Mostrando 121 - 140 Resultados de 417 Para Buscar 'Defensive end', tiempo de consulta: 0.10s Limitar resultados
  1. 121
    Publicado 2018
    Tabla de Contenidos: “…From the 'Unidimensional Identity' to the 'Diversity of Identities' -- Sustainable Intergenerational Justice and its Ends -- Global Responsibility in a Historical Context -- 3. …”
    Libro electrónico
  2. 122
    por Singh, Robert
    Publicado 2012
    Tabla de Contenidos: “…Chinese Military Developments: Enter the DragonTaiwan; Conclusion: the Limits of Strategic Engagement with China; 8 Russia; Introduction; Resetting Russian-American Relations; Missile Defense, New START, and Afghanistan; Missile Defense; New START; Afghanistan, Central Asia and the ""Post-Soviet Space""; Resetting the Reset?…”
    Libro electrónico
  3. 123
  4. 124
    Publicado 2020
    Libro
  5. 125
    Publicado 2023
    Libro electrónico
  6. 126
    por Rhonheimer, Martin, 1950-
    Publicado 2009
    Tabla de Contenidos: “…Summa theologiae II-II, q.64, a.7 : killing in self-defense according to Thomas Aquinas ; c. Critique and the development of the discussion ; d. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  7. 127
    Publicado 2014
    Tabla de Contenidos: “…Chapter 12: A Classic Innate Behavior, Sodium Appetite, Is Driven by Hypothalamic Gene-Regulatory Programs Previously Linked to Addiction and RewardChapter 13: Development of Local RAS in Cardiovascular/Body Fluid Regulatory Systems and Hypertension in Fetal Origins; Chapter 14: Sodium Appetite Sensitization; Chapter 15: Homeostasis and Body Fluid Regulation: An End Note; Back Cover…”
    Libro electrónico
  8. 128
    Publicado 2024
    Tabla de Contenidos: “…6.3 Strong assumptions made by SOTA attacks -- 6.3.1 The state-of-the-art attacks -- 6.3.2 Strong assumptions -- Assumption 1: Knowledge of BatchNorm statistics -- Assumption 2: Knowing or being able to infer private labels -- 6.3.3 Re-evaluation under relaxed assumptions -- Relaxation 1: Not knowing BatchNorm statistics -- Relaxation 2: Not knowing private labels -- 6.4 Defenses against the gradient inversion attack -- 6.4.1 Encrypt gradients -- 6.4.2 Perturbing gradients -- 6.4.3 Weak encryption of inputs (encoding inputs) -- 6.5 Evaluation -- 6.5.1 Experimental setup -- 6.5.2 Performance of defense methods -- 6.5.3 Performance of combined defenses -- 6.5.4 Time estimate for end-to-end recovery of a single image -- 6.6 Conclusion -- 6.7 Future directions -- 6.7.1 Gradient inversion attacks for text data -- 6.7.2 Gradient inversion attacks in variants of federated learning -- 6.7.3 Defenses with provable guarantee -- References -- 2 Emerging topics -- 7 Personalized federated learning: theory and open problems -- 7.1 Introduction -- 7.2 Problem formulation of pFL -- 7.3 Review of personalized FL approaches -- 7.3.1 Mixing models -- 7.3.2 Model-based approaches: meta-learning -- 7.3.3 Multi-task learning -- 7.3.4 Weight sharing -- 7.3.5 Clients clustering -- 7.4 Personalized FL algorithms -- 7.4.1 pFedMe -- 7.4.2 FedU -- 7.5 Experiments -- 7.5.1 Experimental settings -- 7.5.2 Comparison -- 7.6 Open problems -- 7.6.1 Transfer learning -- 7.6.2 Knowledge distillation -- 7.7 Conclusion -- References -- 8 Fairness in federated learning -- 8.1 Introduction -- 8.2 Notions of fairness -- 8.2.1 Equitable fairness -- 8.2.2 Collaborative fairness -- 8.2.3 Algorithmic fairness -- 8.3 Algorithms to achieve fairness in FL -- 8.3.1 Algorithms to achieve equitable fairness -- 8.3.2 Algorithms to achieve collaborative fairness…”
    Libro electrónico
  9. 129
    Publicado 2017
    Libro electrónico
  10. 130
    Publicado 2010
    Tabla de Contenidos: “…-- What an Omnichannel Experience Looks Like: H&amp -- R Block -- The Elements of an Omnichannel Experience -- How a CDP Works -- Subaru: Combining the Front End and Back End for an Omnichannel Experience -- Managerial Considerations When Leading an Omnichannel Transformation Implementation -- Conclusion -- Author Biography -- Chapter 19 Sales as Storytelling -- Sales and Marketing -- Why Story? …”
    Libro electrónico
  11. 131
    Publicado 2008
    Tabla de Contenidos: “…Fundamental standards of humanity: a common language of international humanitarian law and human rights law / Marco Odello -- End justices, the means? : post 9/11 contempt for humane treatment / Agnieszka Jachec-Neale -- Legal conclusion or interpretative process? …”
    Libro
  12. 132
    Publicado 2011
    Tabla de Contenidos: “…21 Behavioral Effects in M&A's PART V Recapitalization and Restructuring; 22 Financial Restructuring; 23 Going Private and Leveraged Buyouts; 24 International Takeovers and Restructuring; PART VI Special Topics; 25 Joint Ventures and Strategic Alliances: Alternatives to M&A's; 26 Fairness Opinions in M&As; 27 How Initial Public Offerings Affect M&A Markets: The Dual Tracking Phenomenon; 28 The Diversification Discount; 29 Partial Acquisitions:Motivation and Consequences on Firm Performance; Answers to End-of-Chapter Discussion Questions; Index…”
    Libro electrónico
  13. 133
    Publicado 2018
    Tabla de Contenidos: “…Asynchronous API -- Micro-frontend -- Trilateral API per container -- Summary -- Chapter 7: Testing -- Shifting testing to the left -- Test engineering -- Isolated testing -- Unit testing -- Component testing -- Transitive testing -- Integration testing -- Contract testing -- End-to-end testing -- Manual testing -- Example - end-to-end relay -- Submit order leg -- Order submitted leg -- Summary -- Chapter 8: Monitoring -- Shifting testing to the right -- Key performance indicators -- Real and synthetic traffic -- Real-user monitoring -- Synthetic transaction monitoring -- Observability -- Measurements -- Work metrics -- Resource metrics -- Events -- Telemetry -- Alerting -- Focus on recovery -- Performance -- Summary -- Chapter 9: Security -- Shared responsibility model -- Security by design -- Accounts as code -- Defense in depth -- Edge layer -- Component layer -- Data layer -- Encryption -- Data in transit -- Data at rest -- Envelope encryption -- Tokenization -- Domain events -- Disaster recovery -- Application security -- Federated identity management -- API gateway -- JWT assertion and filter patterns -- Regulatory compliance -- Summary -- Chapter 10: Value Focused Migration -- Risk mitigation -- Anti-pattern - Lift and Shift -- Anti-pattern - synchronous anti-corruption layer -- Strangler pattern -- Bi-directional synchronization and latching -- Legacy change data capture -- Empower self-sufficient, full-stack teams -- Evolutionary architecture -- Welcome polyglot cloud -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  14. 134
    Publicado 2018
    “…Learn all you can on event logging and exception handling, as well as testing and debugging smart contracts. By the end of this book, you will be able to write, deploy, and test smart contracts in Ethereum. …”
    Libro electrónico
  15. 135
    Publicado 2019
    “…Implement defensive techniques in your ecosystem successfully with Python Key Features Identify and expose vulnerabilities in your infrastructure with Python Learn custom exploit development . …”
    Libro electrónico
  16. 136
  17. 137
    Publicado 2014
    Libro electrónico
  18. 138
    Publicado 2000
    Libro electrónico
  19. 139
    Tabla de Contenidos: “…Recommendations for future research ; Appendix 9-2. Ending the tobacco problem : a blueprint for the nation ; Appendix 9-3. …”
    Libro electrónico
  20. 140
    por Harrington, Jan L.
    Publicado 2007
    Tabla de Contenidos: “…Security Threats to Home and Small OfficesBasic Defenses; Advanced Defenses; Security Resources; Chapter 11. …”
    Libro electrónico