Mostrando 1,241 - 1,260 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.97s Limitar resultados
  1. 1241
    por Maki, Atsushi
    Publicado 2015
    Tabla de Contenidos: “…Introduction / Are luxury goods really luxuries? : the validity of the Törnqvist-wold's hypothesis / Engel's law in Vietnam and the Philippines : effects of in-kind consumption on inequality and poverty / Informal agriculture sector in Indonesia : big in size, small in contribution, and high working poverty rate / Effects of remittances on income inequality and poverty in the Philippines / Area disparity of income and expenditure in Sri Lanka : based on micro data sets of household income and expenditure survey of 2006/07 / The agricultural sector in Thailand's middle-income stage / The possibility of a border economic zone : Asian golden quadrangle / Development of the fishery systems in modern Taiwan / Conclusion…”
    Libro electrónico
  2. 1242
    Publicado 2016
    Tabla de Contenidos: “…; Chapter 5: Implementing a Multitiered Governance and Control Framework in a Business; Chapter 6: Risk Management and Prioritization Using a Control Perspective; Chapter 7: Control Formulation and Implementation Process; Chapter 8: Security Control Validation and Verification…”
    Libro electrónico
  3. 1243
    por MacDonald, Matthew
    Publicado 2007
    Tabla de Contenidos: “…Introducing .NET -- The .NET Framework -- The C# Language -- Types, Objects, and Namespaces -- Developing ASP.NET Applications -- Visual Studio -- Web Form Fundamentals -- Web Controls -- State Management -- Error Handling, Logging, and Tracing -- Deploying ASP.NET Applications -- Building Better Web Forms -- Validation -- Rich Controls -- User Controls and Graphics -- Styles, Themes, and Master Pages -- Website Navigation -- Working with Data -- ADO.NET Fundamentals -- Data Binding -- The Data Controls -- Files and Streams -- XML -- Website Security -- Security Fundamentals -- Membership -- Profiles -- Advanced ASP.NET -- Component-Based Programming -- Caching -- ASP.NET AJAX…”
    Libro electrónico
  4. 1244
    por AMATAYAKUL, MARGRET
    Publicado 2017
    Tabla de Contenidos: “…Introduction to workflow and process management in health care -- Workflow and process management overview -- Step 1: Assess readiness for workflow and process management -- Step 2: Compile process inventory -- Step 3: Select tools and train team -- Step 4: Map current workflows and processes -- Step 5: Obtain baseline data -- Step 6: Validate workflow and process maps -- Step 7: Identify process redesign opportunities -- Step 8: Conduct root cause analysis to redesign workflows and processes -- Step 9: Implement redesigned workflows and processes -- Step 10: Monitor goal achievement with redesigned workflows…”
    Libro electrónico
  5. 1245
    Publicado 2014
    Tabla de Contenidos: “…-- The view from the infringer's side : challenging a patent's validity -- Patent eligibility : pushing the envelope on subject matter appropriate for patenting -- Selected topics in patent strategy…”
    Libro electrónico
  6. 1246
    por Montgomery, Douglas C.
    Publicado 2006
    Tabla de Contenidos: “…Variable Selection and Model Building. 10. Validation of Regression Models. 11. Multicollinearity. 12. …”
    Libro
  7. 1247
    por Meara, P. M.
    Publicado 2009
    Tabla de Contenidos: “…Learners' word associations in French 5 -- Word associations in a foreign language -- Lex 30: an improved method of assessing productive vocabulary in an L2 -- Exploring the validity of a test of productive vocabulary -- Network structures and vocabulary acquisition in a foreign language -- V links: beyond vocabulary depth -- -- A further note on simulating word association behaviour in an L2 -- Word associations in a second language: an annotated bibliography -- Connected words : software applications -- Lex 30 v3.00 manual-- The V-six v1.00 manual -- Wa sorter: the manual…”
    Libro
  8. 1248
    Publicado 2016
    Tabla de Contenidos: “…2.2.3.3 Definition of the target event and population 2.2.3.4 Deciding on time frames; 2.3 Data understanding, preparation, and enrichment; 2.3.1 Investigation of data sources; 2.3.2 Selecting the data sources to be used; 2.3.3 Data integration and aggregation; 2.3.4 Data exploration, validation, and cleaning; 2.3.5 Data transformations and enrichment; 2.3.6 Applying a validation technique; 2.3.6.1 Split or Holdout validation; 2.3.6.2 Cross or n-fold validation; 2.3.6.3 Bootstrap validation; 2.3.7 Dealing with imbalanced and rare outcomes; 2.3.7.1 Balancing; 2.3.7.2 Applying class weights…”
    Libro electrónico
  9. 1249
    Publicado 2012
    Tabla de Contenidos: “…5.2 Analysis of Data in Flexible Research 5.2.1 Introduction; 5.2.2 Level of Formalism; 5.2.3 Relation to Hypotheses; 5.3 Process for Qualitative Data Analysis; 5.3.1 Introduction; 5.3.2 Steps in the Analysis; 5.3.3 Techniques; 5.3.4 Tool support; 5.4 Validity; 5.4.1 Construct Validity; 5.4.2 Internal Validity; 5.4.3 External Validity; 5.4.4 Reliability; 5.5 Improving Validity; 5.6 Quantitative Data Analysis; 5.7 Conclusion; 6 REPORTING AND DISSEMINATION; 6.1 Introduction; 6.2 Why Report and Disseminate; 6.3 The Audience for the Report; 6.4 Aspects of the Case Study to Report and Disseminate…”
    Libro electrónico
  10. 1250
    Publicado 2011
    Tabla de Contenidos: “…Validation techniques; 3.5.2. Validation approaches; 3.5.3. …”
    Libro electrónico
  11. 1251
    por Geelhoed, Fiore
    Publicado 2014
    Tabla de Contenidos: “…1.4.1 Problems in Gaining Trust1.4.2 Internal Validity: Social Desirability and Hidden Transcripts; 1.4.3 Validity of Virtual Reality and Personalities; 1.4.4 External Validity; 1.5 Human Factors in Fieldwork; 1.5.1 Reliability: Opening up to the Insider Perspective; 1.5.2 Dealing with Expectations of Respondents; 1.6 Registration of Observations and Interviews; 1.6.1 Observations: Overt Researcher, Covert Notetaking; 1.6.2 Interviews: No Recording Please!…”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  12. 1252
    Publicado 2018
    Tabla de Contenidos: “…Sending HATEOAS Links in Response -- Spring Boot Starter HATEOAS -- Validation -- Enabling Validation on the Controller Method -- Defining validations on the Bean -- Unit Testing Validations -- Documenting REST Services -- Generating a Swagger Specification -- Swagger UI -- Customizing Swagger Documentation Using Annotations -- Securing REST Services with Spring Security -- Adding Spring Security Starter -- Basic Authentication -- Integration Testing -- Unit Testing -- OAuth 2 Authentication -- High-level flow -- Implementing OAuth 2 authentication for Our Service -- Setting up Authorization and Resource Servers: -- Executing OAuth Requests -- Obtaining an Access Token -- Executing the Request Using the Access Token -- Integration Test -- Internationalization -- Caching -- Spring-boot-starter-cache -- Enabling Caching -- Caching Data -- JSR-107 Caching Annotations -- Auto-Detection Order -- Summary -- Assessments -- Lesson 3: Advanced Spring Boot Features -- Externalised Configuration -- Customizing Frameworks Through application.properties -- Logging -- Embedded Server Configuration -- Spring MVC -- Spring Starter Security -- Data Sources, JDBC and JPA -- Other Configuration Options -- Custom Properties in Application.Properties -- Configuration properties - Type-Safe Configuration Management -- Profiles -- Profiles-Based Bean Configuration -- Other Options for Application Configuration Values -- YAML Configuration -- Embedded Servers -- Switching to Jetty and Undertow -- Building a WAR file -- Developer Tools -- Live Reload -- Spring Boot Actuator -- HAL Browser -- Configuration Properties -- Environment Details -- Health -- Mappings -- Beans -- Metrics -- Auto-Configuration -- Debugging -- Deploying an Application to Cloud -- Cloud Foundry -- Summary -- Assessments -- Appendix: Assessment Answers…”
    Libro electrónico
  13. 1253
    Publicado 2024
    Tabla de Contenidos: “…Running the example application -- Summary -- Chapter 10: Using HTML Templates -- Preparing for this chapter -- Using server-side HTML templates -- Creating a simple template engine -- Creating the custom template engine -- Setting up the custom template engine -- Evaluating expressions in templates -- Adding template features -- Mapping expressions to features -- Using templates to create a simple round-trip application -- Using client-side HTML templates -- Using a template package -- Using a package for server-side templates -- Defining the templates -- Using a package for client-side templates -- Summary -- Chapter 11: Handling Form Data -- Preparing for this chapter -- Receiving form data -- Receiving form data from GET requests -- Receiving form data from POST requests -- Receiving multipart data -- Sanitizing form data -- Validating form data -- Creating a custom validator -- Applying validation rules -- Validating data -- Performing client-side validation -- Using a package for validation -- Summary -- Chapter 12: Using Databases -- Preparing for this chapter -- Using a database -- Installing the database package -- Creating a repository layer -- Implementing the repository -- Querying the database -- Displaying data -- Understanding SQL query parameters -- Writing to the database -- Using an ORM package -- Defining the database using JavaScript objects -- Creating the model classes -- Initializing the data model -- Configuring the model relationships -- Defining the seed data -- Converting data models to flat objects -- Implementing the repository -- Querying for data -- Writing data -- Applying the repository -- Summary -- Chapter 13: Using Sessions -- Preparing for this chapter -- Correlating stateless HTTP requests -- Using cookies to correlate requests -- Receiving cookies -- Setting and reading cookies -- Signing cookies…”
    Libro electrónico
  14. 1254
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Chapter 8: Avoiding Common Vulnerabilities -- Introduction -- Validating the Resource Server audience -- Getting ready -- How to do it... -- How it works... -- Protecting Resource Server with scope validation -- Getting ready -- How to do it... -- How it works... -- Binding scopes with user roles to protect user's resources -- Getting ready -- How to do it... -- How it works... -- See also -- Protecting the client against Authorization Code injection -- Getting ready -- How to do it... -- How it works... -- Protecting the Authorization Server from invalid redirection -- Getting ready -- How to do it... -- How it works... -- Index…”
    Libro electrónico
  15. 1255
    por Silva, Alexandra
    Publicado 2021
    Tabla de Contenidos: “…-Regular Properties with Decoupled Search -- AIGEN: Random Generation of Symbolic Transition Systems -- GPU Acceleration of Bounded Model Checking with ParaFROST -- Pono: A Flexible and Extensible SMT-based Model Checker -- Logical Foundations -- Towards a Trustworthy Semantics-Based Language Framework via Proof Generation -- Formal Foundations of Fine-Grained Explainability -- Latticed k-Induction with an Application to Probabilistic Programs -- Stochastic Systems -- Runtime Monitors for Markov Decision Processes -- Model Checking Finite-Horizon Markov Chains with Probabilistic Inference -- Enforcing Almost-Sure Reachability in POMDPs -- Rigorous Floating-Point Roundo Error Analysis of Probabilistic Computations -- Model-free Reinforcement Learning for Branching Markov Decision Processes -- Software Verification -- Cameleer: a Deductive Verification Tool for OCaml -- LLMC: Verifying High-Performance Software -- Formally Validating a Practical Verification Condition Generator -- Automatic Generation and Validation of Instruction Encoders and Decoders -- An SMT Encoding of LLVM's Memory Model for Bounded Translation Validation -- Automatically Tailoring Abstract Interpretation to Custom Usage Scenarios -- Functional Correctness of C implementations of Dijkstra's, Kruskal's, and Prim's Algorithms -- Gillian, Part II: Real-World Verification for JavaScript and C -- Debugging Network Reachability with Blocked Paths -- Lower-Bound Synthesis using Loop Specialization and Max-SMT -- Fast Computation of Strong Control Dependencies -- Di y: Inductive Reasoning of Array Programs using Difference Invariants…”
    Libro electrónico
  16. 1256
    por Wilson, Chauncey
    Publicado 2013
    Tabla de Contenidos:
    Libro electrónico
  17. 1257
    Publicado 2019
    Tabla de Contenidos: “…MINIMUM VIABLE PRODUCT (MVP) -- 3. VALIDATED LEARNING -- 4. BUILD, MEASURE, AND LEARN -- 5. …”
    Libro electrónico
  18. 1258
    por Hurlburt, Russell T.
    Publicado 2006
    Tabla de Contenidos: “…-- Idiographic research is difficult but possible -- Truth -- Clinical impression is not necessarily truth -- Validity is not truth -- Questions and answers -- Epilogue -- References -- Index -- Advances in Consciousness Research…”
    Libro electrónico
  19. 1259
    por Wren, Kevin, 1947-
    Publicado 1999
    Tabla de Contenidos: “…Obedience; Introduction; Obedience research; Milgram's experiment; Criticisms of Milgram's experiment; Ecological validity; Internal validity; Ethics; Counter-arguments; Other obedience studies; Cross-cultural studies; Field experiments; Evaluation; Some explanations of obedience; Milgram's agentic theory; Psychoanalytic explanations; Graduated commitment; Deindividuation; Authoritarian personality; 'Sleepers'; Binding forces; Summary; 2. …”
    Libro electrónico
  20. 1260
    por Guilmette, Aaron
    Publicado 2024
    Tabla de Contenidos: “…Exam Readiness Drill -- Chapter Review Questions -- Exam Readiness Drill -- Working On Timing -- Chapter 4: Describe Core Machine Learning Concepts -- Identify features and labels in a dataset for machine learning -- Identifying features in a dataset -- Identifying labels in a dataset -- Describe how training and validation datasets are used in machine learning -- Training set -- Validation set -- Summary -- Exam Readiness Drill -- Chapter Review Questions -- Exam Readiness Drill -- Working On Timing -- Chapter 5: Describe Azure Machine Learning Capabilities -- What is Azure ML?…”
    Libro electrónico