Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 267
- Application software 238
- Java (Computer program language) 185
- Big data 162
- Cloud computing 155
- Streaming video 152
- Engineering & Applied Sciences 129
- Management 128
- Data mining 126
- Electronic data processing 117
- Computer networks 111
- Database management 98
- Data processing 90
- Computer Science 86
- Machine learning 83
- Computer programming 82
- Computer programs 82
- Python (Computer program language) 75
- Computer software 70
- Examinations 68
- Artificial intelligence 67
- Distributed processing 64
- Security measures 61
- Computer security 58
- Information technology 58
- Operating systems (Computers) 57
- Programming 56
- Microsoft .NET Framework 55
- Design 54
- Software engineering 53
-
1961por Suh, Jung W.Tabla de Contenidos: “…4.2.1 Column-Major Order 4.2.2 Row-Major Order; 4.2.3 Memory Layout for Complex Numbers in c-mex; 4.3 Logical Programming Model; 4.3.1 Logical Grouping 1; 4.3.2 Logical Grouping 2; 4.3.3 Logical Grouping 3; 4.4 Tidbits of GPU; 4.4.1 Data Parallelism; 4.4.2 Streaming Processor; 4.4.3 Steaming Multiprocessor; 4.4.4 Warp; 4.4.5 Memory; 4.5 Analyzing Our First Naïve Approach; 4.5.1 Optimization A: Thread Blocks; 4.5.2 Optimization B; 4.5.3 Conclusion; 5 MATLAB and Parallel Computing Toolbox; 5.1 Chapter Objectives; 5.2 GPU Processing for Built-in MATLAB Functions; 5.2.1 Pitfalls in GPU Processing…”
Publicado 2014
Libro electrónico -
1962Publicado 2018Tabla de Contenidos: “…Splitting videos into frames -- Approaches for classifying videos -- Fusing parallel CNN for video classification -- Classifying videos over long periods -- Streaming two CNN's for action recognition -- Using 3D convolution for temporal learning -- Using trajectory for classification -- Multi-modal fusion -- Attending regions for classification -- Extending image-based approaches to videos -- Regressing the human pose -- Tracking facial landmarks -- Segmenting videos -- Captioning videos -- Generating videos -- Summary -- Chapter 10: Deployment -- Performance of models -- Quantizing the models -- MobileNets -- Deployment in the cloud -- AWS -- Google Cloud Platform -- Deployment of models in devices -- Jetson TX2 -- Android -- iPhone -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
1963por Pogue, David, 1963-“…HomeGroups, connecting from the road, mail, Web, music streaming among PCs—this book has your network covered. …”
Publicado 2013
Libro electrónico -
1964por Saltzman, MarcTabla de Contenidos: “…Accessing Content in the Apple TV App -- Navigating the Apple TV+ content in Apple Vision Pro -- Buy, rent, or preorder media in Apple Vision Pro -- Playing rented content in the Apple TV app -- Watching Apple Immersive Video and 3D Movies -- Experiencing Encounter Dinosaurs in Apple Vision Pro -- Watch 3D Movies in Apple Vision Pro -- Watching Movies in an Apple Video Pro Environment -- Using Third-Party Streaming Services -- Chapter 10 Listening to Music and Podcasts -- Exploring the Apple Music App -- Understanding how the Music app is organized -- Playing music -- Subscribing to Apple Music -- Finding and playing Apple Music content -- Searching for music -- Adding music to Apple Vision Pro -- Playing Podcasts on Apple Vision Pro -- Chapter 11 Downloading and Reading E-Books -- Downloading Books onto Apple Vision Pro -- Creating a Collection and Adding Books to It -- Buying Books and Audiobooks in the Books App -- Reading Books on Apple Vision Pro -- Listening to Audiobooks on Apple Vision Pro -- Setting Reading Goals in the Books App -- Reading PDFs -- Chapter 12 Playing Games -- Finding and Downloading Games onto Apple Vision Pro -- Playing Games in Apple Vision Pro -- Using a Bluetooth Game Controller -- SharePlaying Games Using Spatial Personas -- Playing with Friends in Game Center -- Chapter 13 Capturing Photos and Videos -- Checking Out the Photos App -- Viewing Photos and Playing Videos -- Taking a Screenshot or Video with Apple Vision Pro -- Taking a screenshot -- Recording a video -- Sharing your screenshot or video -- Capturing, Viewing, and Sharing Spatial Photos and Videos -- Looking at Memories -- Casting Content from Apple Vision Pro to Another Screen -- Part 4 Being Productive with Apple Vision Pro -- Chapter 14 Searching the Web with Safari -- Browsing and Searching the Web in Apple Vision Pro -- Previewing Websites in Safari…”
Publicado 2024
Libro electrónico -
1965Publicado 2017Tabla de Contenidos: “…Testing the frontend -- Simulating AWS services locally -- Deploying your application -- Development workflow -- Blue-green deployment -- Deploying new versions with a different database model -- Creating a new table or column -- Renaming a table or column -- Dropping a table or column -- Rollback a deployment -- Creating staging environments -- Being careful with the production environment -- Test data -- Keeping your functions warm -- Monitoring the operation -- Monitoring costs -- Monitoring errors -- Retrieving metrics with the Serverless Framework -- Streaming Lambda logs -- Handling errors -- Monitoring performance -- Monitoring efficiency -- Summary -- Index…”
Libro electrónico -
1966
-
1967por Shelby, ZachTabla de Contenidos: “…4.1.5 Proxy Home Agent 100 -- 4.1.6 ProxyMIPv6 100 -- 4.1.7 NEMO 102 -- 4.2 Routing 104 -- 4.2.1 Overview 104 -- 4.2.2 The role of Neighbor Discovery 107 -- 4.2.3 Routing requirements 108 -- 4.2.4 Route metrics 109 -- 4.2.5 MANET routing protocols 111 -- 4.2.6 The ROLL routing protocol 114 -- 4.2.7 Border routing 119 -- 4.3 IPv4 Interconnectivity 120 -- 4.3.1 IPv6 transition 121 -- 4.3.2 IPv6-in-IPv4 tunneling 122 -- 5 Application Protocols 125 -- 5.1 Introduction 126 -- 5.2 Design Issues 127 -- 5.2.1 Linklayer 129 -- 5.2.2 Networking 130 -- 5.2.3 Host issues 130 -- 5.2.4 Compression 131 -- 5.2.5 Security 131 -- 5.3 Protocol Paradigms 132 -- 5.3.1 End-to-end 132 -- 5.3.2 Real-time streaming and sessions 132 -- 5.3.3 Publish/subscribe 133 -- 5.3.4 Web service paradigms 134 -- 5.4 Common Protocols 134 -- 5.4.1 Web service protocols 135 -- 5.4.2 MQ telemetry transport for sensor networks (MQTT-S) 137 -- 5.4.3 ZigBee compact application protocol (CAP) 139 -- 5.4.4 Service discovery 141 -- 5.4.5 Simple network management protocol (SNMP) 142 -- 5.4.6 Real-time transport and sessions 143 -- 5.4.7 Industry-specific protocols 144 -- 6 Using 6LoWPAN 149 -- 6.1 Chip Solutions 150 -- 6.1.1 Single-chip solutions 150 -- 6.1.2 Two-chip solutions 151 -- 6.1.3 Network processor solutions 151 -- 6.2 Protocol Stacks 152 -- 6.2.1 ContikianduIPv6 153 -- 6.2.2 TinyOS and BLIP 153 -- 6.2.3 Sensinode NanoStack 154 -- 6.2.4 Jennic6LoWPAN 155 -- 6.2.5 Nivis ISA100 155 -- 6.3 Application Development 156 -- 6.4 Edge Router Integration 159 -- 7 System Examples 163 -- 7.1 ISA100 Industrial Automation 164 -- 7.1.1 Motivation for industrial wireless sensor networks 164 -- 7.1.2 Complications of the industrial space 165 -- 7.1.3 The ISA100.11a standard 166 -- 7.1.4 ISA100.11a data link layer 169 -- 7.2 Wireless RFID Infrastructure 170 -- 7.2.1 Technical overview 172 -- 7.2.2 Benefits from 6LoWPAN 173 -- 7.3 Building Energy Savings and Management 174 -- 7.3.1 Network architecture 174 -- 7.3.2 Technical overview 174.…”
Publicado 2009
Libro electrónico -
1968por Litovski, IvanTabla de Contenidos: “…2.3.2 Creating a Database2.3.3 Creating a Table; 2.3.4 Creating an Index; 2.3.5 Inserting Records; 2.3.6 Selecting Records; 2.3.7 Updating a Record; 2.3.8 Updating Records Using Column Binding and Streaming; 2.3.9 Deleting a Record; 2.3.10 Closing a Database; 2.4 Summary; 3 The Relational Model; 3.1 Background; 3.1.1 The Three Components; 3.1.2 SQL and the Relational Model; 3.2 The Structural Component; 3.2.1 The Information Principle; 3.2.2 The Sanctity of the Logical Level; 3.2.3 The Anatomy of the Logical Level; 3.2.4 Tuples; 3.2.5 Relations; 3.2.6 Tables: Relation Variables…”
Publicado 2010
Libro electrónico -
1969Publicado 2024“…The fourth edition has been fully revised and updated to include a new chapter on how to break into the industry, expanded and updated sections on distribution (including theatrical and streaming platforms), set safety, colour grading, and legal matters, as well as updated insights from a diverse range of industry professionals. …”
Libro electrónico -
1970Publicado 2024“…You'll learn about the game-changing server-side rendering (SSR), a hybrid hosting model blending the strengths of Blazor Server and Blazor WebAssembly, as well as streaming rendering, a new technique that boosts the performance and user experience of Blazor apps. …”
Libro electrónico -
1971
-
1972por Press, Posts & TelecomTabla de Contenidos: “…封 -- 异步社区电子书 -- 版权声明 -- 内容提 -- 序 -- 简介 -- 前 -- 作 简介 -- 审 简介 -- 目录 -- 第1 章Hadoop 分布式文件系统-导入和导出数据 -- 1.1 介绍 -- 1.2 使用Hadoop shell 命令导入和导出数据到HDFS -- 1.3 使用distcp 实现 群 数据复制 -- 1.4 使用Sqoop 从MySQL 数据库导入数据到HDFS -- 1.5 使用Sqoop 从HDFS 导出数据到MySQL -- 1.6 置Sqoop 以支持SQL Server -- 1.7 从HDFS 导出数据到MongoDB -- 1.8 从MongoDB 导入数据到HDFS -- 1.9 使用Pig 从HDFS 导出数据到MongoDB -- 1.10 在Greenplum 外 中使用HDFS -- 1.11 利用Flume 加 数据到HDFS 中 -- 第2 章HDFS -- 2.1 介绍 -- 2.2 写HDFS 数据 -- 2.3 使用LZO 压缩数据 -- 2.4 写序列化文件数据 -- 2.5 使用Avro 序列化数据 -- 2.6 使用Thrift 序列化数据 -- 2.7 使用Protocol Buffers 序列化数据 -- 2.8 置HDFS 备份因子 -- 2.9 置HDFS 块大小 -- 第3 章抽取和 换数据 -- 3.1 介绍 -- 3.2 使用MapReduce 将Apache 日志 换为TSV 格式 -- 3.3 使用Apache Pig 滤网络服务器日志中的爬 -- 3.4 使用Apache Pig 根据时 戳对网络服务器日志数据排序 -- 3.5 使用Apache Pig 对网络服务器日志 会 分析 -- 3.6 Python 扩展Apache Pig 的功 -- 3.7 使用MapReduce 及二次排序 算 -- 3.8 使用Hive 和Python 清洗、 换地理事件数据 -- 3.9 使用Python 和Hadoop Streaming 执 时 序列分析 -- 3.10 在MapReduce中利用MultipleOutputs 出多个文件 -- 3.11 创建用户 定义的Hadoop Writable 及InputFormat 取地理事件数据 -- 第4 章使用Hive、Pig 和MapReduce 处理常 的任务 -- 4.1 介绍 -- 4.2 使用Hive 将HDFS 中的网络日志数据映射为外 -- 4.3 使用Hive 动态地为网络日志查 结果创建Hive -- 4.4 利用Hive 字符串UDF 拼接网络日志数据的各个字段 -- 4.5 使用Hive 截取网络日志的IP 字段并确定其对应的国家 -- 4.6 使用MapReduce 对新 档案数据生成n-gram -- 4.7 MapReduce 使用分布式缓存查找新 档案数据中包含关 的 -- 4.8 使用Pig 加 一个 并执 包含GROUP BY 的SELECT操作 -- 第5 章 级 接操作 -- 5.1 介绍 -- 5.2 使用MapReduce 对数据 接 -- 5.3 使用Apache Pig 对数据 复制 接 -- 5.4 使用Apache Pig 对有序数据 归并 接 -- 5.5 使用Apache Pig 对倾斜数据 倾斜 接 -- 5.6 在Apache Hive 中 map 端 接对地理事件 分析 -- 5.7 在Apache Hive 优化的全外 接分析地理事件数据 -- 5.8 使用外 值存储 Redis 接数据 -- 第6 章大数据分析 -- 6.1 介绍 -- 6.2 使用MapReduce 和Combiner 统 网络日志数据 中的独立IP 数 -- 6.3 用Hive 日期UDF 对地理事件数据 中的时 日期 换与排序 -- 6.4 使用Hive 创建基于地理事件数据的每月死亡报告 -- 6.5 实现Hive 用户 定义UDF 用于确 地理事件数据的来源可 性 -- 6.6 使用Hive 的map/reduce 操作以及Python 标 最 的无暴力发生的时 区 -- 6.7 使用Pig 算Audioscrobbler 数据 中 术家之 的余弦相似度 -- 6.8 使用Pig 以及datafu 剔 Audioscrobbler 数据 中的离群值…”
Publicado 2024
Libro electrónico -
1973Publicado 2017Tabla de Contenidos: “…Intro -- Title Page -- Copyright -- Dedication -- Preface -- Notes -- Introduction -- Notes -- PART I THE PERFECT INVESTMENT -- Chapter 1 How to Value an Asset -- Three Primary Components of Value -- Gems -- Notes -- Chapter 2 How to Value a Business -- Defining Cash Flow -- How to Calculate Present Value Using a Discounted Cash Flow Model -- Predicting the Future Is Not Easy -- How to Calculate the Present Value of a Bond -- How to Calculate the Present Value of a Perpetuity -- How to Calculate the Present Value of a Business -- How to Calculate the Present Value of a Growing Cash Flow Stream Using a Two-Stage DCF Model -- How to Think About the Discount Rate -- Gems -- Notes -- Chapter 3 How to Evaluate Competitive Advantage and Value Growth -- Cash Flow Generated by Selling Assets -- Cash Flow Generated by Operating the Assets: Return on Invested Capital, Cost of Capital, and Excess Returns -- Gems -- Notes -- Chapter 4 How to Think About a Security's Intrinsic Value -- What is "Intrinsic Value"? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1974Publicado 2017Tabla de Contenidos: “…3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1975Publicado 2018Tabla de Contenidos: “…-- Interacting with a live video stream -- How did we do it? -- Cartoonizing an image -- Deconstructing the code -- Summary -- Chapter 4: Detecting and Tracking Different Body Parts -- Using Haar cascades to detect things -- What are integral images? …”
Libro electrónico -
1976Publicado 2018Tabla de Contenidos: “…Installing and configuring Funktion -- The command-line client -- macOS 10.13 High Sierra -- Windows 10 Professional -- Ubuntu 17.04 -- Launching a single-node Kubernetes cluster -- Bootstrapping Funktion -- Deploying a simple function -- Twitter streams -- Summary -- Chapter 6: Installing Kubernetes in the Cloud -- Launching Kubernetes in DigitalOcean -- Creating Droplets -- Deploying Kubernetes using kubeadm -- Removing the cluster -- Launching Kubernetes in AWS -- Getting set up -- Launching the cluster using kube-aws -- The Sock Shop -- Removing the cluster -- Launching Kubernetes in Microsoft Azure -- Preparing the Azure command-line tools -- Launching the AKS cluster -- The Sock Shop -- Removing the cluster -- Launching Kubernetes on the Google Cloud Platform -- Installing the command-line tools -- Launching the Google container cluster -- The Sock Shop -- Running Kubeless -- Removing the cluster -- Summary -- Chapter 7: Apache OpenWhisk and Kubernetes -- Apache OpenWhisk overview -- Running Apache OpenWhisk locally -- Installing Vagrant -- Downloading and configuring Apache OpenWhisk -- Installing the Apache OpenWhisk client -- Hello world -- Running Apache OpenWhisk on Kubernetes -- Deploying OpenWhisk -- CouchDB -- Redis -- API Gateway -- ZooKeeper -- Kafka -- Controller -- Invoker -- NGINX -- Configuring OpenWhisk -- Hello world -- Summary -- Chapter 8: Launching Applications Using Fission -- Fission overview -- Installing the prerequisites -- Installing Helm -- Installing the Fission CLI -- Running Fission locally -- Launching Fission using Helm -- Working through the output -- Launching our first function -- A guestbook -- Fission commands -- The fission function command -- The create command -- The get option -- The list and getmeta commands -- The logs command -- The update command -- The delete command…”
Libro electrónico -
1977Publicado 2010Tabla de Contenidos: “…Cover -- The Rules of Life -- Contents -- Introduction -- Acknowledgements -- Rules for You -- Keep It Under Your Hat -- You'll Get Older but Not Necessarily Wiser -- Accept What Is Done Is Done -- Accept Yourself -- Know What Counts and What Doesn't -- Dedicate Your Life to Something -- Be Flexible in Your Thinking -- Take an Interest in the Outside World -- Be on the Side of the Angels, Not the Beasts -- Only Dead Fish Swim with the Stream -- Be the Last to Raise Your Voice -- Be Your Own Adviser -- No Fear, No Surprise, No Hesitation, No Doubt -- I Wish I'd Done That - and I Will -- It's Ok to Give Up -- Count to Ten - or Recite 'baa Baa Black Sheep' -- Change What You Can Change, Let Go of the Rest -- Aim to Be the Very Best at Everything You Do - Not Second Best -- Don't Expect to Be Perfect -- Don't Be Afraid to Dream -- If You're Going to Jump Off a Bridge, Make Sure You Know How Deep the Water Is -- Don't Dwell on the Past -- Don't Live in the Future -- Get on with Life - It's Whooshing Past -- Be Consistent -- Dress Like Today Is Important -- Have a Belief System -- Leave a Little Space for Yourself Each Day -- Have a Plan -- Have a Sense of Humour -- Choose How You Make Your Bed -- Life Can Be a Bit Like Advertising -- Get Used to Stepping Outside Your Comfort Zone -- Learn to Ask Questions -- Have Dignity -- It's Ok to Feel Big Emotions -- Keep the Faith -- You'll Never Understand Everything -- Know Where True Happiness Comes from -- Life Is a Pizza -- Always Have Someone - or Something - That Is Pleased to See You -- Know When to Let Go - When to Walk Away -- Retaliation Leads to Escalation -- Look After Yourself -- Maintain Good Manners in All Things -- Prune Your Stuff Frequently -- Remember to Touch Base -- Draw the Lines Around Yourself -- Shop for Quality, Not Price -- It's Ok to Worry, or to Know How Not to -- Stay Young…”
Libro electrónico -
1978Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Introduction -- New features in Java 8 -- Lambdas -- Streams -- The new java.time package -- Default methods -- New features in Java 9 -- Java Platform Module System/Project Jigsaw -- Process handling API -- Concurrency changes -- REPL -- Projects -- Process Viewer/Manager -- Duplicate File Finder -- Date Calculator -- Social Media Aggregator -- Email filter -- JavaFX photo management -- A client/server note application -- Serverless Java -- Android desktop synchronization client -- Getting started -- Summary -- Chapter 2: Managing Processes in Java -- Creating a project -- Bootstrapping the application -- Defining the user interface -- Initializing the user interface -- Adding menus -- Updating the process list -- Summary -- Chapter 3: Duplicate File Finder -- Getting started -- Building the library -- Concurrent Java with a Future interface -- Modern database access with JPA -- Building the command-line interface -- Building the graphical user interface -- Summary -- Chapter 4: Date Calculator -- Getting started -- Building the library -- A timely interlude -- Duration -- Period -- Clock -- Instant -- LocalDate -- LocalTime -- LocalDateTime -- ZonedDateTime -- Back to our code -- A brief interlude on testing -- Building the command-line interface -- Summary -- Chapter 5: Sunago - A Social Media Aggregator -- Getting started -- Setting up the user interface -- Setting up the controller -- Writing the model class -- Finishing up the controller -- Adding an image for the item -- Building the preferences user interface -- Saving user preferences -- Plugins and extensions with the Service Provider Interface -- Resource handling with try-with-resources -- Adding a network - Twitter…”
Libro electrónico -
1979Publicado 2007Tabla de Contenidos: “…1 - Second General Artificial Intelligence Workshop (GAIW 2007) -- Towards Tractable Local Closed World Reasoning for the Semantic Web -- Optimal Brain Surgeon for General Dynamic Neural Networks -- Answer-Set Programming Based Dynamic User Modelling for Recommender Systems -- Application of Logic Wrappers to Hierarchical Data Extraction from HTML -- Relaxing Feature Selection in Spam Filtering by Using Case-Based Reasoning Systems -- Gödel and Computability -- Prospective Logic Agents -- An Iterative Process for Building Learning Curves and Predicting Relative Performance of Classifiers -- Modelling Morality with Prospective Logic -- Change Detection in Learning Histograms from Data Streams -- Real-Time Intelligent Decision Support System for Bridges Structures Behavior Prediction -- Semi-fuzzy Splitting in Online Divisive-Agglomerative Clustering -- On the Use of Rough Sets for User Authentication Via Keystroke Dynamics -- The Halt Condition in Genetic Programming -- Two Puzzles Concerning Measures of Uncertainty and the Positive Boolean Connectives -- 2 - First Workshop on AI Applications for Sustainable Transportation Systems (AIASTS 2007) -- Nonlinear Models for Determining Mode Choice -- Adaptation in Games with Many Co-evolving Agents -- 3 - Third Workshop on Artificial Life and Evolutionary Algorithms (ALEA 2007) -- Symmetry at the Genotypic Level and the Simple Inversion Operator -- A Genetic Programming Approach to the Generation of Hyper-Heuristics for the Incapacitated Examination Timetabling Problem -- Asynchronous Stochastic Dynamics and the Spatial Prisoner’s Dilemma Game -- Improving Evolutionary Algorithms with Scouting -- Stochastic Barycenters and Beta Distribution for Gaussian Particle Swarms -- Exploiting Second Order Information in Computational Multi-objective Evolutionary Optimization -- 4 - First Workshop on Ambient Intelligence Technologies and Applications (AMITA 2007) -- Ambient Intelligence – A State of the Art from Artificial Intelligence Perspective -- Ubiquitous Ambient Intelligence in a Flight Decision Assistance System -- Argumentation-Based Decision Making in Ambient Intelligence Environments -- Intelligent Mixed Reality for the Creation of Ambient Assisted Living -- Medical Imaging Environment – A Multi-Agent System for a Computer Clustering Based Multi-display -- 5 - Second Workshop on Building and Applying Ontologies for the Semantic Web (BAOSW 2007) -- Partial and Dynamic Ontology Mapping Model in Dialogs of Agents -- Using Ontologies for Software Development Knowledge Reuse -- 6 - First Workshop on Business Intelligence (BI 2007) -- Analysis of the Day-of-the-Week Anomaly for the Case of Emerging Stock Market -- A Metamorphosis Algorithm for the Optimization of a Multi-node OLAP System -- Experiments for the Number of Clusters in K-Means -- A Network Algorithm to Discover Sequential Patterns -- Adaptive Decision Support for Intensive Care -- A Tool for Interactive Subgroup Discovery Using Distribution Rules -- Quantitative Evaluation of Clustering’s for Marketing Applications: A Web Portal Case Study -- Resource-Bounded Fraud Detection -- 7 - First Workshop on Computational Methods in Bioinformatics and Systems Biology (CMBSB 2007) -- System Stability Via Stepping Optimal Control: Theory and Applications -- Evaluating Simulated Annealing Algorithms in the Optimization of Bacterial Strains -- Feature Extraction from Tumor Gene Expression Profiles Using DCT and DFT -- 8 - Second Workshop on Intelligent Robotics (IROBOT 2007) -- An Omnidirectional Vision System for Soccer Robots -- Generalization and Transfer Learning in Noise-Affected Robot Navigation Tasks -- Heuristic Q-Learning Soccer Players: A New Reinforcement Learning Approach to RoboCup Simulation -- Human Robot Interaction Based on Bayesian Analysis of Human Movements -- Understanding Dynamic Agent’s Reasoning -- 9 - Fourth Workshop on Multi-agent Systems: Theory and Applications (MASTA 2007) -- Convergence of Independent Adaptive Learners -- Multi-agent Learning: How to Interact to Improve Collective Results -- A Basis for an Exchange Value-Based Operational Notion of Morality for Multiagent Systems -- Intelligent Farmer Agent for Multi-agent Ecological Simulations Optimization -- Tax Compliance Through MABS: The Case of Indirect Taxes -- 10 - First Workshop on Search Techniques for Constraint Satisfaction (STCS 2007) -- Efficient and Tight Upper Bounds for Haplotype Inference by Pure Parsimony Using Delayed Haplotype Selection -- GRASPER -- 11 - Second Workshop on Text Mining and Applications (TEMA 2007) -- Text Segmentation Using Context Overlap -- Automatic Extraction of Definitions in Portuguese: A Rule-Based Approach -- N-Grams and Morphological Normalization in Text Classification: A Comparison on a Croatian-English Parallel Corpus -- Detection of Strange and Wrong Automatic Part-of-Speech Tagging -- New Techniques for Relevant Word Ranking and Extraction…”
Libro electrónico -
1980por Rumsey, FrancisTabla de Contenidos: “…2.4.2 Filtering and aliasing2.4.3 Quantisation; 2.4.4 Relationship between sample resolution and sound quality; 2.4.5 Use of dither; 2.4.6 Types of dither; 2.4.7 Oversampling in A/D conversion; 2.4.8 Noise shaping in A/D conversion; 2.5 D/A conversion; 2.5.1 A basic D/A convertor; 2.5.2 Oversampling in D/A conversion; 2.6 Sound quality versus sample rates and resolutions; 2.6.1 Psychoacoustic limitations; 2.6.2 Sampling rate; 2.6.3 Quantising resolution; 2.7 Direct Stream Digital (DSD); 2.8 Changing the resolution of an audio signal (requantisation); 2.9 Dynamic range enhancement…”
Publicado 2004
Libro electrónico