Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
4021Publicado 2023“…It also goes onto to explore new developments in three fields related to logics – namely metainferential logics built by means of the Weak Kleene schema and combining them with logics defined through the Strong Kleene schema, proof-theoretic presentations, and those with a with a global or an absolutely global validity standard, instead of a local one. This book is of interest to scholars in formal logic --…”
Libro -
4022Publicado 2024“…While providing you with the data-validated tools you need to pick apart your podcast and rebuild it, Webster helps you to understand the importance of creating entertainment for your specific listener. …”
Libro -
4023
-
4024Publicado 2017“…Several recent papers underline methodological points that limit the validity of published results in imaging studies in the life sciences and especially the neurosciences (Carp, 2012; Ingre, 2012; Button et al., 2013; Ioannidis, 2014). …”
Libro electrónico -
4025Publicado 2016“…Advocates provide third-party validation and positive relevance; build and protect brands, and create exceptionally effective content to influence buyer decisions. …”
Libro electrónico -
4026Publicado 2017“…Technological developments in recent years, resulting in improvements in medical care and technologies, have increased DOC population numbers, the means for investigating DOC, and the range of clinical and therapeutic interventions under validation. In neuroimaging and behavioural studies, the auditory modality has been shown to be the most sensitive in diagnosing awareness in this complex population. …”
Libro electrónico -
4027Publicado 2014“…The book explains the details of the knowledge discovery process including: Model creation, validity testing, and interpretation Effective communication of findings Available tools, both paid and open-source Data selection, transformation, and evaluation Data Mining for Dummies takes you step-by-step through a real-world data-mining project using open-source tools that allow you to get immediate hands-on experience working with large amounts of data. …”
Libro electrónico -
4028Publicado 2015“…Topics include: regression, logistic regression, classification and regression trees, neural networks, model cross-validation, model comparison and selection, and data reduction techniques. …”
Libro electrónico -
4029Publicado 2023“…Understand what cross-validation, sampling, and Bootstrap are. Explore how to go beyond linearity; we will specifically look at a couple of interesting examples to improve the linear regression model to see if we can create models that are non-linear. …”
Video -
4030Publicado 2023“…We will focus on chatbot development with deep learning, tokenization, setting up an Encoder-Decoder, implementing RNN-based model development, and finally, training, testing, and validating the chatbot we developed. Upon completing this course successfully, you will relate concepts and understand theories of chatbots in various domains, understand and implement deep learning models for building real-world chatbots, and evaluate deep learning-based chatbot models. …”
Video -
4031Publicado 2023“…We will then work with forms and validations and handle form data. We will understand client-side routing with React Router and work with multiple APIs and handle data for projects. …”
Video -
4032Publicado 2024“…This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. …”
Video -
4033por Rozanski, Nick“…With this book you will learn how to Design an architecture that reflects and balances the different needs of its stakeholders Communicate the architecture to stakeholders and demonstrate that it has met their requirements Focus on architecturally significant aspects of design, including frequently overlooked areas such as performance, resilience, and location Use scenarios and patterns to drive the creation and validation of your architecture Document your architecture as a set of related views Use perspectives to ensure that your architecture exhibits important qualities such as performance, scalability, and security The architectural viewpoints and perspectives presented in the book also provide a valuable long-term reference source for new and experienced architects alike. …”
Publicado 2005
Libro electrónico -
4034Publicado 2022“…Zero trust is a security framework that relies on authenticating, authorizing, and continuously validating access for every transaction. For organizations that use Kubernetes to develop and deliver applications, zero trust is the only practical way to keep your systems safe from potential external and internal threats. …”
Libro electrónico -
4035Publicado 2021“…The authors of its chapters trace the shifts of boundaries in terms of the gradual blurring of the validity of established concepts, interpretive frameworks, and standards of judgment, which are analysed from ontological, gnoseological, ethical, and social perspectives. …”
Libro electrónico -
4036Publicado 2010“…Discover how to: Apply scenario-based guidance for planning and deployment Prepare Active Directory(R) and the server environment Validate requirements and understand configuration tradeoffs Learn best ways to manage users, mailboxes, and permissions Optimize message routing and security Design and implement Unified Messaging and federated delegation Define your archiving and compliance strategy Build high availability into your backup and recovery plan Monitor and tune performance Apply proven troubleshooting tactics Companion Web content features: Checklists, planning worksheets, and other job aids Quick Reference Guide to best practices, including recommended configurations Fast-reference card for using Windows PowerShell(TM)…”
Libro electrónico -
4037Publicado 2022“…About This Video Learn how to install Docker on CentOS using automated scripts Understand the application containerization benefits and drawbacks Explore the various networks on Docker In Detail The Docker Certified Associate (DCA) exam validates your skills as an experienced Docker practitioner, acting as a foundational benchmark for real-world Docker skills across the container industry. …”
Video -
4038Publicado 2023“…Novel approaches should be supported by robust data collected using appropriate and validated methods to monitor efficacy, durability, and any emerging resistance. …”
Libro electrónico -
4039Publicado 2023“…Evidence is an essential resource for establishing claims of validity, resolving conflicts, and legitimizing decisions. …”
Libro electrónico -
4040por Multidisciplinary Digital Publishing Institute“…The research, design, and development of techniques and procedures for correctly validating underwater environments are more than ever important.This Special Issue originates from the ISPRS/CIPA Workshop "UNDERWATER 3D RECORDING & MODELING--Experiences in Data Acquisition, Calibration, Orientation, Modelling & Accuracy Assessment" (http://3dom.fbk.eu/files/underwater/index.html) and will accept improved and extended selected papers derived from the workshop's proceedings, as well as new contributions from international colleagues.We invite you to submit articles on the following topics:Underwater/Multi-media photogrammetryUnderwater platforms (ROV, AUV, robot, etc.)Characterization of underwater passive and active sensorsUnderwater navigation and positioningUnderwater metrology and inspectionsGeometric modeling in multi-media photogrammetryAccuracy requirement and assessment in underwater 3D applicationsRestoration, enhancement and processing of underwater images3D bathymetry techniquesData processing and underwater 3D modelingSensors for marine biology and water pollutionMulti-sensor integration…”
Publicado 2016
Libro electrónico