Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
19901Publicado 2017Tabla de Contenidos: “…8.4.1 LTE Security 254 -- 8.4.2 Network Attack Types in LTE/SAE 255 -- 8.4.3 Preparation for the Attacks 256 -- 8.5 Errors in Equipment Manufacturing 259 -- 8.5.1 Equipment Ordering 259 -- 8.5.2 Early Testing 260 -- 8.6 Self‐Organizing Network Techniques for Test and Measurement 264 -- 8.6.1 Principle 264 -- 8.6.2 Self‐configuration 265 -- 8.6.3 Self‐optimizing 266 -- 8.6.4 Self‐healing 266 -- 8.6.5 Technical Issues and Impact on Network Planning 266 -- 8.6.6 Effects on Network Installation, Commissioning and Optimization 267 -- 8.6.7 SON and Security 268 -- References 268 -- 9 Monitoring and Protection Techniques 270 -- 9.1 Overview 270 -- 9.2 Personal Devices 271 -- 9.2.1 Wi‐Fi Connectivity 271 -- 9.2.2 Firewalls 271 -- 9.3 IP Core Protection Techniques 272 -- 9.3.1 General Principles 272 -- 9.3.2 LTE Packet Core Protection 272 -- 9.3.3 Protection against Roaming Threats 275 -- 9.4 HW Fault and Performance Monitoring 276 -- 9.4.1 Network Monitoring 277 -- 9.4.2 Protection against DoS/DDoS 277 -- 9.4.3 Memory Wearing 277 -- 9.5 Security Analysis 278 -- 9.5.1 Post‐processing 278 -- 9.5.2 Real‐time Security Analysis 278 -- 9.6 Virus Protection 279 -- 9.7 Legal Interception 281 -- 9.8 Personal Safety and Privacy 283 -- 9.8.1 CMAS 283 -- 9.8.2 Location Privacy 285 -- 9.8.3 Bio‐effects 286 -- References 287 -- 10 Future of Wireless Solutions and Security 288 -- 10.1 Overview 288 -- 10.2 IoT as a Driving Force 288 -- 10.3 Evolution of 4G 289 -- 10.4 Development of Devices 291 -- 10.4.1 Security Aspects of Smartcards 291 -- 10.4.2 Mobile Device Considerations 291 -- 10.4.3 IoT Device Considerations 292 -- 10.4.4 Sensor Networks and Big Data 293 -- 10.5 5G Mobile Communications 294 -- 10.5.1 Standardization 294 -- 10.5.2 Concept 295 -- 10.5.3 Industry and Investigation Initiatives 297 -- 10.5.4 Role of 5G in IoT 297 -- References 297 -- Index 299.…”
Libro electrónico -
19902Publicado 1981Seriada digital
-
19903por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Budget de l'administration centrale, 1996-99 -- La dynamique de l'endettement public était devenue intenable -- Graphique 7. Indicateurs de la performance budgétaire -- Graphique 8. Évolution de l'endettement fédéral -- La contrainte extérieure réapparaît -- Graphique 9. …”
Publicado 2001
Libro electrónico -
19904Publicado 2017“…Production of power with RES is highly variable and unpredictable, leading to the need for optimization-based planning and operation in order to maximize economies while sustaining performance. This self-contained book begins with an introduction to optimization, then covers a wide range of applications in both large and small scale operations, including optimum operation of electric power systems with large penetration of RES, power forecasting, transmission system planning, and DG sizing and siting for distribution and end-user premises. …”
Libro electrónico -
19905Publicado 2019Tabla de Contenidos: “…Cortex-M Processor Comparison -- 3.3.4. Processor Performance Measurement -- 3.3.5. Cortex-M Compatibility -- 3.3.6. …”
Libro electrónico -
19906por Jayaweera, Sudharman K., 1972-Tabla de Contenidos: “…4.4.1 Signal Detection in Additive Zero-Median Noise: The Sign Test, 124 -- 4.4.2 Signal Detection in Additive Symmetric Noise: The Rank Test, 125 -- 4.4.3 Signal Detection in Additive Zero Median, Zero Mean, Finite-Variance Noise: The t-Test, 126 -- 4.5 Summary, 127 -- 5 Introduction to Estimation Theory 132 -- 5.1 Introduction, 132 -- 5.2 Random Parameter Estimation: Bayesian Estimation, 134 -- 5.2.1 Minimum Mean-Squared Error Estimation, 134 -- 5.2.2 MMSE Estimation of Vector Parameters, 135 -- 5.2.3 Linear Minimum Mean-Squared Error Estimation, 138 -- 5.2.4 Maximum A Posteriori Probability Estimation, 139 -- 5.3 Nonrandom Parameter Estimation, 140 -- 5.3.1 Theory of Minimum Variance Unbiased Estimation, 142 -- 5.3.2 Best Linear Unbiased Estimator, 147 -- 5.3.3 Maximum Likelihood Estimation, 152 -- 5.3.4 Performance Bounds: Cramer-Rao Lower Bound, 154 -- 5.4 Summary, 158 -- 6 Power Spectrum Estimation 164 -- 6.1 Introduction, 164 -- 6.2 PSD Estimation of a Stationary Discrete-Time Signal, 168 -- 6.2.1 Correlogram Method, 168 -- 6.2.2 Periodogram Method, 170 -- 6.2.3 Performance of the Periodogram PSD Estimate, 172 -- 6.3 Blackman / Tukey Estimator of the Power Spectrum, 177 -- 6.4 Other PSD Estimators Based on Modified Periodograms, 181 -- 6.4.1 Bartlett PSD Estimator, 181 -- 6.4.2 Welch PSD Estimator, 183 -- 6.5 PSD Estimation of Nonstationary Discrete-Time Signals, 186 -- 6.5.1 Temporally Windowed Observations, 188 -- 6.5.2 Temporal and Spectral Smoothing of PSD Estimates of Nonstationary Discrete-Time Signals, 189 -- 6.5.3 DFT-Based PSD Computation, 191 -- 6.6 Spectral Correlation of Cyclostationary Signals, 192 -- 6.6.1 Spectral Correlation and Spectral Autocoherence, 196 -- 6.6.2 Time-Averaged Spectral Correlation, 197 -- 6.6.3 Estimation of Spectral Correlation, 198 -- 6.7 Summary, 200 -- 7 Markov Decision Processes 207 -- 7.1 Introduction, 207 -- 7.2 Markov Decission Processes, 209 -- 7.3 Finite-Horizon MDPs, 212 -- 7.3.1 Definitions, 212 -- 7.3.2 Optimal Policies for MDPs, 216.…”
Publicado 2015
Libro electrónico -
19907Publicado 2005Tabla de Contenidos: “…Solution context and overview -- 2.1 Solution perspective -- 2.2 Solution scenarios -- 2.2.1 Use case: Analyst research reporting -- 2.2.2 Use case: Collaborating on work products -- 2.2.3 Use case: Meetings -- 2.2.4 Use case: Managing product information -- 2.2.5 Use case: Managing information presented in the workplace -- 2.2.6 Use case: Monthly fund performance report -- 2.2.7 Use case: Application integration -- 2.3 Business processes -- 2.4 Summary -- Part 2 Design and development -- Chapter 3. …”
Libro electrónico -
19908Publicado 2022“…Significant attention is paid to parallel software implementation of these methods on traditional central processing units (CPUs) as well as new, high performance graphics processing units (GPUs). Existing material on the Fast Multipole Method (FMM) and Multi-Level Fast Multipole Algorithm (MLFMA) is also updated, blending in elements of the ACA algorithm to further reduce their memory demands.The Method of Moments in Electromagnetics is intended for students, researchers, and industry experts working in thearea of computational electromagnetics (CEM) and the MoM. …”
Libro electrónico -
19909
-
19910
-
19911por Zhang, Liming, 1943-Tabla de Contenidos: “…References 67 -- PART II COMPUTATIONAL ATTENTION MODELS 73 -- 3 Computational Models in the Spatial Domain 75 -- 3.1 Baseline Saliency Model for Images 75 -- 3.1.1 Image Feature Pyramids 76 -- 3.1.2 Centre-Surround Differences 79 -- 3.1.3 Across-scale and Across-feature Combination 80 -- 3.2 Modelling for Videos 81 -- 3.2.1 Extension of BS Model for Video 81 -- 3.2.2 Motion Feature Detection 81 -- 3.2.3 Integration for Various Features 83 -- 3.3 Variations and More Details of BS Model 84 -- 3.3.1 Review of the Models with Variations 85 -- 3.3.2 WTA and IoR Processing 87 -- 3.3.3 Further Discussion 90 -- 3.4 Graph-based Visual Saliency 91 -- 3.4.1 Computation of the Activation Map 92 -- 3.4.2 Normalization of the Activation Map 94 -- 3.5 Attention Modelling Based on Information Maximizing 95 -- 3.5.1 The Core of the AIM Model 96 -- 3.5.2 Computation and Illustration of Model 97 -- 3.6 Discriminant Saliency Based on Centre-Surround 101 -- 3.6.1 Discriminant Criterion Defined on Centre-Surround 102 -- 3.6.2 Mutual Information Estimation 103 -- 3.6.3 Algorithm and Block Diagram of Bottom-up DISC Model 106 -- 3.7 Saliency Using More Comprehensive Statistics 107 -- 3.7.1 The Saliency in Bayesian Framework 108 -- 3.7.2 Algorithm of SUN Model 110 -- 3.8 Saliency Based on Bayesian Surprise 113 -- 3.8.1 Bayesian Surprise 113 -- 3.8.2 Saliency Computation Based on Surprise Theory 114 -- 3.9 Summary 116 -- References 117 -- 4 Fast Bottom-up Computational Models in the Spectral Domain 119 -- 4.1 Frequency Spectrum of Images 120 -- 4.1.1 Fourier Transform of Images 120 -- 4.1.2 Properties of Amplitude Spectrum 121 -- 4.1.3 Properties of the Phase Spectrum 123 -- 4.2 Spectral Residual Approach 123 -- 4.2.1 Idea of the Spectral Residual Model 124 -- 4.2.2 Realization of Spectral Residual Model 125 -- 4.2.3 Performance of SR Approach 126 -- 4.3 Phase Fourier Transform Approach 127 -- 4.3.1 Introduction to the Phase Fourier Transform 127 -- 4.3.2 Phase Fourier Transform Approach 128.…”
Publicado 2013
Libro electrónico -
19912Publicado 2015Tabla de Contenidos: “…Achievements: is neuroscience able to explain how to perform sustained assumptions and studies? -- 12.3. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
19913por Muhlmeyer, MichaelTabla de Contenidos: “…Optimal Control -- 12.3.1. Performance Measure -- 12.3.2. Dynamic Programming and Principle of Optimality -- 12.3.3. …”
Publicado 2021
Libro electrónico -
19914Publicado 2018Tabla de Contenidos: “…4.11 Navier-Stokes Equations -- Problems -- Chapter 5 Finite Element Formulation: Large-Deformation, Large-Rotation Problem -- Small- and Large-Deformation Problems -- Absolute Nodal Coordinate Formulation (ANCF) -- Organization -- 5.1 Displacement Field -- Separation of Variables -- Modes of Displacement -- Nodal Coordinates -- 5.2 Element Connectivity -- 5.3 Inertia and Elastic Forces -- Inertia Forces -- Elastic Forces -- 5.4 Equations of Motion -- Curved Geometry -- 5.5 Numerical Evaluation of the Elastic Forces -- Gaussian Quadrature -- Generalization -- 5.6 Finite Elements and Geometry -- General Continuum Mechanics Approach and Classical Theories -- Gradient Vectors -- Locking Problems -- Theory of Curves -- Theory of Surfaces -- Surface Curvature -- 5.7 Two-Dimensional Euler-Bernoulli Beam Element -- Kinematics of the Element -- Formulation of the Element Elastic Forces -- Special Case -- 5.8 Two-Dimensional Shear Deformable Beam Element -- Formulation of the Elastic Forces -- 5.9 Three-Dimensional Cable Element -- 5.10 Three-Dimensional Beam Element -- 5.11 Thin-Plate Element -- 5.12 Higher-Order Plate Element -- 5.13 Brick Element -- 5.14 Element Performance -- Patch Test -- Locking Problem -- Reduced Integration -- 5.15 Other Finite Element Formulations -- Isoparametric Finite Elements -- Use of Infinitesimal Rotation Coordinates -- Use of Finite Rotation Coordinates -- 5.16 Updated Lagrangian and Eulerian Formulations -- 5.17 Concluding Remarks -- ANCF Finite Elements -- Constrained Motion -- ANCF Reference Node -- Deformation Modes -- Problems -- Chapter 6 Finite Element Formulation: Small-Deformation, Large-Rotation Problem -- 6.1 Background -- Rigid-Body Motion -- Translations -- 6.2 Rotation and Angular Velocity -- Identities -- General Displacement -- Illustrative Example -- Euler Angles Singularity…”
Libro electrónico -
19915Publicado 2015Tabla de Contenidos: “…Logical Segmentation -- Network Services -- Wireless Networks -- Remote Access -- Performance Considerations -- Latency and Jitter -- Bandwidth and Throughput -- Type of Service, Class of Service, and Quality of Service -- Network Hops -- Network Security Controls -- Safety Instrumented Systems -- Special Considerations -- Wide Area Connectivity -- Smart Grid Network Considerations…”
Libro electrónico -
19916Publicado 2021Tabla de Contenidos: “…Zero Trust Querying for Additional Context (Authentication Trigger) -- SIEM/SOAR Invoking Zero Trust System (External Trigger) -- Indirect Integration (External Trigger) -- Summary -- Chapter 12: Privileged Access Management -- Password Vaulting -- Secrets Management -- Privileged Session Management -- Zero Trust and PAM -- Summary -- Chapter 13: Data Protection -- Data Types and Data Classification -- Data Lifecycle -- Data Creation -- Data Usage -- Data Destruction -- Data Security -- Zero Trust and Data -- Summary -- Chapter 14: Infrastructure and Platform as a Service -- Definitions -- Zero Trust and Cloud Services -- Service Meshes -- Summary -- Chapter 15: Software as a Service -- SaaS and Cloud Security -- Native SaaS Controls -- Secure Web Gateways -- Cloud Access Security Brokers -- Zero Trust and SaaS -- Zero Trust and Edge Services -- Summary -- Chapter 16: IoT Devices and "Things" -- IoT Device Networking and Security Challenges -- Zero Trust and IoT Devices -- Summary -- Part III: Putting It All Together -- Chapter 17: A Zero Trust Policy Model -- Policy Components -- Subject Criteria -- Action -- Target -- Access to Host 10.6.1.34 -- Access to Host appserver1.internal.example.com -- Access to Hosts on the Subnet 10.5.1.0/24 -- Access to Systems Tagged as "department=Marketing" -- Access to Systems Tagged as "stage=test" -- Condition -- Time of Day Is Between 08:00 and 18:00 -- User Has Performed a Valid MFA or Step-Up Authentication Within the Last 90 Minutes -- Device Posture Meets Requirements: Anti-malware Service Is Running -- Device Posture Meets Requirements: Endpoint Security Scan Completed Fewer Than 48 Hours Ago -- A Service Desk Ticket Is in an Open State for This Resource -- Both the Subject and the Target Must Be Servers Tagged as Being in a "Production" State -- Subject Criteria vs. …”
Libro electrónico -
19917Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introducing the Google Cloud Platform -- ML and the cloud -- The nature of the cloud -- Public cloud -- Managed cloud versus unmanaged cloud -- IaaS versus PaaS versus SaaS -- Costs and pricing -- ML -- Introducing the GCP -- Mapping the GCP -- Getting started with GCP -- Project-based organization -- Creating your first project -- Roles and permissions -- Further reading -- Summary -- Chapter 2: Google Compute Engine -- Google Compute Engine -- VMs, disks, images, and snapshots -- Creating a VM -- Google Shell -- Google Cloud Platform SDK -- Gcloud -- Gcloud config -- Accessing your instance with gcloud -- Transferring files with gcloud -- Managing the VM -- IPs -- Setting up a data science stack on the VM -- BOX the ipython console -- Troubleshooting -- Adding GPUs to instances -- Startup scripts and stop scripts -- Resources and further reading -- Summary -- Chapter 3: Google Cloud Storage -- Google Cloud Storage -- Box-storage versus drive -- Accessing control lists -- Access and management through the web console -- gsutil -- gsutil cheatsheet -- Advanced gsutil -- Signed URLs -- Creating a bucket in Google Cloud Storage -- Google Storage namespace -- Naming a bucket -- Naming an object -- Creating a bucket -- Google Cloud Storage console -- Google Cloud Storage gsutil -- Life cycle management -- Google Cloud SQL -- Databases supported -- Google Cloud SQL performance and scalability -- Google Cloud SQL security and architecture -- Creating Google Cloud SQL instances -- Summary -- Chapter 4: Querying Your Data with BigQuery -- Approaching big data -- Data structuring -- Querying the database -- SQL basics -- Google BigQuery -- BigQuery basics -- Using a graphical web UI -- Visualizing data with Google Data Studio…”
Libro electrónico -
19918Publicado 2003Tabla de Contenidos: “…System management -- 10.1 System management activities -- 10.2 WebSphere Everyplace Access management -- 10.2.1 Everyplace Synchronization Server -- 10.2.2 Intelligent Notification Services -- 10.2.3 Device Manager -- 10.3 System Management and monitoring using Tivoli products -- 10.3.1 Integrating System Management in the Pervasive Portal solution -- 10.4 Production, Staging and Development environment -- 10.5 Where to find more information -- Chapter 11. Performance and availability -- 11.1 Concepts -- 11.2 Techniques -- 11.3 Products -- 11.4 Applying to a Pervasive Portal solution -- 11.5 Where to find more information -- Part 3 Implementation -- Chapter 12. …”
Libro electrónico -
19919Publicado 2003Tabla de Contenidos: “…The sports team multiplexer sample -- 8.1 Introduction to the TeamMux sample -- 8.2 Classes in the TeamMux sample -- 8.2.1 Team -- 8.2.2 Match -- 8.2.3 TeamMuxSA -- 8.2.4 TeamClient -- 8.3 Step 1: Performing a light login -- 8.3.1 TeamMuxSA in step 1 -- 8.3.2 TeamClient in step 1 -- 8.4 Step 2: Logging in by token -- 8.4.1 TeamMuxSA in step 2 -- 8.4.2 TeamClient in step 2 -- 8.5 Step 3: Adding dynamic updates -- 8.5.1 Match and MatchListener -- 8.5.2 TeamMuxSA in step 3 -- 8.5.3 TeamClient in step 3 -- 8.6 Step 4 - Adding instant messaging support -- 8.6.1 TeamClient in step 4 -- Chapter 9. …”
Libro electrónico -
19920Publicado 2021Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Understanding LinkedIn Basics -- Chapter 1 Looking into LinkedIn -- Understanding Your New Contact Management and Networking Toolkit -- Keeping track of your contacts -- Understanding the different degrees of network connections -- Discovering What You Can Do with LinkedIn -- Building your brand and profile -- Looking for a job now or later -- Finding out all kinds of valuable information -- Expanding your network -- Navigating LinkedIn -- Touring the top navigation bar -- Looking at the Settings & -- Privacy page -- Understanding LinkedIn Costs and Benefits -- Weighing free versus paid accounts -- Comparing the paid accounts -- Upgrading to a premium account -- Chapter 2 Signing Up and Creating Your Account -- Joining LinkedIn -- Joining with an invitation -- Joining without an invitation -- Completing the sign-up process -- Building Your Network -- Chapter 3 Completing Your Profile -- Adding a Summary and Basic Information -- Updating the basic information sections -- Writing your summary first -- Completing Your Summary -- Adding More Profile Sections -- Adding a Position -- Reporting Your Education -- Setting Your Profile URL and Public View -- Part 2 Finding Others and Getting Connected -- Chapter 4 Discovering and Building Your Network -- Searching Your First-Degree Connections -- Searching the LinkedIn Network -- Starting with basic search options -- Advanced searching with filters -- Performing advanced searches -- Saving searches for future use -- Chapter 5 Growing Your Network -- Building a Meaningful Network -- Importing Contacts into LinkedIn -- Importing a contacts list from your email system -- Checking for members…”
Libro electrónico