Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
3821Publicado 2022“…However, for many years, researchers who study the concept of attachment, and in particular attachment to place, have shown that this theory is not validated. On the contrary, attachment can provide security to individuals and support change. …”
Libro electrónico -
3822Publicado 2007“…The book highlights how Bushman or San ethnography has contributed to anthropological controversy, for example in the debates on the degree of incorporation of San society within the wider political economy, and on the validity of the case for 'indigenous rights' as a special kind of human rights. …”
Libro electrónico -
3823Publicado 2023“…This booklet introduces the #digitalfirst approach for automotive software design to enable the software-defined vehicle from ideation through requirements validation. It's a road map that provides automotive digital managers, senior architects, and product managers with a common language to help speed up automotive software development, reduce costs, and maximize customer value without compromising functional safety…”
Libro electrónico -
3824por Nuclear Energy Agency“…The meeting was broken up into seven sessions, which covered the following topics: (1) Validation and Application of Calculations; (2) Relevant Experiments for Criticality Safety; (3) Experimental Facilities and Capabilities; (4) Rad-Waste and Weapons Disassembly; (5) Criticality Safety Software and Development; (6) Criticality Safety Studies at Universities; and (7) Training. …”
Publicado 2023
Libro electrónico -
3825Publicado 2024“…It's been pressure tested since 2020 at Stanford University has been validated with thousands of leaders across a variety of industries, including tech, financial services, advertising, media, consumer packaged goods, and more through research and culture transformation work"--…”
Libro electrónico -
3826Publicado 2023“…Because IBM Storage Sentinel can intelligently isolate infected backups, your organization can identify the most recent verified and validated backup copies, greatly accelerating your time to recovery. …”
Libro electrónico -
3827Publicado 2022“…Therefore, researchers have been developing and validating analytical methods to extract, separate and quantitate a variety of hazardous and nutritional analytes in various food commodities. …”
Libro electrónico -
3828Publicado 2019“…James discusses common product practices and the experience of introducing those at SendGrid in the tech ops org, including validating problems through customer interactions, using story maps to get to first-and-fast release, launching products for adoption, getting user feedback and incorporating it into the backlog, and sunsetting a product."…”
Vídeo online -
3829Publicado 2022“…Speed up, automate, and validate your reporting and analytics with R, the popular open source programming language for data science. …”
Video -
3830Publicado 2012“…Specially commissioned chapters by leading academics and researchers of language testing address the most important topics facing researchers and practitioners, including: An overview of the key issues in language testing Key research methods and techniques in language test validation The social and ethical aspects of language testing The philosophical and historical underpinnings of assessment practices The key literature in the field Test design and development practices through use of practical examples The Routledge Handbook of Language Testing is the ideal resource for postgraduate students, language teachers, and those working in the field of applied linguistics…”
Libro -
3831Publicado 2013Tabla de Contenidos: “…4.12.1 Matched Filter Detector 199 -- 4.12.2 Heterodyne Detector of FMCW Signals 203 -- 4.12.3 Practical Consideration of Detection Methods of FMCW Signals 207 -- 4.13 Range Doppler Ambiguity of Chirp Signals: Advanced Waveforms 207 -- 4.13.1 Three-Cell Structure 208 -- 4.13.2 Multiple WRF Structure 210 -- 4.13.3 Target Movement 211 -- 4.13.4 Doppler Shift Estimation 211 -- 4.14 Architectures of Chirp Sounders 213 -- 4.15 Monostatic Operation of FMCW Sounder/Radar 217 -- 4.15.1 Reduction of Effective Mean Received Power 218 -- 4.15.2 Spreading of the Spectrum and Interference 219 -- 4.15.3 Blind Ranges and Range Ambiguity 220 -- 4.15.4 Selection Criteria for Switching Sequences 221 -- 4.15.5 Considerations for Edge Weighting 224 -- 4.15.6 Length of the Window 224 -- 4.15.7 Window Functions 224 -- 4.15.8 Interpolation and Quantization 225 -- 4.16 Single and Multiple Antenna Sounder Architectures 225 -- 4.16.1 Single Input Single Output (SISO) Sounders 226 -- 4.16.2 MISO, SIMO and MIMO Measurements with SISO Sounders 227 -- 4.16.3 Semi-Sequential MIMO Sounders 228 -- 4.16.4 Parallel MIMO Sounders 228 -- 4.17 Ultra-wideband (UWB) Channel Sounders 232 -- 4.18 Sounder Design 233 -- 4.18.1 Sounder for Indoor Radio Channels in the UHF Band 239 -- 4.18.2 Sounder for UHF Frequency Division Duplex Links for Outdoor Radio Channels 239 -- 4.18.3 Sounder for Multiple Frequency Links for Outdoor Radio Channels 239 -- 4.19 Performance Tests of a Channel Sounder and Calibration 239 -- 4.19.1 Ambiguity Function 241 -- 4.19.2 Linearity Test 242 -- 4.19.3 Frequency Response 243 -- 4.19.4 Calibration of Automatic Gain Control 243 -- 4.19.5 Isolation between Multiple Channels 245 -- 4.19.6 Sensitivity and Dynamic Range 246 -- 4.19.7 Effect of Interference on the Dynamic Range 249 -- 4.19.8 Stability of Frequency Sources 251 -- 4.19.9 Temperature Variations 251 -- 4.20 Overall Data Acquisition and Calibration 251 -- References 251 -- 5 Data Analysis 255 -- 5.1 Data Validation 255 -- 5.2 Spectral Analysis via the Discrete Fourier Transform 256.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3832Publicado 2018Tabla de Contenidos: “…Campbell -- 1.1 Introduction 1 -- 1.1.1 Mission-Critical Cloud Solutions for the Military 2 -- 1.2 Overview of the Book 3 -- 2 Survivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using Maude 10 /Rakesh Bobba, Jon Grov, Indranil Gupta, Si Liu, José Meseguer,Peter Csaba Ölveczky, and Stephen Skeirik -- 2.1 Introduction 10 -- 2.1.1 State of the Art 11 -- 2.1.2 Vision: Formal Methods for Cloud Storage Systems 12 -- 2.1.3 The Rewriting Logic Framework 13 -- 2.1.4 Summary: Using Formal Methods on Cloud Storage Systems 15 -- 2.2 Apache Cassandra 17 -- 2.3 Formalizing, Analyzing, and Extending Google’s Megastore 23 -- 2.3.1 Specifying Megastore 23 -- 2.3.2 Analyzing Megastore 25 -- 2.3.2.1 Megastore-CGC 29 -- 2.4 RAMP Transaction Systems 30 -- 2.5 Group Key Management via ZooKeeper 31 -- 2.5.1 ZooKeeper Background 32 -- 2.5.2 System Design 33 -- 2.5.3 Maude Model 34 -- 2.5.4 Analysis and Discussion 35 -- 2.6 How Amazon Web Services Uses Formal Methods 37 -- 2.6.1 Use of Formal Methods 37 -- 2.6.2 Outcomes and Experiences 38 -- 2.6.3 Limitations 39 -- 2.7 Related Work 40 -- 2.8 Concluding Remarks 42 -- 2.8.1 The Future 43 -- 3 Risks and Benefits: Game-Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud 49 /Luke Kwiat, Charles A. …”
Libro electrónico -
3833Publicado 2018“…Metasploit's integration with InsightVM (or Nexpose), Nessus, OpenVas, and other vulnerability scanners provides a validation solution that simplifies vulnerability prioritization and remediation reporting. …”
Libro electrónico -
3834Publicado 2022“…Author Tshepo Chris Nokeri begins by introducing you to covariance analysis, correlation analysis, cross-validation, hyperparameter optimization, regression analysis, and residual analysis. …”
Libro electrónico -
3835Publicado 2011“…Au sommaire Systèmes d'unités Principes de mesure et terminologie Gestion des moyens de mesure Erreur de mesurage Maîtriser l'influence du posage Eléments de statistiques appliqués à la mesure Valider un processus de contrôle Estimer l'incertitude de mesure Maintenir la qualité métrologique…”
Libro electrónico -
3836por National Research Council (U.S.).“…BioWatch PCR Assays evaluates and provides guidance on appropriate standards for the validation and verification of PCR tests and assays in order to ensure that adequate performance data are available to public health and other key decision makers with a sufficient confidence level to facilitate the public health response to a BioWatch Actionable Response. …”
Publicado 2015
Libro electrónico -
3837Publicado 2020“…In addition, a sensitivity or robustness analysis should be done to validate/analyze the influence of uncertainty regarding decision-making. …”
Libro electrónico -
3838por Mandel, Benedikt“…As all models are imperfect describing just a part of real life, it sheds a light on the necessity to validate models and the prerequisite of complexity needed to cope with multi-sector scenario simulations for strategic, tactical and operational developments as well as political decisions. …”
Publicado 2014
Capítulo de libro electrónico -
3839Publicado 2023“…Thus, the availability of validated procedures, the constant monitoring of analytical performance through quality assurance protocols, the availability of certified "in matrix" standards, and the analytical problems underlying the analysis of new psychoactive substances in the blood and other biological fluids represent the challenges of modern forensic toxicology. …”
Libro electrónico -
3840Publicado 2024“…The course focuses on the pentesting methodology, guiding you through the stages of assessment from validating scope to reconnaissance, vulnerability scanning, and exploitation. …”
Video