Mostrando 2,501 - 2,520 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.52s Limitar resultados
  1. 2501
    por Storey, Dudley
    Publicado 2012
    Tabla de Contenidos:
    Libro electrónico
  2. 2502
    Tabla de Contenidos: “…Build a global process repository -include local requirementsHave clear interface requirements; Identify events; Identify workflow; Use reports, key performance indicators, dashboards; Clean the master data; Role-based access control (RBAC)-one who creates cannot approve; Validate the solution against architecture guiding principles; Decide on an implementation strategy-manageable, in stages; Select a product (if you haven't already); Learn from previous experience; Inventory systems to be replaced; Identify SI partners; Select the implementation team; Establish project teams; Implementation…”
    Libro electrónico
  3. 2503
    Publicado 2015
    Tabla de Contenidos: “…Cryptographic Hash Functions Verify InformationPublic Key Cryptography; Digital Signatures; Using Digital Signatures; Why Bitcoin Needs Cryptography; Authorizing Transactions with Digital Signatures; Verifying the Validity of the Transaction History; Proof-of-Work in Bitcoin Mining; Extra Protection for Bitcoin Private Keys ; Cryptographic Methods Used in Bitcoin; Cryptographic Hash Functions: SHA256 and RIPEMD160 ; Crowley and the Unfortunate Jelly-Filled Donut Incident; Moving Around on a Line; Elliptic Curve Digital Signature Algorithm (ECDSA) ; The Safety of Bitcoin's Cryptography…”
    Libro electrónico
  4. 2504
    Tabla de Contenidos: “…Decision TreesBoosted Decision Trees; Classification Algorithms; Support Vector Machines; Bayes Point Machines; Clustering Algorithms; Summary; Part3: Practical Applications; Chapter 5: Building Customer Propensity Models; The Business Problem; Data Acquisition and Preparation; Loading Data from Your Local File System; Loading Data from Other Sources; Data Analysis; More Data Treatment; Feature Selection; Training the Model; Model Testing and Validation; Model Performance; Summary; Chapter 6: Building Churn Models; Churn Models in a Nutshell; Building and Deploying a Customer Churn Model…”
    Libro electrónico
  5. 2505
    Publicado 2015
    Tabla de Contenidos: “…:root:not(); UI Element States; Constraint Validation Pseudo-classes; Pseudo-elements; The ::selection Pseudo-element; Summary; DOM and Attribute Selectors: Browser Support; Chapter 5: Web Fonts; The @font-face Rule; Defining Different Faces; True vs. …”
    Libro electrónico
  6. 2506
    Publicado 2015
    Tabla de Contenidos: “…MacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure Sockets…”
    Libro electrónico
  7. 2507
    Publicado 2008
    Tabla de Contenidos: “…; Configuring WDS; Capturing WDS Images; Deploying WDS Images; Configuring Storage; RAID Types; Network Attached Storage; Storage Area Networks; Fibre Channel; iSCSI; iSCSI Initiators and Targets; Mount Points; Configuring High Availability; Failover Clusters; Installing and Validating a Failover Cluster; Managing the Failover Cluster; Network Load Balancing; Configuring Windows Activation; Using Multiple Activation Keys; Using Key Management Service Keys; License States; Reporting; Installing a KMS…”
    Libro electrónico
  8. 2508
    Publicado 2008
    Tabla de Contenidos: “…; Configuring WDS; Capturing WDS Images; Deploying WDS Images; Configuring Storage; RAID Types; Network Attached Storage; Storage Area Networks; Fibre Channel; iSCSI; iSCSI Initiators and Targets; Mount Points; Configuring High Availability; Failover Clusters; Installing and Validating a Failover Cluster; Managing the Failover Cluster; Network Load Balancing; Configuring Windows Activation; Using Multiple Activation Keys; Using Key Management Service Keys; License States; Reporting; Installing a KMS; Creating a DNS SRV Record…”
    Libro electrónico
  9. 2509
    Publicado 2005
    Tabla de Contenidos: “…; A Simple Tag File: Displaying Today's Date; Advantages of Tag Files; Developing Tag Files; Packaging Tag Files; Summary; Exercises; Chapter 12: Advanced Dynamic Web Content Generation; Data Validation in Web Applications; Summary; Exercises; Chapter 13: Internationalization and Localized Content; About Internationalization-Ready Applications…”
    Libro electrónico
  10. 2510
    Publicado 2023
    Tabla de Contenidos: “…The Planner and Software Interface -- Driver Start Time -- Setting SMVs1 (Standard Minute Values) for Customer On-Site Time -- Two Methods of Deploying Scheduling Software -- Validating Route Efficiency -- "Miss" Notification -- Depot Strategic Modelling -- Rationalising the Depot Network -- Retention Payments -- Notes -- Chapter 4 Minimising Non-Productive Hours -- Introduction -- Minimising On-Depot Time (Non-Productive Time) -- Why Is This Important? …”
    Libro electrónico
  11. 2511
    Publicado 2023
    Tabla de Contenidos: “…Tool Demos -- EVA: a Tool for the Compositional Verification of AUTOSAR Models -- WASIM: A Word-level Abstract Symbolic Simulation Framework for Hardware Formal Verification -- Multiparty Session Typing in Java, Deductively -- PyLTA: A Verification Tool for Parameterized Distributed Algorithms -- FuzzBtor2: A Random Generator of Word-Level Model Checking Problems in Btor2 Format -- Eclipse ESCETTM: The Eclipse Supervisory Control Engineering Toolkit -- Combinatorial Optimization/Theorem Proving -- New Core-Guided and Hitting Set Algorithms for Multi-Objective Combinatorial Optimization -- Verified reductions for optimization -- Specifying and Verifying Higher-order Rust Iterators -- Extending a High-Performance Prover to Higher-Order Logic -- Tools (Regular Papers) -- The WhyRel Prototype for Relational Verification of Pointer Programs -- Bridging Hardware and Software Analysis with Btor2C: A Word-Level-Circuit-to-C Converter -- CoPTIC: Constraint Programming Translated Into C -- Acacia-Bonsai: A Modern Implementation of Downset-Based LTL Realizability -- Synthesis -- Computing Adequately Permissive Assumptions for Synthesis -- Verification-guided Programmatic Controller Synthesis -- Taming Large Bounds in Synthesis from Bounded-Liveness Specifications -- Lockstep Composition for Unbalanced Loops -- Synthesis of Distributed Agreement-Based Systems with Effciently Decidable Verification -- LTL Reactive Synthesis with a Few Hints -- Timed Automata Verification and Synthesis via Finite Automata Learning -- Graphs/Probabilistic Systems -- A Truly Symbolic Linear-Time Algorithm for SCC Decomposition -- Transforming quantified Boolean formulas using biclique covers -- Certificates for Probabilistic Pushdown Automata via Optimistic Value Iteration -- Probabilistic Program Verification via Inductive Synthesis of Inductive Invariants -- Runtime Monitoring/Program Analysis -- Industrial-Strength Controlled Concurrency Testing for C# Programs with Coyote -- Context-Sensitive Meta-Constraint Systems for Explainable Program Analysis -- Explainable Online Monitoring of Metric Temporal Logic -- 12th Competition on Software Verification — SV-COMP 2023 -- Competition on Software Verification and Witness Validation: SV-COMP 2023 -- Symbiotic-Witch 2: More Efficient Algorithm and Witness Refutation (Competition Contribution) -- 2LS: Arrays and Loop Unwinding (Competition Contribution) -- Bubaak: Runtime Monitoring of Program Verifiers (Competition Contribution) -- EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs (Competition Contribution) -- Goblint: Autotuning Thread-Modular Abstract Interpretation (Competition Contribution) -- Java Ranger: Supporting String and Array Operations (Competition Contribution) -- Korn–Software Verification with Horn Clauses (Competition Contribution) -- Mopsa-C: Modular Domains and Relational Abstract Interpretation for C Programs (Competition Contribution) -- PIChecker: A POR and Interpolation based Verifier for Concurrent Programs (Competition Contribution) -- Ultimate Automizer and the CommuHash Normal Form (Competition Contribution) -- Ultimate Taipan and Race Detection in Ultimate (Competition Contribution) -- VeriAbsL: Scalable Verification by Abstraction and Strategy Prediction (Competition Contribution) -- VeriFuzz 1.4: Checking for (Non-)termination (Competition Contribution). …”
    Libro electrónico
  12. 2512
    Publicado 2023
    Tabla de Contenidos: “…Quality of Early Learning Environments: Measures, Validation, and Effects on Child Development (Sabine Weinert, Manja Attig, Anja Linberg, Franziska Vogel and Hans-Günther Rossbach) -- 3. …”
    Libro electrónico
  13. 2513
    por Lowery, Joseph
    Publicado 2009
    Tabla de Contenidos: “…Adding Code Through the Snippets PanelUsing the Reference Panel; Modifying Code with the Tag Inspector; Rapid Tag Modification with the Quick Tag Editor; Adding Java Applets; Managing JavaScript and VBScript; Validating Your Page; Inserting Symbols and Special Characters; Summary; Chapter 7: Building Style Sheet Web Pages; Understanding Cascading Style Sheets; Working with the CSS Styles Panel; Creating and Applying Styles; Styles and Their Attributes; Design Time Style Sheets; Summary; Chapter 8: Working with Text; Starting with Headings; Working with Paragraphs; Checking Your Spelling…”
    Libro electrónico
  14. 2514
    Publicado 2018
    Tabla de Contenidos: “…Lindenmayer (1963-1965) -- 2 Unusable set of axioms and used set of axioms -- 3 From logical theory to automata theory (1966-1967) -- 4 The "developmental model" and the rules of rewriting (1968) -- 5 The dispute with Brian Carey Goodwin regarding "natural" formalisms -- 6 Recap: the computer as automata model and deductive machine -- Chapter 3: The limitations of biometric models and the transition to simulation in agronomy -- 1 The institutional and technical context of the IFCC (1966-1971) -- 2 Transferring a little bit of econometrics to biometrics: a problem of optimization (1974) -- 3 The first application of plant simulation in agronomics (1974-1975) -- 4 Fragmented modelling and geometric simulation: de Reffye (1975-1981) -- 5 Simulation, imitation and the sub-symbolic use of formalisms -- Chapter 4: A random and universal architectural simulation -- 1 Making headway in botany: the notion of "architectural model" (1966-1978) -- 2 The search for botanical realism (1978-1979) -- 3 Criticisms of theoretical models -- 4 Criticisms of biometric models -- 5 A mixed reception (1979-1981) -- Chapter 5: Convergence between integrative simulation and computer graphics -- 1 The relaunch of research into architectural simulation (1985-1991) -- 2 Jaegers thesis: the prefixed model and synthesis of botanical images (1987) -- 3 Blaises thesis: the simulation of buds parallelism (1991) -- 4 How can an integrative simulation be validated? -- Chapter 6: Convergence between universal simulation and forestry (1990-1998) -- 1 An epistemological dispute between modellers: INRA and CIRAD -- 2 Conceptual and institutional convergence: the CIRAD/INRA partner laboratory (1995) -- 3 The empirical value of simulation -- 4 Supra-simulations -- Chapter 7: The remathematization of simulations (from 1998 onwards) -- 1 The first mixed structure-function model: "water efficiency" (1997-1999) -- 2 The parallel evolution of algorithmic simulation: 1984-1994 -- 3 Simulating the individual plant in order to observe crop functioning (1997-2000) -- 4 The association between AMAP and INRIA: sub-structures and factorization (1998-2006) -- 5 Recap: pluriformalized simulation and convergence between disciplines -- Chapter 8: Twenty-one functions of models and three types of simulations Classifications and applications -- 1 General function, main functions and specific functions of models -- 2 General characterization and classification of computer simulations -- 3 System simulation, model simulation, system-simulation model and model-simulation model -- 4 Applications to different plant models and plant simulations -- Conclusion -- --Glossary -- Selected Bibliography -- Index of names -- Index of subjects…”
    Libro electrónico
  15. 2515
    Publicado 2015
    Tabla de Contenidos: “…Model Building and Toolkits -- 8. Pilot Testing, Validation and Awareness -- 9. Toolkit Guidelines and Quality of the Tools -- 10.Conclusions -- CHAPTER 4 THE DEMAND FOR COMPETENCES IN SOCIAL ECONOMY ORGANIZATIONS. …”
    Libro electrónico
  16. 2516
    Publicado 2023
    Tabla de Contenidos: “…Using a directory structure to manage environments -- Using remote states -- Using template files -- Managing Terraform at scale -- Summary -- Part 2: Completing the Picture -- Chapter 6: Deploying a Traditional Three-Tier Architecture -- Technical requirements -- Overview -- Laying the foundation -- Provisioning the database -- Provisioning a MIG and global load balancer -- Summary -- Chapter 7: Deploying a Cloud-Native Architecture Using Cloud Run -- Technical requirements -- Overview -- Provisioning Redis and connecting it via a VPC connector -- Using Terraform to configure a flexible load balancer for Cloud Run -- Using Terraform to provision Cloud Run services -- To Terraform or not to Terraform -- Summary -- Chapter 8: Deploying GKE Using Public Modules -- Technical requirements -- Overview -- Developing a variable strategy -- Provisioning a network using the public module -- Provisioning a GKE cluster using the public module -- Using workspaces to deploy to development and production environments -- Summary -- Part 3: Wrapping It Up -- Chapter 9: Developing Terraform Code Efficiently -- Technical requirements -- VS Code Terraform Extension -- Syntax highlighting and validation -- Intelligent auto-completion -- Code navigation -- tflint -- Checkov -- Terragrunt -- Summary -- Chapter 10: Google Cloud Integration -- Technical requirements -- Using Terraform with Cloud Build -- Building a service catalog with Terraform solutions -- Importing and exporting Terraform resources -- Google Cloud export -- Summary -- Closing thoughts -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  17. 2517
    Publicado 2023
    Tabla de Contenidos: “…. -- See also -- Chapter 6: Validating (Data) Inputs - Part 1 -- Technical requirements -- Testing for reflected XSS -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for HTTP verb tampering -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for HTTP Parameter Pollution (HPP) -- Getting ready -- How to do it... -- How it works... -- See also -- Testing for SQL Injection -- Getting ready -- How to do it... -- How it works...…”
    Libro electrónico
  18. 2518
    Publicado 2024
    Tabla de Contenidos: “…Exploring different types of regression -- Introducing linear regression -- Linear regression model in MATLAB -- Making predictions with regression analysis in MATLAB -- Multiple linear regression with categorical predictor -- Evaluating model performance -- Reducing outlier effects -- Using advanced techniques for model evaluation and selection in MATLAB -- Understanding k-fold cross-validation -- Exploring leave-one-out cross-validation -- Introducing the bootstrap method -- Summary -- Chapter 4: Clustering Analysis and Dimensionality Reduction -- Technical requirements -- Understanding clustering - basic concepts and methods -- How to measure similarity -- How to find centroids and centers -- How to define a grouping -- Understanding hierarchical clustering -- Partitioning-based clustering algorithms with MATLAB -- Introducing the k-means algorithm -- Using k-means in MATLAB -- Grouping data using the similarity measures -- Applying k-medoids in MATLAB -- Discovering dimensionality reduction techniques -- Introducing feature selection methods -- Exploring feature extraction algorithms -- Feature selection and feature extraction using MATLAB -- Stepwise regression for feature selection -- Carrying out PCA -- Summary -- Chapter 5: Introducing Artificial Neural Network Modeling -- Technical requirements -- Getting started with ANNs -- Basic concepts relating to ANNs -- Understanding how perceptrons work -- Activation function to introduce non-linearity -- ANN's architecture explained -- Training and testing an ANN model in MATLAB -- How to train an ANN -- Introducing the MATLAB Neural Network Toolbox -- Understanding data fitting with ANNs -- Discovering pattern recognition using ANNs -- Building a clustering application with an ANN -- Exploring advanced optimization techniques -- Understanding SGD -- Exploring Adam optimization…”
    Libro electrónico
  19. 2519
    Publicado 2017
    Tabla de Contenidos: “…Results and comparison with benchmarks -- 7.4.1. Validation with benchmarks -- 7.4.2. Parallelization of the process on a GP/GPU card -- 7.5. …”
    Libro electrónico
  20. 2520
    Publicado 2018
    Tabla de Contenidos: “…. -- How it works... -- Implementing validation in a form -- How to do it... -- How it works... -- Chapter 7: Animations with React -- Introduction -- Animating a todo list with ReactCSSTransitionGroup -- Getting Ready -- How to do it... -- How it works... -- Using react-animations library -- Getting ready -- How to do it... -- There's more... -- Creating our first animation with React Pose -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 8: Creating an API with Node.js Using MongoDB and MySQL -- Introduction -- Creating a basic API with Express -- Getting ready -- How to do it…”
    Libro electrónico