Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 34
- Application software 31
- Computer graphics 21
- Computer animation 14
- Design 14
- Programming 14
- Python (Computer program language) 12
- Web site development 11
- Maya (Computer file) 10
- Video games 10
- Web applications 10
- Engineering & Applied Sciences 9
- Java (Computer program language) 9
- Three-dimensional display systems 9
- Human anatomy 8
- JavaScript (Computer program language) 8
- Web sites 8
- Computer Science 7
- Computer programs 7
- Computer programming 6
- Internet programming 6
- 3ds max (Computer file) 5
- Cloud computing 5
- HTML (Document markup language) 5
- Human physiology 5
- Artificial intelligence 4
- Blender (Computer file) 4
- Cascading style sheets 4
- Computer games 4
- Data processing 4
-
181Publicado 2014Tabla de Contenidos: “…-- Point of View -- Highs and Lows -- So You Want to Be a Princess? -- Story Skeleton -- Non-fiction activities -- Read and Draw -- Cross Me Out -- Fact or Fiction? …”
Libro electrónico -
182por Davies, E. R.Tabla de Contenidos: “…6.7 Distance Functions and Their Uses6.8 Skeletons and Thinning; 6.9 Some Simple Measures for Shape Recognition; 6.10 Shape Description by Moments; 6.11 Boundary Tracking Procedures; 6.12 More Detail on the Sigma and Chi Functions; 6.13 Concluding Remarks; 6.14 Bibliographical and Historical Notes; 6.15 Problems; CHAPTER 7. …”
Publicado 2005
Libro electrónico -
183Publicado 2008Tabla de Contenidos: “…3.3.3 Mapping to Register Transfers3.3.4 Simulation; 3.3.5 Architectural Synthesis; 3.3.6 Test Program Generation; 3.3.7 Code Generation; 3.3.8 Overall View of the Dependence among MSS Tools; 3.3.9 Designs Using MSS2; 3.4 Conclusions; 3.4.1 Evolution of Ideas and Directions; 3.4.2 What Went Wrong and What Went Right; 3.4.3 Summary; References; Chapter 4. nML: A Structural Processor Modeling Language for Retargetable Compilation and ASIP Design; 4.1 Introduction; 4.2 The nML Processor Description Formalism; 4.3 A Structural Skeleton of the Processor; 4.3.1 Memories and Registers…”
Libro electrónico -
184por Konheim, Alan G., 1934-Tabla de Contenidos: “…Optimum Hashing -- 15.1: The Ullman / Yao Framework -- 15.1.1: The Ullman / Yao Hashing Functions -- 15.1.2: Ullman / Yao INSERT(k) and SEARCH(k) -- 15.1.3: The Ullman / Yao Statistical Model -- 15.2: The Rates at Which a Cell is Probed and Occupied -- 15.3: Partitions of (i)Scenarios, (i)Subscenarios, and Their Skeletons -- 15.3.1: (i)Subscenarios -- 15.3.2: Skeletons -- 15.4: Randomly Generated m-Scenarios -- 15.5: Bounds on Random Sums -- 15.6: Completing the Proof of Theorem 15.1 -- PART III: SOME NOVEL APPLICATIONS OF HASHING -- 16. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
185Publicado 2025Tabla de Contenidos: “…Front Cover -- Graph Based Multimedia Analysis -- Copyright -- Contents -- List of figures -- List of tables -- Biography -- Foreword -- Preface -- 1 Introduction -- 1.1 Motivation -- 1.2 Chapter organization -- 1.3 Basics of multimedia -- 1.4 Preliminaries of a video -- 1.5 Multimedia problems -- 1.6 Graph based solutions -- 1.7 Other solution models -- 1.8 Organization of the book -- References -- 2 Theoretical foundations -- 2.1 Motivation -- 2.2 Organization -- 2.3 Graph basics -- 2.4 Delaunay graph -- 2.5 Bipartite graph -- 2.6 Minimum spanning tree -- 2.7 Optimum path forest -- 2.8 Random walks on a graph -- 2.9 Knapsack problems -- 2.10 Elementary game theory -- References -- 3 Exocentric video summarization -- 3.1 Motivation -- 3.2 Chapter organization -- 3.3 Related works -- 3.3.1 Related works for exocentric video summarization -- 3.3.2 Related works for scalable exocentric video summarization -- 3.4 Method I: Delaunay graph based solutions for exocentric video summarization -- 3.4.1 Method IA: Constrained Delaunay graph clustering based summary -- 3.4.1.1 Video frame presampling -- 3.4.1.2 Feature extraction -- 3.4.1.3 Elimination of redundant frames -- 3.4.1.4 Delaunay graph based constrained clustering -- 3.4.1.5 Key frame extraction -- 3.4.2 Method IB: Delaunay graph based summary with user customization -- 3.4.3 Method IC: Delaunay graph based summary in enhanced feature space -- 3.5 Method II: A graph modularity based clustering for exocentric video summarization -- 3.5.1 Compressed domain feature extraction -- 3.5.2 Multi-feature fusion -- 3.5.3 Graph modularity based clustering -- 3.5.4 Key frame extraction -- 3.6 Scalable exocentric video summarization with skeleton graph and random walk -- 3.6.1 Extraction of skeleton graph -- 3.6.2 Clustering of skeleton graph via MST -- 3.6.3 Label propagation with random walks…”
Libro electrónico -
186Publicado 2017Tabla de Contenidos: “…-- How Flask handles requests -- Routing -- Variables and converters -- The url_for function -- Request -- Response -- Flask built-in features -- The session object -- Globals -- Signals -- Extensions and middlewares -- Templates -- Configuration -- Blueprints -- Error handling and debugging -- Custom error handler -- The debug mode -- A microservice skeleton -- Summary -- Chapter 3: Coding, Testing, and Documenting - the Virtuous Cycle -- Different kinds of tests -- Unit tests -- Functional tests -- Integration tests -- Load tests -- End-to-end tests -- Using WebTest -- Using pytest and Tox -- Developer documentation -- Continuous Integration -- Travis-CI -- ReadTheDocs -- Coveralls -- Summary -- Chapter 4: Designing Runnerly -- The Runnerly application -- User stories -- Monolithic design -- Model -- View and Template -- Background tasks -- Strava token -- Authentication and authorization -- Putting together the monolithic design -- Splitting the monolith -- Data Service -- Using Open API 2.0 -- More splitting -- Summary -- Chapter 5: Interacting with Other Services -- Synchronous calls…”
Libro electrónico -
187por International Conference on High Performance ComputingTabla de Contenidos: “…-- Computational Environments for Coupling Multiphase Flow, Transport, and Mechanics in Porous Media -- The Excitement in Parallel Computing -- Session I: Performance Optimization -- Improving Performance of Digest Caches in Network Processors -- Optimization of BLAS on the Cell Processor -- Fine Tuning Matrix Multiplications on Multicore -- The Design and Architecture of MAQAOAdvisor: A Live Tuning Guide -- A Load Balancing Framework for Clustered Storage Systems -- Construction and Evaluation of Coordinated Performance Skeletons -- Session II: Parallel Algorithms and Applications -- Data Sharing Analysis of Emerging Parallel Media Mining Workloads -- Efficient PDM Sorting Algorithms -- Accelerating Cone Beam Reconstruction Using the CUDA-Enabled GPU -- Improving the Performance of Tensor Matrix Vector Multiplication in Cumulative Reaction Probability Based Quantum Chemistry Codes -- Experimental Evaluation of Molecular Dynamics Simulations on Multi-core Systems -- Parsing XML Using Parallel Traversal of Streaming Trees -- Session III: Scheduling and Resource Management -- Performance Analysis of Multiple Site Resource Provisioning: Effects of the Precision of Availability Information -- An Open Computing Resource Management Framework for Real-Time Computing -- A Load Aware Channel Assignment and Link Scheduling Algorithm for Multi-channel Multi-radio Wireless Mesh Networks -- Multi-round Real-Time Divisible Load Scheduling for Clusters -- Energy-Efficient Dynamic Scheduling on Parallel Machines -- A Service-Oriented Priority-Based Resource Scheduling Scheme for Virtualized Utility Computing -- Session IV: Sensor Networks -- Scalable Processing of Spatial Alarms -- Coverage Based Expanding Ring Search for Dense Wireless Sensor Networks -- An Energy-Balanced Task Scheduling Heuristic for Heterogeneous Wireless Sensor Networks -- Energy Efficient Distributed Algorithms for Sensor Target Coverage Based on Properties of an Optimal Schedule -- In-Network Data Estimation for Sensor-Driven Scientific Applications -- Localization in Ad Hoc and Sensor Wireless Networks with Bounded Errors -- Session V: Energy-Aware Computing -- Optimization of Fast Fourier Transforms on the Blue Gene/L Supercomputer -- ScELA: Scalable and Extensible Launching Architecture for Clusters -- Parallel Information Theory Based Construction of Gene Regulatory Networks -- Communication Analysis of Parallel 3D FFT for Flat Cartesian Meshes on Large Blue Gene Systems -- Scalable Multi-cores with Improved Per-core Performance Using Off-the-critical Path Reconfigurable Hardware -- Session VI: Distributed Algorithms -- TrustCode: P2P Reputation-Based Trust Management Using Network Coding -- Design, Analysis, and Performance Evaluation of an Efficient Resource Unaware Scheduling Strategy for Processing Divisible Loads on Distributed Linear Daisy Chain Networks -- A Novel Learning Based Solution for Efficient Data Transport in Heterogeneous Wireless Networks -- Scalable Data Collection in Sensor Networks -- Task Scheduling on Heterogeneous Devices in Parallel Pervasive Systems (P 2 S) -- A Performance Guaranteed Distributed Multicast Algorithm for Long-Lived Directional Communications in WANETs -- Session VII: Communication Networks -- Maintaining Quality of Service with Dynamic Fault Tolerance in Fat-Trees -- Designing a High-Performance Clustered NAS: A Case Study with pNFS over RDMA on InfiniBand -- Sockets Direct Protocol for Hybrid Network Stacks: A Case Study with iWARP over 10G Ethernet -- Making a Case for Proactive Flow Control in Optical Circuit-Switched Networks -- FBICM: Efficient Congestion Management for High-Performance Networks Using Distributed Deterministic Routing -- Achieving 10Gbps Network Processing: Are We There Yet? …”
Publicado 2008
Libro electrónico -
188por Summerfield, MarkTabla de Contenidos: “…Control Structures and Functions -- Control Structures -- Conditional Branching -- Looping -- Exception Handling -- Catching and Raising Exceptions -- Custom Exceptions -- Custom Functions -- Names and Docstrings -- Argument and Parameter Unpacking -- Accessing Variables in the Global Scope -- Lambda Functions -- Assertions -- Example: make_html_skeleton.py -- Summary -- Exercise -- Chapter 5. Modules -- Modules and Packages -- Packages -- Custom Modules -- Overview of Python's Standard Library -- String Handling -- Command-Line Programming -- Mathematics and Numbers…”
Publicado 2009
Libro electrónico -
189por Allen, Grant. author“…Begin at the beginning by installing the tools and compiling a skeleton app. Move through creating layouts, employing widgets, taking user input, and giving back results. …”
Publicado 2015
Libro electrónico -
190Publicado 2008Tabla de Contenidos: “…Debugging the Content Pipeline Extension -- Summary -- Part IV: 2D in XNA -- 9 2D Basics -- Sprite Batches -- Practical Sprite Batches -- Using Sprite Fonts -- Summary -- 10 2D Effects -- Cel Animation -- Rotating and Scaling -- Blending Mode Example -- Fade to Color -- Making Fire Old School Style -- Explosions -- Summary -- 11 Creating a 2D Game -- Setting Up the Game Skeleton -- Creating Parallax Scrolling -- Switching States -- Drawing Our Hero -- Drawing Our Enemies -- Handling Collision Detection -- Winning and Losing -- Adding Transitions -- Adding Explosions -- Adding Sounds -- Summary -- Part V: High Level Shader Language -- 12 HLSL Basics -- Understanding the Shader Process -- HLSL Syntax -- Vertext Shaders -- Pixel Shaders -- Techniques -- Passes -- Passing Application Data to the GPU -- HLSL Demo -- Summary -- 13 Advanced HLSL -- Vertex Displacement -- Postprocessing -- More Postprocessing Examples -- Summary -- Part VI: Physics and Artificial Intelligence -- 14 Physics Basics -- Kinesmatics -- Force -- Collisions -- Summary -- 15 Finite State Machines and Game State Management -- Finite State Machine -- Object-Oriented Design -- Managing Game States -- Managing Game States Demo -- Summary -- 16 AI Algorithms -- Setting Up Our Demo -- Chase Algorithm -- A Better Chase Algorithm -- Evading Algorithm -- Random Movement -- Creating a Finite State Machine -- Summary -- Part VII: 3D Effects -- 17 Advanced Texturing Techniques -- 3D Lighting -- Bump Mapping -- Normal Mapping -- Parallax Mapping -- Relief Mapping -- Texture Animation -- Summary -- 18 Special Effects -- Transitions -- Making Fire -- Summary -- 19 Particle System -- Particle System Defined -- Point Sprite Defined -- Creating the Particle Class -- Creating the VertexPointerSprite Struct -- Creating the Particle System Engine -- Point Sprite Effect File -- Particle System Demo…”
Libro electrónico -
191por Seitz, JustinTabla de Contenidos: “…7.2.2 Coding the Backdoor7.2.3 Compiling with py2exe; 8: Fuzzing; 8.1 Bug Classes; 8.1.1 Buffer Overflows; 8.1.2 Integer Overflows; 8.1.3 Format String Attacks; 8.2 File Fuzzer; 8.3 Future Considerations; 8.3.1 Code Coverage; 8.3.2 Automated Static Analysis; 9: Sulley; 9.1 Sulley Installation; 9.2 Sulley Primitives; 9.2.1 Strings; 9.2.2 Delimiters; 9.2.3 Static and Random Primitives; 9.2.4 Binary Data; 9.2.5 Integers; 9.2.6 Blocks and Groups; 9.3 Slaying WarFTPD with Sulley; 9.3.1 FTP 101; 9.3.2 Creating the FTP Protocol Skeleton; 9.3.3 Sulley Sessions; 9.3.4 Network and Process Monitoring…”
Publicado 2009
Libro electrónico -
192Publicado 2012Tabla de Contenidos: “…Notes -- Step 6. Thesis -- Step 7. Skeleton Plan -- Step 8. Final Plan -- Step 9. Writing -- Five Other Suggestions about Effective and Efficient Research -- Variety of Sources -- Availability of Information -- Minimal Photocopying and Printing -- Being Organized -- Writing -- General Tips about Different Kinds of Research -- Ideas and Terms -- People -- Companies -- Products or Industries -- Countries -- Footnotes -- Whether to Footnote -- When to Footnote -- How to Footnote -- IV. …”
Libro electrónico -
193Publicado 2024Tabla de Contenidos: “…Branding, customization, and Material icons -- Branding -- Color palette -- Implementing a browser manifest and icons -- Custom themes -- Custom icons -- Material icons -- Feature modules with lazy loading -- Configuring feature modules with components and routes -- Lazy loading -- Creating the walking skeleton -- The manager module -- User module -- POS and inventory modules -- PosModule -- InventoryModule -- Common testing module -- Designing around major data entities -- Defining entities -- High-level UX design -- Creating an artifacts wiki -- Leveraging mock-ups in your app -- Summary -- Exercise -- Further reading -- Questions -- Leave a review! …”
Libro electrónico -
194Publicado 2003Tabla de Contenidos: “…Getting started with development in C/C++ -- 5.1 Overview of programming environment -- 5.1.1 Globus libc APIs -- 5.1.2 Makefile -- 5.1.3 Globus module -- 5.1.4 Callbacks -- 5.2 Submitting a job -- 5.2.1 Shells commands -- 5.2.2 globusrun -- 5.2.3 GSIssh -- 5.2.4 Job submission skeleton for C/C++ applications -- 5.2.5 Simple broker -- 5.3 Summary -- Chapter 6. …”
Libro electrónico -
195por Gierer, GeraldTabla de Contenidos: “…Getting Started with Ext JS 4 -- The importance of application design -- Ext JS 4 MVC concepts -- Model -- View -- Controller -- Ext JS 4 flexibility -- Ext JS 4 design conventions and concepts -- Practical conventions -- Project structure -- Naming conventions -- Naming stores and models -- Naming views -- Naming controllers -- Naming xtypes -- The Ext JS 4 development environment -- Installing Sencha Cmd -- Installing Ext JS 4 SDK -- Generating the 3T Ext JS 4 application skeleton -- The index.html file -- The app.js and Application.js files -- The bootstrap.js and bootstrap.css files -- The app/Viewport.js and app/view/Main.js files -- The app/controller/Main.js file -- Creating components using Sencha Cmd -- Generating model skeletons -- Generating views and controllers using Sencha Cmd -- Summary -- 10. …”
Publicado 2013
Libro electrónico -
196por Musciano, ChuckTabla de Contenidos: “…; 1.6.1.2 Browser software; 1.6.2 An Extended Toolkit; Quick Start; 2.1 Writing Tools; 2.2 A First HTML Document; 2.3 Embedded Tags; 2.3.1 Start and End Tags; 2.4 HTML Skeleton; 2.5 The Flesh on an HTML or XHTML Document; 2.5.1 Comments; 2.5.2 Text; 2.5.3 Multimedia; 2.6 Text…”
Publicado 2011
Libro electrónico -
197por Musciano, ChuckTabla de Contenidos: “…; 1.6.1.2 Browser software; 1.6.2 An Extended Toolkit; Quick Start; 2.1 Writing Tools; 2.2 A First HTML Document; 2.3 Embedded Tags; 2.3.1 Start and End Tags; 2.4 HTML Skeleton; 2.5 The Flesh on an HTML or XHTML Document; 2.5.1 Comments; 2.5.2 Text…”
Publicado 2011
Libro electrónico -
198Publicado 2016Tabla de Contenidos: “…Translating the Assembly to Shellcode -- Writing the Code Cave to Memory -- Using Thread Injection to Execute the Code Cave -- Hijacking a Game's Main Thread to Execute Code Caves -- Building the Assembly Code Cave -- Generating Skeleton Shellcode and Allocating Memory -- Finding and Freezing the Main Thread -- Injecting DLLs for Full Control -- Tricking a Process into Loading Your DLL -- Accessing Memory in an Injected DLL -- Bypassing ASLR in an Injected DLL -- Closing Thoughts -- Chapter 8: Manipulating Control Flow in a Game -- NOPing to Remove Unwanted Code -- When to NOP -- How to NOP -- Hooking to Redirect Game Execution -- Call Hooking -- VF Table Hooking -- IAT Hooking -- Jump Hooking -- Applying Call Hooks to Adobe AIR -- Accessing the RTMP Goldmine -- Hooking the RTMPS encode() Function -- Hooking the RTMPS decode() Function -- Placing the Hooks -- Applying Jump Hooks and VF Hooks to Direct3D -- The Drawing Loop -- Finding the Direct3D Device -- Writing a Hook for EndScene() -- Writing a Hook for Reset() -- What's Next? …”
Libro electrónico -
199Publicado 2011Tabla de Contenidos: “…-- 1.3 Gaining an Understanding -- 1.4 Software Components -- Chapter 2 Windows Driver Foundation (WDF) Architecture -- 2.1 WDF Component Functions -- 2.2 Design Goals for WDF -- 2.3 Device and Driver Support in WDF -- 2.4 WDF Driver Model -- 2.5 WDF Object Model -- 2.6 Plug and Play and Power Management Support -- 2.7 Integrated I/O Queuing and Cancellation -- 2.8 WMI Requests (Kernel Mode Drivers Only) -- 2.9 Driver Frameworks -- 2.10 Windows Kernel -- 2.11 Tools for Development and Testing -- PART II: USER MODE DRIVERS -- Chapter 3 Windows 7 User Mode Drivers Overview and Operation -- 3.1 Devices Supported in User Mode -- 3.2 UMDF Model Overview -- 3.3 Driver Callback Interfaces -- 3.4 UMDF Driver Features -- 3.5 I/O Request Flow -- 3.6 I/O Queues -- 3.7 I/O Request Objects -- 3.8 Self-Managed I/O -- 3.9 Synchronization Issues -- 3.10 Locks -- 3.11 Plug and Play and Power Management Notification -- 3.12 Device Enumeration and Startup -- 3.13 Device Power-Down and Removal -- 3.14 Build, Test, and Debug -- Chapter 4 Programming Drivers for the User Mode Driver Framework -- 4.1 Windows I/O Overview -- 4.2 Brief COM Information -- 4.3 UMDF Architecture -- 4.4 Required Driver Functionality -- 4.5 UMDF Sample Drivers -- 4.6 Driver Dynamic-Link Library and Exports -- 4.7 Functions for COM Support -- 4.8 Using the Skeleton Driver as a Basis for Development -- Chapter 5 Using COM to Develop UMDF Drivers -- 5.1 Getting Started -- 5.2 Using UMDF COM Objects -- 5.3 Basic Infrastructure Implementation -- PART III: KERNEL MODE DRIVERS -- Chapter 6 Windows 7 Kernel Mode Drivers Overview and Operations -- 6.1 KMDF Supported Devices -- 6.2 KMDF Components…”
Libro electrónico -
200Publicado 2023Tabla de Contenidos: “…Dumping user credentials in clear text via DPAPI -- Summary -- References -- Further reading -- Chapter 5: Lateral Movement in Domain and Across Forests -- Technical requirements -- Usage of administration protocols in the domain -- PSRemoting and JEA -- RDP -- Other protocols with Impacket -- Relaying the hash -- Pass-the-whatever -- Pass-the-hash -- Pass-the-key and overpass-the-hash -- Pass-the-ticket -- Kerberos delegation -- Unconstrained delegation -- Resource-based constrained delegation -- Constrained delegation -- Bronze Bit attack aka CVE-2020-17049 -- Abusing trust for lateral movement -- Summary -- References -- Further reading -- Chapter 6: Domain Privilege Escalation -- Technical requirements -- Zero2Hero exploits -- MS14-068 -- Zerologon (CVE-2020-1472) -- PrintNightmare (CVE-2021-1675 & -- CVE-2021-34527) -- sAMAccountName Spoofing and noPac (CVE-2021-42278/CVE-2021-42287) -- RemotePotato0 -- ACL abuse -- Group -- Computer -- User -- DCSync -- Group Policy abuse -- Other privilege escalation vectors -- Built-in security groups -- DNSAdmins abuse (CVE-2021-40469) -- Child/parent domain escalation -- Privileged Access Management -- Summary -- References -- Further reading -- Chapter 7: Persistence on Domain Level -- Technical requirements -- Domain persistence -- Forged tickets -- A domain object's ACL and attribute manipulations -- DCShadow -- Golden gMSA -- Domain controller persistence -- Skeleton Key -- A malicious SSP -- DSRM -- Security descriptor alteration -- Summary -- References -- Chapter 8: Abusing Active Directory Certificate Services -- Technical requirements -- PKI theory -- Certificate theft -- THEFT1 - Exporting certificates using the CryptoAPI -- THEFT2 - User certificate theft via DPAPI -- THEFT3 - Machine certificate theft via DPAPI -- THEFT4 - Harvest for certificate files…”
Libro electrónico