Mostrando 2,861 - 2,880 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.49s Limitar resultados
  1. 2861
    por Institute of Medicine (U.S.).
    Publicado 1985
    Tabla de Contenidos: “…References -- Chapter 3 Trends in Low Birthweight -- OVERALL TRENDS IN LOW BIRTHWEIGHT RATES -- THE COMPOSITION OF LOW-WEIGHT BIRTHS -- SOCIODEMOGRAPHIC CHARACTERISTICS -- PREGNANCY HISTORY -- PRENATAL CARE -- ANALYSIS OF 1981 SINGLE LIVE BIRTHS IN THE UNITED STATES -- CONCLUSIONS -- References and Notes -- PART II REDUCING THE INCIDENCE OF LOW BIRTHWEIGHT -- Chapter 4 An Overview of Promising Interventions -- PROMISING STRATEGIES -- NATIONAL DIRECTION FOR AN NATIONAL PROBLEM -- References and Notes -- Chapter 5 Planning for Pregnancy -- PREPREGNANCY RISK IDENTIFICATION AND REDUCTION -- ENLARGING THE CONTENT OF HEALTH EDUCATION -- THE ROLE OF FAMILY PLANNING IN REDUCING LOW BIRTHWEIGHT -- Unmet Need for Family Planning -- SUMMARY -- References and Notes -- Chapter 6 The Effectiveness of Prenatal Care -- ISSUES IN STUDYING THE EFFECTS OF PRENATAL CARE -- Research Design -- Defining Prenatal Care -- Validity of Data -- Control Variables -- Selection Bias -- REVIEW OF STUDIES OF PRENATAL CARE EFFECTS -- Results of Studies Using Large Data Bases -- Results of Program Evaluations -- CONCLUSIONS -- References and Notes -- Chapter 7 Ensuring Access to Prenatal Care -- WHO RECEIVES INADEQUATE PRENATAL CARE? …”
    Libro electrónico
  2. 2862
    Publicado 2022
    Tabla de Contenidos: “…-- Summary -- Chapter 2: The Life Cycle of a Human-Operated Ransomware Attack -- Initial attack vectors -- RDP compromise -- Spear phishing -- Software vulnerabilities -- Post-exploitation -- Data exfiltration -- Ransomware deployment -- Summary -- Chapter 3: The Incident Response Process -- Preparation for an incident -- The team -- The infrastructure -- Threat detection and analysis -- Containment, eradication, and recovery -- Post-incident activity -- Summary -- Section 2: Know Your Adversary: How Ransomware Gangs Operate -- Chapter 4: Cyber Threat Intelligence and Ransomware -- Strategic cyber threat intelligence -- Operational cyber threat intelligence -- Tactical cyber threat intelligence -- Summary -- Chapter 5: Understanding Ransomware Affiliates' Tactics, Techniques, and Procedures -- Gaining initial access -- External remote services (T1133) -- Exploiting public-facing applications (T1190) -- Phishing (T1566) -- Supply chain compromise (T1195) -- Executing malicious code -- User execution (T1204) -- Command and scripting interpreters (T1059) -- Exploitation for client execution (T1203) -- Windows Management Instrumentation (T1047) -- Obtaining persistent access -- Valid accounts (T1078) -- Create account (T1136) -- Boot or logon autostart execution (T1547) -- Scheduled task/job (T1053)…”
    Libro electrónico
  3. 2863
    Publicado 2004
    Tabla de Contenidos: “…-- Popular culture and sensational interests -- Mechanisms underlying sensational interests: arousal -- Mechanisms underlying sensational interests: evolution and mating effort -- Evidence linking fantasies, interests and behaviour -- Personality and sensational interests -- Systematic research into the topic: validating a measure of sensational interests -- Basic principles: sensation-seeking intelligence -- Are sensational interests associated with DSM-IV personality disorder? …”
    Libro electrónico
  4. 2864
    Publicado 2020
    Tabla de Contenidos: “…Bartone and Peter Mikoski -- Validity Assessment in Military Psychology / Noah K. …”
    Libro electrónico
  5. 2865
    Publicado 2022
    Tabla de Contenidos: “…Afonso -- Experimental Validation of a Reduced-Scale Rail Power Conditioner Based on Modular -- Multilevel Converter for AC Railway Power Grids -- Reprinted from: Energies 2021, 14, 484, doi:10.3390/en14020484 - 141 -- Vaclav Kus, Bohumil Skala and Pavel Drabek -- Complex Design Method of Filtration Station Considering Harmonic Components -- Reprinted from: Energies 2021, 14, 5872, doi:10.3390/en14185872 - 169 -- Qiujiang Liu, Binghan Sun, Qinyao Yang, Mingli Wu and Tingting He -- Harmonic Overvoltage Analysis of Electric Railways in a Wide Frequency Range Based on -- Relative Frequency Relationships of the Vehicle-Grid Coupling System -- Reprinted from: Energies 2020, 13, 6672, doi:10.3390/en13246672 - 187 -- Andrea Mariscotti and Leonardo Sandrolini -- Detection of Harmonic Overvoltage and Resonance in AC Railways Using Measured -- Pantograph Electrical Quantities -- Reprinted from: Energies 2021, 14, 5645, doi:10.3390/en14185645 - 203 -- Yljon Seferi, Steven M. …”
    Libro electrónico
  6. 2866
    Publicado 2015
    Tabla de Contenidos: “…Barsties, Y.Maryn, EXTERNAL VALIDATION OF THE ACOUSTIC VOICE QUALITY INDEX VERSION 03.01 WITH EXTENDED REPRESENTATIVITY -- September 3 FP - Singing-Infants -- D. …”
    Libro electrónico
  7. 2867
    Publicado 2024
    Tabla de Contenidos: “…Manual scaling with Python -- Autoscaling with Python based on a trigger -- Containers and where Python fits in with containers -- Simplifying Docker administration with Python -- Managing Kubernetes with Python -- Summary -- Part 2: Sample Implementations of Python in DevOps -- Chapter 5: Manipulating Resources -- Technical requirements -- Event-based resource adjustment -- Edge location-based resource sharing -- Testing features on a subset of users -- Analyzing data -- Analysis of live data -- Analysis of historical data -- Refactoring legacy applications -- Optimize -- Refactor -- Restart -- Summary -- Chapter 6: Security and DevSecOps with Python -- Technical requirements -- Securing API keys and passwords -- Store environment variables -- Extract and obfuscate PII -- Validating and verifying container images with Binary Authorization -- Incident monitoring and response -- Running runbooks -- Pattern analysis of monitored logs -- Summary -- Chapter 7: Automating Tasks -- Automating server maintenance and patching -- Sample 1: Running fleet maintenance on multiple instance fleets at once -- Sample 2: Centralizing OS patching for critical updates -- Automating container creation -- Sample 1: Creating containers based on a list of requirements -- Sample 2: Spinning up Kubernetes clusters -- Automated launching of playbooks based on parameters -- Summary -- Chapter 8: Understanding Event-Driven Architecture -- Technical requirements -- Introducing Pub/Sub and employing Kafka with Python using the confluent-kafka library -- Understanding the importance of events and consequences -- Exploring loosely coupled architecture -- Killing your monolith with the strangler fig -- Summary -- Chapter 9: Using Python for CI/CD Pipelines -- Technical requirements -- The origins and philosophy of CI/CD -- Scene 1 - continuous integration…”
    Libro electrónico
  8. 2868
    Publicado 1992
    Tabla de Contenidos: “…Biologic Markers in Immunotoxicology -- Copyright -- Preface -- Contents -- List of Abbreviations -- Summary -- HYPERSENSITIVITY -- AUTOIMMUNITY -- IMMUNE SUPPRESSION -- BIOASSAYS OF IMMUNOTOXICITY -- CLINICAL APPLICATION OF EXISTING IMMUNOTOXICOLOGIC BIOLOGIC MARKERS -- ROLE OF BIOLOGIC MARKERS OF IMMUNOTOXICITY IN EPIDEMIOLOGY -- INDOOR AIR POLLUTION AND MULTIPLE CHEMICAL SENSITIVITY -- 1 Introduction -- BIOLOGIC MARKERS -- Markers of Exposure -- Markers of Effect -- Markers of Susceptibility -- VALIDITY OF BIOLOGIC MARKERS -- UNCERTAINTY AND RISK -- ETHICAL AND PRACTICAL ISSUES -- STRUCTURE OF THE REPORT -- 2 The Structure and Function Of the Immune System And Mechanisms of Immunotoxicity -- DEVELOPMENT AND FUNCTION OF THE IMMUNE SYSTEM -- MECHANISMS OF CHEMICALLY INDUCED IMMUNE DISEASE -- IgE-Mediated Hypersensitivity -- Complement-Mediated and Immune-Complex-Mediated Injury -- T-Cell Reactions -- EFFECTS OF XENOBIOTICS ON THE IMMUNE SYSTEM -- 3 Biologic Markers For Immune-Mediated Disease -- DEFINITION OF THE PROBLEM -- EXPOSURE THROUGH INHALATION (PULMONARY HYPERSENSITIVITY) -- Occupational Asthma and Rhinitis -- Hypersensitivity Pneumonitis -- EXPOSURE THROUGH INGESTION -- DERMAL EXPOSURE -- Contact Dermatitis -- Photocontact Dermatitis -- Contact Urticaria -- NONSPECIFIC IMMUNE ENHANCEMENT -- BIOLOGIC MARKERS OF HYPERSENSITIVITY -- History and Clinical Signs -- Skin Tests -- Serum IgE Concentration -- In Vitro Assays for Specific Antibody -- In Vitro Assays for Cellular Immunity -- Provocation Challenges -- Bronchoalveolar Lavage -- ANIMAL MODELS FOR DETECTING CHEMICALLY MEDIATED HYPERSENSITIVITY -- Techniques Used in Animal Studies to Determine the Potential of Chemicals to Cause Hypersensitivity -- IgE-and IgG-Mediated Immediate Reactions -- Cytotoxic Reactions -- Antigen-Antibody Complexes -- Contact Hypersensitivity -- SUMMARY…”
    Libro electrónico
  9. 2869
    Publicado 1996
    Tabla de Contenidos: “…. -- Recommendation for Research on Juror Comprehension -- Overview -- INTRODUCTION -- OUR ASSIGNMENT -- DNA TYPING -- BASIC GENETIC PRINCIPLES -- FORENSIC DNA IDENTIFICATION -- VNTRs -- DNA Profiling -- Matching and Binning of VNTRs -- Allele (Bin) Frequencies -- PCR-Based Systems -- ASSURING LABORATORY ACCURACY -- POPULATION GENETICS -- Randomly Mating Populations -- Population Structure -- Dealing with Subpopulations -- Persons from the Same Subpopulation -- SOME STATISTICAL CONSIDERATIONS -- The Reference Database -- Match Probability, Likelihood Ratio, and Two Fallacies -- Bayes's Theorem -- Suspect Identified by Database Search -- Uniqueness -- Uncertainty About Estimated Frequencies -- PCR-Based Tests -- THE CEILING PRINCIPLES -- DNA IN THE COURTS -- CONCLUSIONS AND RECOMMENDATIONS -- Admissibility of DNA Evidence (Chapter 2) -- Laboratory Errors (Chapter 3) -- Proficiency Tests -- Duplicate Tests -- Population Genetics (Chapter 4) -- Evidence DNA and Suspect from the Same Subgroup -- Insufficient Data -- Dealing with Relatives -- Statistical Issues (Chapter 5) -- Database Searches -- Uniqueness -- Matching and Binning -- Ceiling Principles -- Further Research -- Legal Issues (Chapter 6) -- ILLUSTRATIVE EXAMPLE -- A Typical Case -- Suspect Found by Searching a Database -- Suspect and Evidence from the Same Subpopulation -- A PCR-Based System -- 1 Introduction -- THE 1992 NATIONAL RESEARCH COUNCIL REPORT -- THE COMMITTEE'S TASK -- THE VALIDITY OF DNA TYPING…”
    Libro electrónico
  10. 2870
    por Lakner, Gary
    Publicado 2004
    Tabla de Contenidos: “…Troubleshooting -- Common problems and solutions -- Unable to connect to domain controller -- List EIM identifiers takes a long time -- EIM Configuration wizard hangs during finish processing -- EIM handle is no longer valid -- Cannot connect with NetServer -- Kerberos authentication and diagnostic messages -- Errors when running client commands in QSH -- iSeries Access Diagnostic Tools -- Troubleshooting WebSphere Host On-Demand -- Appendix C. …”
    Libro electrónico
  11. 2871
    por Mascarenhas, Oswald A. J.
    Publicado 2019
    Tabla de Contenidos: “…Concluding Remarks -- Chapter 6 The Ethics of Corporate Stakeholder Rights and Duties -- The Apple-FBI Confrontation Problem -- Some Defend Apple and for Valid Reasons -- Some Defend FBI and Governments and for Valid Reasons -- The Apple and FBI Debate Implications -- Concluding Thoughts -- Ethical Questions…”
    Electrónico
  12. 2872
    Publicado 2021
    Tabla de Contenidos: “…3.5 Conclusion -- Acknowledgements -- References -- 4 Role of Data Mining in Bioinformatics -- 4.1 Introduction -- 4.2 Data Mining Methods/Techniques -- 4.2.1 Classification -- 4.2.1.1 Statistical Techniques -- 4.2.1.2 Clustering Technique -- 4.2.1.3 Visualization -- 4.2.1.4 Induction Decision Tree Technique -- 4.2.1.5 Neural Network -- 4.2.1.6 Association Rule Technique -- 4.2.1.7 Classification -- 4.3 DNA Data Analysis -- 4.4 RNA Data Analysis -- 4.5 Protein Data Analysis -- 4.6 Biomedical Data Analysis -- 4.7 Conclusion and Future Prospects -- References -- 5 In Silico Protein Design and Virtual Screening -- 5.1 Introduction -- 5.2 Virtual Screening Process -- 5.2.1 Before Virtual Screening -- 5.2.2 General Process of Virtual Screening -- 5.2.2.1 Step 1 (The Establishment of the Receptor Model) -- 5.2.2.2 Step 2 (The Generation of Small-Molecule Libraries) -- 5.2.2.3 Step 3 (Molecular Docking) -- 5.2.2.4 Step 4 (Selection of Lead Protein Compounds) -- 5.3 Machine Learning and Scoring Functions -- 5.4 Conclusion and Future Prospects -- References -- 6 New Bioinformatics Platform-Based Approach for Drug Design -- 6.1 Introduction -- 6.2 Platform-Based Approach and Regulatory Perspective -- 6.3 Bioinformatics Tools and Computer-Aided Drug Design -- 6.4 Target Identification -- 6.5 Target Validation -- 6.6 Lead Identification and Optimization -- 6.7 High-Throughput Methods (HTM) -- 6.8 Conclusion and Future Prospects -- References -- 7 Bioinformatics and Its Application Areas -- 7.1 Introduction -- 7.2 Review of Bioinformatics -- 7.3 Bioinformatics Applications in Different Areas -- 7.3.1 Microbial Genome Application -- 7.3.2 Molecular Medicine -- 7.3.3 Agriculture -- 7.4 Conclusion -- References -- 8 DNA Microarray Analysis: From Affymetrix CEL Files to Comparative Gene Expression -- 8.1 Introduction -- 8.2 Data Processing…”
    Libro electrónico
  13. 2873
    Publicado 2022
    Tabla de Contenidos: “…Overall validation of structural modeling -- 10.3. Material and method -- 10.3.1. …”
    Libro electrónico
  14. 2874
    Publicado 2022
    Tabla de Contenidos: “…Political Trust in National Institutions: The Significance of Items' Level of Measurement in the Validation of Constructs -- 7.1. Introduction -- 7.2. …”
    Libro electrónico
  15. 2875
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- Modeling of Microscale Transport in Biological Processes -- Copyright -- Contents -- Contributors -- Preface -- 1 Molecular Simulations of Complex Membrane Models -- 1.1 Introduction -- 1.1.1 Methods: Molecular Dynamics Simulations -- 1.2 Unsaturated Carbon Chains -- 1.3 Membrane Proteins -- 1.3.1 Ion Channel Functioning -- 1.3.2 Transmembrane Protein Clustering -- 1.3.3 Membrane Adaptation Around Protein Clusters -- 1.4 Sterols -- 1.5 Eukaryotic Membranes -- 1.6 Prokaryotic Membranes -- 1.7 Viral Membranes -- 1.8 Membrane Fusion -- 1.9 Graphitic Nanomaterials -- 1.10 Nanoparticles -- 1.11 On-Going Work -- 1.12 Outlook and Conclusion -- References -- 2 Microbial Strategies for Oil Biodegradation -- 2.1 Introduction -- 2.2 Overview of the Biodegradation Process -- 2.2.1 Biosurfactant-Mediated Uptake of Oil Compounds -- 2.2.2 Transmembrane Transport of Oil Compounds -- 2.3 Microbial Growth Modes on Oily Substrates -- 2.3.1 Suspended Growth in the Aqueous Phase -- 2.3.2 Flatlander's (Interfacial) Growth at the Oil-Water Interface -- 2.3.3 Bio lm Growth Over the Oil-Water Interface -- 2.4 Microscale Modeling Considerations -- 2.5 Summary and Outlook -- Acknowledgements -- References -- 3 Modeling and Measurement of Biomolecular Transport and Sensing in Micro uidic Cell Culture and Analysis Systems -- 3.1 Introduction -- 3.2 Basic Principles of Microscale Cell Culture -- 3.3 Theory and Equations: Fluid Flow, Mass Transport, and Biochemical Reactions -- 3.3.1 Fluid Motion -- 3.3.2 Mass Transport in Fluids -- 3.3.3 Biochemical Reactions -- 3.3.4 Non-Dimensionalization -- 3.4 Review of Micro uidic Transport Models -- 3.4.1 Straight Microchannel with Biochemical Assay Reaction Site(s) -- 3.4.2 Straight Microchannel with Cell Monolayer -- 3.4.3 Alternative Geometries -- 3.5 Review of Theoretical Model Experimental Validation…”
    Libro electrónico
  16. 2876
    Publicado 2024
    Tabla de Contenidos: “…4.3.1 Drawbacks -- 4.3.1.1 Complexity and Expertise Dependency -- 4.3.1.2 Technological Hurdles -- 4.3.1.3 Performance and Verification -- 4.3.2 Input Data -- 4.4 Proposed System -- 4.4.1 Streamlined Expertise Requirements -- 4.4.2 Scalable Technology Implementation -- 4.4.3 Robust Performance and Validation -- 4.4.4 Advantages -- 4.4.4.1 Enhanced Accessibility -- 4.4.4.2 Improved Scalability -- 4.4.4.3 Consistently Reliable Performance -- 4.4.5 Proposed Algorithm Steps -- 4.5 Experimental Results -- 4.5.1 Performance Evaluation Methods -- 4.5.1.1 Accuracy -- 4.5.1.2 Precision -- 4.5.1.3 Recall -- 4.5.1.4 Sensitivity -- 4.5.1.5 Specificity -- 4.5.1.6 F1 Score -- 4.5.1.7 Area Under Curve (AUC) -- 4.5.1.8 Convolutional Neural Network (CNN) Architecture -- 4.5.1.9 Model Training and Validation -- 4.5.1.10 Data Augmentation and Regularization -- 4.5.1.11 Performance Metrics -- 4.6 Conclusion -- Conflicts of Interest -- References -- Chapter 5 Machine Learning-Enabled Digital Twins for Diagnostic and Therapeutic Purposes -- 5.1 Introduction -- 5.2 Conceptualization of Digital Twin and Machine Learning -- 5.2.1 Digital Twins -- 5.2.1.1 Working With the Digital Twins -- 5.2.2 Machine Learning -- 5.2.2.1 Deep Learning -- 5.2.2.2 Reinforcement Learning -- 5.3 State-of-the-Art Works -- 5.4 Applications of Digital Twins Enabled With Deep Learning Models and Reinforcement Learning -- 5.5 Limitations and Challenges -- 5.6 Opportunities/Future Scope -- 5.7 Concluding Remarks -- References -- Chapter 6 Blockchain as the Backbone of a Connected Ecosystem of Smart Hospitals -- 6.1 Introduction -- 6.2 Smart Hospitals -- 6.2.1 Key Technologies in Smart Hospital Environments -- 6.2.1.1 Internet of Things (IoT) -- 6.2.1.2 Artificial Intelligence (AI) -- 6.2.1.3 Big Data Analytics -- 6.2.1.4 Interoperable Systems…”
    Libro electrónico
  17. 2877
    Publicado 2024
    Tabla de Contenidos: “…3.2 Locations of the Typical Rock Avalanches -- 4 Characteristics of Typical Rock Avalanche Deposits -- 4.1 Luanshibao Rock Avalanche -- 4.1.1 Geological Setting and General Features of the Luanshibao Rock Avalanche -- 4.1.2 Sedimentary Features of the Avalanche Deposit -- 4.2 Nyixoi Chongco Rock Avalanche -- 4.2.1 Geological Setting and General Features of the Nyixoi Chongco Rock Avalanche -- 4.2.2 Sedimentary Features of the Avalanche Deposit -- 4.3 Tagarma Rock Avalanche -- 4.3.1 Geological Setting and General Features of the Tagarma Rock Avalanche -- 4.3.2 Sedimentary Features of the Avalanche Deposit -- 4.4 Iymek Rock Avalanche -- 4.4.1 Geological Setting and General Features of the Iymek Rock Avalanche -- 4.4.2 Sedimentary Features of the Avalanche Deposit -- 5 Discussion -- 6 Conclusion -- References -- Part II: Original Articles -- Landslide Susceptibility Zonation Using GIS-Based Frequency Ratio Approach in the Kulon Progo Mountains Area, Indonesia -- 1 Introduction -- 2 Research Area -- 3 Methodology -- 4 Dataset and Analysis -- 5 Result &amp -- Discussion -- 6 Conclusion -- References -- Physically-Based Regional Landslide Forecasting Modelling: Model Set-up and Validation -- 1 Introduction -- 2 HIRESSS Model and Study Are a -- 2.1 HIRESSS Model -- 2.2 Study Area -- 3 Data Collection and Preparation -- 3.1 Static Data -- 3.2 Dynamic Data -- 4 HIRESSS Simulation and Analysis of the Results -- 4.1 Monte Carlo Simulations -- 4.2 Analysis of the Model Output and Validation -- 5 Conclusion -- References -- Consequence: Frequency Matrix as a Tool to Assess Landslides Risk -- 1 Introduction -- 2 The Main Principle of Matrix Use -- 3 The Conceptual Background -- 4 Example of Risk Matrix -- 5 Issues Linked to the Use of Matrix -- 5.1 Scale and Verbal Terms -- 5.1.1 The Classes of Consequences and Frequency or Probability…”
    Libro electrónico
  18. 2878
    Publicado 2017
    Tabla de Contenidos: “…8.2.2 Universal Theme Behind Human Action-Reaction Processes -- 8.2.3 Human Action-Reaction Process: Never Equal and Opposite -- 8.3 Iterative Convergence for Optimization -- 8.4 Knowledge Machine Programming for a Given Objective -- Conclusions -- Appendix 8 A -- References -- 9 Frustums of Artificial Behavior -- 9.1 Introduction -- 9.1.1 Artificial Knowledge -- 9.1.2 Mechanized Generation of Knowledge -- 9.2 Frustums and Their Volume -- 9.3 The Degeneration of Knowledge -- 9.4 Content-Based Internet Knowledge Filters -- 9.5 General Deployment of Knowledge Filters -- Conclusions -- References -- 10 Computer-Aided Knowledge Design and Validation -- 10.1 Introduction -- 10.2 Major Procedural Steps -- 10.2.1 Fragment the Input Seminal Body of Knowledge Bok -- 10.2.2 Internet-Based Dds/Loc Search for Classification of Vfs, *S, Nos -- 10.2.2.1 Determine and list nos, Vfs, and *S of bok, local, and internet -- 10.2.2.2 Compare NOs, VFs, and *s of bok, local, and internet -- 10.2.2.3 Filtering of NOs, VFs, *s, and concepts that tie them -- 10.2.2.4 Rationality and contextual check of NOs, VFs, and *s -- 10.2.2.5 Scoring and quality based on internet KB's -- 10.2.2.6 Evaluate and grade the inputs -- 10.2.2.7 Threshold limits and probabilities -- 10.3 Blend and Process Input, Local, and Internet Knowledge -- 10.3.1 Relax Nos, Relax Vfs, and Relax *S -- 10.3.2 Iterative Techniques for the Computer-Based Solutions -- 10.3.3 Iterative Convergence of Parameters Within Micro Kels -- 10.4 Generate Newly Synthesized Knowledge - Bok' -- 10.4.1 Relaxation of Attributes, Attributes of Attributes -- 10.4.2 Machine-Based Reassembly of Newly Designed Knowledge - Bok' -- 10.4.3 Verify the Validity of the Newly Designed Knowledge - Bok' -- 10.5 Rationality and Scoring of New Knowledge - Bok' -- 10.6 Machine Configurations…”
    Libro electrónico
  19. 2879
    por Gurfinkel, Arie
    Publicado 2024
    Tabla de Contenidos: “…6.1 Methodology -- 6.2 Prevalence of SDBMs -- 6.3 Applications to Translation Validation -- 7 Related Work -- 8 Conclusion -- References -- The Top-Down Solver Verified: Building Confidence in Static Analyzers -- 1 Introduction -- 2 Preliminaries -- 3 The Plain Top-Down Solver -- 4 The Top-Down Solver -- 5 Related Work -- 6 Conclusion -- References -- End-to-End Mechanized Proof of a JIT-Accelerated eBPF Virtual Machine for IoT -- 1 Introduction -- 1.1 Challenges -- 1.2 Contributions -- 2 Preliminaries -- 3 A Workflow for End-to-End Refinement -- 3.1 Methodology -- 3.2 Application to a rBPF Virtual Machine -- 4 Symbolic CompCert ARM Interpreter -- 5 A Verified Just-In-Time Compiler for rBPF -- 5.1 JIT Design -- 5.2 JIT Correctness -- 5.3 JIT Vertical Refinement -- 6 HAVM: A Hybrid Interpreter for rBPF -- 7 Evaluation: Case Study of RIOT's Femto-Containers -- 8 Lessons Learned -- 9 Related Works -- 10 Conclusion -- References -- A Framework for Debugging Automated Program Verification Proofs via Proof Actions -- 1 Introduction -- 2 Proof Debugging Considered Painful -- 2.1 Background on Automated Program Verification in Verus -- 2.2 Examples of Proof Debugging -- 2.3 Automated Proof Debugging with Proof Actions -- 2.4 Challenges with Automatic Code Transformation -- 3 ProofPlumber: An Extensible Proof Action Framework -- 3.1 ProofPlumber's API Design -- 3.2 ProofPlumber's Implementation -- 4 Evaluation -- 4.1 RQ1: Are proof actions expressive enough? …”
    Libro electrónico
  20. 2880
    Publicado 2015
    Tabla de Contenidos: “…2.14.3.5 Results -- 2.15 Chapter summary -- 3 Optimizing Performance of Enterprise Web Application -- 3.1 Introduction -- 3.2 WPO concepts and analysis -- 3.2.1 Basic concepts of WPO and its impact on online strategy -- 3.2.2 Analysis of factors contributing to web page load time and common pitfalls -- 3.3 WPO strategy -- 3.3.1 Establishing performance objectives and SLAs -- 3.3.2 Model and evaluate various performance scenarios for business-critical processes and transactions -- 3.3.3 Establishing performance design guidelines -- 3.3.4 Performance-based development approach in project lifecycle phases -- 3.3.4.1 Requirement elaboration -- 3.3.4.2 Architecture and design phase -- 3.3.4.3 Application development phase -- 3.3.4.4 Validation phase -- 3.3.5 Bottleneck analysis -- 3.3.6 Performance monitoring -- 3.4 Optimizing performance for supporting ecosystem components -- 3.4.1 Optimized infrastructure for performance -- 3.4.2 HTML 5 optimization -- 3.4.3 Responsive web design -- 3.5 Asset optimization strategy -- 3.5.1 Static assets optimization-generic optimization techniques -- 3.5.2 Smart asset proxy -- 3.5.3 Progressive semantic asset loading -- 3.5.4 Rapid rendering framework -- 3.6 Other dimensions of performance optimization -- 3.6.1 Optimization of content-driven pages -- 3.6.2 Accelerating HTTPS pages -- 3.7 Performance anti-patterns -- 3.8 Web analytics-based performance improvement -- 3.9 Performance governance framework -- 3.10 Case study for top-down performance optimization -- 3.11 Chapter summary -- 4 Caching for Enterprise Web Application -- 4.1 Introduction -- 4.2 Impact on scalability, availability, and performance -- 4.3 Cache concepts -- 4.4 Cache design -- 4.4.1 Cache invalidation strategy -- 4.5 Caching patterns -- 4.6 Caching antipatterns -- 4.7 Caching strategy -- 4.8 Cache metrics and administration…”
    Libro electrónico