Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 28
- Management 20
- Data mining 11
- RELIGION 11
- Development 9
- Psychological aspects 9
- Christianity 8
- Computer software 8
- Social aspects 8
- Social conditions 8
- Artificial intelligence 7
- Big data 7
- Business & Economics 7
- Computer networks 7
- Documentales 7
- Information technology 7
- Machine learning 7
- Python (Computer program language) 7
- Success in business 7
- Computer programming 6
- Database management 6
- Historia 6
- Leadership 6
- Operating systems (Computers) 6
- Religious aspects 6
- Security measures 6
- Social Sciences 6
- Social life and customs 6
- Success 6
- Emigration and immigration 5
-
301por Page, AlanTabla de Contenidos: “…; Campus Recruiting; Industry Recruiting; Learning How to Be a Microsoft SDET; The Engineering Career at Microsoft; Career Paths in the Test Discipline; The Test Architect; The IC Tester; Becoming a Manager is Not a Promotion; Test Managers; Summary; Chapter 3: Engineering Life Cycles; Software Engineering at Microsoft; Traditional Software Engineering Models; Milestones; Agile at Microsoft; Putting It All Together…”
Publicado 2009
Libro electrónico -
302Publicado 2020“…First published in 2011, You Can Help Your Country: English children's work during the Second World War reveals the remarkable, hidden history of children as social agents who actively participated in a national effort during a period of crisis. …”
Libro electrónico -
303por Dunning, DavidTabla de Contenidos: “…Accentuating the Positive a Little Too Much…”
Publicado 2005
Libro electrónico -
304Publicado 2023Tabla de Contenidos: “…Memory management functions -- Dynamic record allocation -- FastMM4 internals -- Memory allocation in a parallel world -- Replacing the default memory manager -- Logging memory manager -- FastMM4 with release stack -- FastMM5 -- TBBMalloc -- Comparing memory managers -- There is no silver bullet -- Fine-tuning SlowCode -- Summary -- Chapter 7: Getting Started with the Parallel World -- Technical requirements -- Processes and threads -- Multithreading -- Multitasking -- When to parallelize code -- The most common problems -- Never access the UI from a background thread -- Simultaneous reading and writing -- Sharing a variable -- Hidden behavior -- Synchronization -- Critical sections -- Other locking mechanisms -- A short note on coding style -- Shared data with built-in locking -- Interlocked operations -- Object life cycle -- Communication -- Windows messages -- Synchronize and Queue -- Polling -- Performance -- Third-party libraries -- Summary -- Chapter 8: Working with Parallel Tools -- Technical requirements -- TThread -- Automatic life cycle management -- Advanced TThread -- Setting up a communication channel -- Sending messages from a thread -- Using TCommThread -- Implementing a timer -- Synchronizing with multiple workers -- WaitForMultipleObjects -- Condition variables -- Comparing both approaches -- Summary -- Chapter 9: Exploring Parallel Practices -- Technical requirements -- Tasks and patterns -- Variable capturing -- Tasks -- Exceptions in tasks -- Parallelizing a loop -- Thread pooling -- Async/Await -- Join -- Join/Await -- Future -- Parallel for -- Pipelines -- Web spider -- The filter stage -- The downloader stage -- The parser stage -- Summary -- Chapter 10: More Parallel Patterns -- Technical requirements -- Using OmniThreadLibrary -- Blocking collections -- Using blocking collections with TThread-based threads -- Async/Await…”
Libro electrónico -
305Publicado 2018“…The advantage of Azure ML is that it provides a UI-based interface and pre-defined algorithms that can be used to create a training model. …”
-
306Publicado 2007Tabla de Contenidos: “…Introduction Why Is Fuzzing Important to Include in a Software Development Cycle?; Security Testing Workload; Setting Expectations for Fuzzers in a Software Development Lifecycle; Fuzzing as a Panacea; Fuzzing Tools versus ...; Setting the Plan for Implementing Fuzzers into a Software Development Lifecycle; Setting Goals; Building and Executing on the Plan; Understanding How to Increase Effectiveness of Fuzzers, and Avoiding Any Big Gotchas; Hidden Costs; Finding More Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Standardization and Certification…”
Libro electrónico -
307Publicado 2020Tabla de Contenidos: “…Multivariate Time Series as Images: Imputation Using Convolutional Denoising Autoencoder -- Dual Sequential Variational Autoencoders for Fraud Detection -- A Principled Approach to Analyze Expressiveness and Accuracy of Graph Neural Networks -- Efficient Batch-Incremental Classification Using UMAP for Evolving Data Streams -- GraphMDL: Graph Pattern Selection Based on Minimum Description Length -- Towards Content Sensitivity Analysis -- Gibbs Sampling Subjectively Interesting Tiles -- Even Faster Exact k-Means Clustering -- Ising-Based Consensus Clustering on Special Purpose Hardware -- Transfer Learning by Learning Projections from Target to Source -- Computing Vertex-Vertex Dissimilarities Using Random Trees: Application to Clustering in Graphs -- Towards Evaluation of CNN Performance in Semantically Meaningful Latent Spaces -- Vouw: Geometric Pattern Mining Using the MDL Principle -- A Consensus Approach to Improve NMF Document Clustering -- Discriminative Bias for Learning Probabilistic Sentential Decision Diagrams -- Widening for MDL-Based Retail Signature Discovery -- Addressing the Resolution Limit and the Field of View Limit in Community Mining -- Estimating Uncertainty in Deep Learning for Reporting Confidence: An Application on Cell Type Prediction in Testes Based on Proteomics -- Adversarial Attacks Hidden in Plain Sight -- Enriched Weisfeiler-Lehman Kernel for Improved Graph Clustering of Source Code -- Overlapping Hierarchical Clustering (OHC) -- Digital Footprints of International Migration on Twitter -- Percolation-Based Detection of Anomalous Subgraphs in Complex Networks -- A Late-Fusion Approach to Community Detection in Attributed Networks -- Reconciling Predictions in the Regression Setting: an Application to Bus Travel Time Prediction -- A Distribution Dependent and Independent Complexity Analysis of Manifold Regularization -- Actionable Subgroup Discovery and Urban Farm Optimization -- AVATAR - Machine Learning Pipeline Evaluation Using Surrogate Model -- Detection of Derivative Discontinuities in Observational Data -- Improving Prediction with Causal Probabilistic Variables -- DO-U-Net for Segmentation and Counting -- Enhanced Word Embeddings for Anorexia Nervosa Detection on Social Media -- Event Recognition Based on Classification of Generated Image Captions -- Human-to-AI Coach: Improving Human Inputs to AI Systems -- Aleatoric and Epistemic Uncertainty with Random Forests -- Master your Metrics with Calibration -- Supervised Phrase-Boundary Embeddings -- Predicting Remaining Useful Life with Similarity-Based Priors -- Orometric Methods in Bounded Metric Data -- Interpretable Neuron Structuring with Graph Spectral Regularization -- Comparing the Preservation of Network Properties by Graph Embeddings -- Making Learners (More) Monotone -- Combining Machine Learning and Simulation to a Hybrid Modelling Approach -- LiBRe: Label-Wise Selection of Base Learners in Binary Relevance for Multi-Label Classification -- Angle-Based Crowding Degree Estimation for Many-Objective Optimization…”
Libro electrónico -
308Publicado 2017“…Until recently their contributions, both to the saving of lives and to our understanding of warfare, have remained largely hidden from view. By combining biographical research with textual analysis, Nurse writers of the great war opens a window onto their insights into the nature of nursing and the impact of war Examining the experiences of First World War nurses through their own writings, this book offers fresh insights into the reality of industrial warfare…”
Capítulo de libro electrónico -
309Publicado 2019Tabla de Contenidos: “…Frontmatter -- Preface -- TABLE OF CONTENT -- Semantic Preferences of Indonesian Words Hitam and Putih -- The Stylistic Analysis of Indonesian Online News in The Five Websites -- Proto Austronesian Language Sound Changes To Mandailing Language -- The Use of Verb + Noun Collocations by English Learners of Indonesian -- An Examination of Islamic Verbal and Non-Verbal Communication in Retail Stores -- Proto Malayic Reflection at Isolect of Malay Jambi Seberang and Malay Sabak at Jambi Province -- Otographis Approach Toward Language Resilience Study on Japanese LanguageLexicons in Indonesia Historical Documents -- The Cultural Values in The Culinary Ecolexicon of the Asahan Malay Society -- Bioacoustics Analysis With Speech Analyzer Spectogram As A Testing Method For Speech Ability Improvement of Dysarthria Patient -- Speech, Writing Disorder and Therapy of Dyslexic Patient -- The Variations of Speech in Opening and Closing TV Program Uttered by MTV Singapore VJ -- Delivering The Message of Local Spirit "Bakureh" Through The Language of Dance -- Contribution of Biological Knowledge in Understanding the Ulterior Teaching of Life within the Minangkabau Poems and Proverbs -- Social Practice In Facebook: Critical Discourse Analysis In The Process of Text Production -- Pakpak Dairi Language: Typology Study -- Speech Act of Advice toward the Victims of Domestic Violence in West Sumatera -- A Fallacy Analysis on Political Statements in the Transcript of the First Indonesia Presidential Debate 2019 -- Are the Phonological Disorders of Down Syndrome Children the Same? …”
Libro electrónico -
310Publicado 2017“…If you want to explore data structures and algorithms in a practical way with real-life projects, then this book is for you. …”
Libro electrónico -
311Publicado 2024Tabla de Contenidos: “…-- Save How I've Set Up All My Panels? -- Create a New Blank Document? -- See More Than One Image at a Time? …”
Libro electrónico -
312Publicado 2024Tabla de Contenidos: “…-- Exploring types of malware -- Virus -- Worms -- Trojans -- Ransomware -- Bots/botnets -- Adware -- Spyware -- Malvertising -- Fileless malware -- Backdoors -- Rootkits -- How does malware get onto machines? -- Analyzing a sample -- Setting up a malware analysis lab -- Static analysis -- Dynamic analysis -- Detecting malware and removing it -- Perimeter monitoring -- Malware prevention -- Summary -- Lab -- Assessment -- Answers -- Part 3: Defense, Social Engineering, IoT, and Cloud -- Chapter 11: Incident Response and Threat Hunting -- What is an incident? …”
Libro electrónico -
313Publicado 2021Tabla de Contenidos: “…Constants -- INTO CORRESPONDING -- DDIC Information -- Using Standard SAP Functions Incorrectly -- Conclusion -- Chapter 6: User Friendliness: Ensuring UI Quality -- General Philosophy -- Difference Between UI and UX -- Don't Make Me Think -- Waterfall Projects -- Consistency -- Standards -- Applying Industry Standards -- Non-Standard Icon Appearance -- Non-Standard Icon Usage -- Inconsistency -- Inconsistency in F4 Helps -- Inconsistency in Pop-Ups -- Inconsistency in Master Data Transactions -- Ease of Use -- Laying Traps for the User -- Hiding Icons for No Reason -- Hiding Fields for No Reason -- Slightly Hidden Field -- Totally Hidden Field -- Incorrect Use of Check Boxes -- Confusing the User -- Giving Incorrect Options -- Giving No Options at All -- Accessibility -- Explaining Things to the User -- Avoiding Abbreviations -- Custom Data Elements -- Custom F1 Help -- Custom Domains -- Error Prevention -- Inviting Errors -- Self-Destruct Button -- Stopping Dumps Before They Begin -- Self-Service -- Logging -- Linking Errors to Training Material -- Sneaky Trick: ALV Filter Not Working -- Error Handling -- Shouting at the User -- Preventing the User from Fixing the Problem -- Making the User Reenter Data -- Making It Impossible to Fix the Problem -- Enabling the User to Fix the Problem -- Mandatory Fields -- Taking the User to the Source of the Problem -- Example: IDoc Application Log -- Documentation -- Documentation Guidelines -- Documentation Terminology -- Documentation for Dialog Transactions -- Documentation for Developers -- Conclusion -- Recommended Reading -- Chapter 7: User Exits: Defusing a Potential Time Bomb -- User Exits in On-Premises SAP Systems -- VOFM Routines -- Repairs -- FORM-Based User Exits -- CMOD User Exits -- BAdi User Exits -- The Enhancement Framework -- User Exits in Your Own Z Programs -- User Exits in Cloud SAP Systems…”
Libro electrónico -
314por Singh, Simran“…The greatest quest in life is to love and be loved. Love continually reveals everything unlike itself. …”
Publicado 2015
Libro electrónico -
315Publicado 2008“…You’ll learn how to adopt the attributes of a good questioner...set a goal for every question...use your personal style more effectively...ask tough questions, elicit dissent, react to surprises, overcome evasions, and more. …”
Libro electrónico -
316Publicado 2014Tabla de Contenidos: “…the Key to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network Based on Its Name; Don't Trust Your Phone to Connect for You; Bluetooth Hacking; Malware Apps; Operating System Updates; Additional Reading; Chapter 8: Don't Use Dinosaurs; Software: It Has an Expiration Date; The "Good Old Days" of Software; New Software for a New Era; Don't Forget About Mobile Apps; Windows XP; Not Just Windows; Not Just Operating Systems; Not Just Desktops and Laptops…”
Libro electrónico -
317Publicado 2016Libro electrónico
-
318Publicado 2007Tabla de Contenidos: “…New Shoes for the Cobbler's ChildrenThe Software Development Life Cycle; SOA and Software Testing; Chapter 15: The Repository and the Registry; Ch-Ch-Ch-Changes; IT As Service Provider; Governance, the Repository, and the Registry; Part IV: Getting Started with SOA; Chapter 16: Do You Need a SOA? …”
Libro electrónico -
319Publicado 2013Tabla de Contenidos: “…-- 3 The Currency of Happiness -- What Makes Happiness? -- Life, Liberty, and the Pursuit of . . . a Paycheck? …”
Libro electrónico -
320por Falk, Francesca. author“…“This highly informative book provides precisely analysed situations highlighting migration’s crucial role for emancipatory change and hence socio-political innovation. A so far hidden perspective is being made visible and contributes a highly compelling piece for rewriting Switzerland’s history.” …”
Publicado 2019
Libro electrónico