration of Water -- Sterilisation -- Storage and Distribution of Water -- Disinfection of Water -- Water Mains -- Valves and Taps -- Joints on Water Pipes -- Pipe Jointing Materials -- Direct System of Cold Water Supply -- Indirect System of Cold Water Supply -- Hard and Soft Water -- Water Softening -- Water Conditioning and Treatment -- Backflow Protection -- Secondary Backfl ow Protection -- Cold Water Storage Cisterns -- Cold Water Storage Calculations -- Boosted Cold Water System -- Delayed Action Float Valve -- Pipe Sizing by Formula -- Hydraulics and Fluid Flow -- Part Three-Hot Water Supply Systems -- Direct System of Hot Water Supply -- Indirect System of Hot Water Supply -- Unvented Hot Water Storage System -- Expansion and Temperature-Relief Valves -- Hot Water Storage Cylinders -- Primatic Hot Water Storage Cylinders -- Indirect Hot Water System for a Three-Storey Building -- Indirect Supplementary Hot Water System -- Sealed Indirect Hot Water System for a High-Rise Building -- Primary Thermal Stores -- Types of Boiler -- Secondary Circulation -- Duplication of Plant -- Electric and Gas Water Heaters -- Solar Heating of Water -- Hot Water Storage Capacity -- Boiler Rating -- Pipe Sizing -- Pressurised Systems -- Circulation Pump Rating…”
Libro electrónico