Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 69
- Development 50
- Computer networks 44
- Management 38
- Application software 36
- Educació primària 28
- Ciencias empresariales 27
- Llibres de text 26
- Llibres del mestre 26
- Engineering & Applied Sciences 25
- Finance 25
- History 25
- Història 25
- Economics 24
- Business & Economics 23
- Certification 20
- Examinations 20
- Economic conditions 19
- Computer security 18
- Electronic data processing personnel 17
- Security measures 17
- Computer programs 16
- Universidad Pontificia de Salamanca (España) 16
- Electronic data processing 15
- Francisco Gárate 15
- Llibres d'exercicis 15
- Material didàctic 15
- Computer Science 14
- Information technology 14
- Law and legislation 14
-
1401por NATO Advanced Research Workshop "Strengthening and Promoting Religious Co-existence and Tolerance for a More Secure Civil Society in the Balkans and beyondTabla de Contenidos: “…The Legacy of the Albanian Evangelicals and Its Continuation Post - 1990 Religious Suspension of the Divine; The Inadvertent Effects of Democratisation on Religious Extremist Groups; The Jews of Albania During the Zogist Period and the Second World War; Between East and West: The Basilian Monks of Grottaferrata in Albania; Religious Tolerance in Montenegro as a Guarantee of Stability and Security of the Country; Interfaith Relations in Serbia; The Bektashi Heritage in Albania; Part Three. …”
Publicado 2007
Libro electrónico -
1402Publicado 2019Tabla de Contenidos: “…Logics, Decision Procedures, and Solvers -- Satisfiability Checking for Mission-Time LTL -- High-Level Abstractions for Simplifying Extended String Constraints in SMT -- Alternating Automata Modulo First Order Theories -- Q3B: An Efficient BDD-based SMT Solver for Quantified Bit-Vectors -- CVC4SY: Smart and Fast Term Enumeration for Syntax-Guided Synthesis -- Incremental Determinization for Quantifier Elimination and Functional Synthesis -- Numerical Programs -- Loop Summarization with Rational Vector Addition Systems -- Invertibility Conditions for Floating-Point Formulas -- Numerically-Robust Inductive Proof Rules for Continuous Dynamical Systems -- Icing: Supporting Fast-math Style Optimizations in a Verified Compiler -- Sound Approximation of Programs with Elementary Functions -- Verification -- Formal verification of quantum algorithms using quantum Hoare logic -- SecCSL: Security Concurrent Separation Logic -- Reachability Analysis for AWS-based Networks -- Distributed Systems and Networks -- Verification of Threshold-Based Distributed Algorithms by Decomposition to Decidable Logics -- Gradual Consistency Checking -- Checking Robustness Against Snapshot Isolation -- Efficient verification of network fault tolerance via counterexampleguided refinement -- On the Complexity of Checking Consistency for Replicated Data Types -- Communication-closed asynchronous protocols -- Verification and Invariants -- Interpolating Strong Induction -- Verifying Asynchronous Event-Driven Programs Using Partial Abstract Transformers -- Inferring Inductive Invariants from Phase Structures -- Termination of Triangular Integer Loops is Decidable -- AliveInLean: A Verified LLVM Peephole Optimization Verifier -- Concurrency -- Automated Parameterized Verification of CRDTs -- What's wrong with on-the-y partial order reduction -- Integrating Formal Schedulability Analysis into a Verifed OS Kernel -- Rely-guarantee Reasoning about Concurrent Memory Management in Zephyr RTOS -- Violat: Generating Tests of Observational Refinement for Concurrent Objects. …”
Libro electrónico -
1403Publicado 2007Tabla de Contenidos: “…Component-Based Middleware -- R-OSGi: Distributed Applications Through Software Modularization -- Argos, an Extensible Personal Application Server -- Compadres: A Lightweight Component Middleware Framework for Composing Distributed Real-Time Embedded Systems with Real-Time Java -- Mobile and Ubiquitous Computing -- SIPHoc: Efficient SIP Middleware for Ad Hoc Networks -- Vector-Field Consistency for Ad-Hoc Gaming -- Correlation-Based Content Adaptation for Mobile Web Browsing -- Grid and Cluster Computing -- New Worker-Centric Scheduling Strategies for Data-Intensive Grid Applications -- Interactive Resource-Intensive Applications Made Easy -- Garbage Collecting the Grid: A Complete DGC for Activities -- Enhancing Communication -- XenSocket: A High-Throughput Interdomain Transport for Virtual Machines -- Creating Private Network Overlays for High Performance Scientific Computing -- A Cost-Effective Distributed File Service with QoS Guarantees -- Resource Management -- R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads -- AVMEM - Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems -- iManage: Policy-Driven Self-management for Enterprise-Scale Systems -- Reliability and Fault Tolerance -- Middleware Support for Adaptive Dependability -- Consistent and Scalable Cache Replication for Multi-tier J2EE Applications -- CLASP: Collaborating, Autonomous Stream Processing Systems -- Asynchronous Communication -- A Policy Management Framework for Content-Based Publish/Subscribe Middleware -- Hybrid Dissemination: Adding Determinism to Probabilistic Multicasting in Large-Scale P2P Systems -- A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications -- Programming Wireless Sensor Networks with the TeenyLime Middleware…”
Libro electrónico -
1404Publicado 2022Tabla de Contenidos: “…-- Notes -- Chapter 3: Personal Cybersecurity for eHealth Deployments -- Introduction -- Personal Cybersecurity for eHealth Deployments -- The Intuition for Security -- Threat Situations: Identification, Isolation, and Containment -- Escalation and Reporting -- Notes -- Chapter 4: Data/Information Security for eHealth Deployments -- Introduction -- Data/Information Security for eHealth Deployments -- Integrity, Confidentiality, and Availability: Invariant and Non-Negotiable -- Preserving Integrity -- Safeguarding Privacy -- Ensuring Confidentiality -- Guaranteeing Availability -- Notes -- Chapter 5: Securing eHealth Systems and Infrastructures -- Introduction -- Securing eHealth Systems and Infrastructures -- Cybersecurity for eHealth: Physical Imperatives -- Cybersecurity for eHealth: Logical Imperatives -- Cybersecurity for eHealth: Operational Imperatives -- Monitoring and Evaluation for Compliance -- Understanding Ecosystems of eHealth Deployments -- Notes…”
Libro electrónico -
1405Publicado 2009Tabla de Contenidos: “…Cartwright -- The European deposit guarantee directive : an appraisal on the reforms / D. …”
Libro -
1406Publicado 2017Libro electrónico
-
1407Publicado 2022Libro electrónico
-
1408
-
1409
-
1410
-
1411
-
1412Publicado 2020Tabla de Contenidos: “…Nuclear Deterrence: A Guarantee for or Threat to Strategic Stability? -- Chapter 6. …”
Libro electrónico -
1413Publicado 2019Tabla de Contenidos: “…Horizontal and vertical coordination of the European Youth Guarantee / Irene Dingeldey, Lisa Steinberg and Marie-Luise Assmann -- 10. …”
Libro electrónico -
1414Publicado 2013Tabla de Contenidos: “…-- Exercises on NP-Completeness Easy reductionsAbout graph coloringScheduling problemsMore involved reductions2-PARTITION is NP-complete -- Beyond NP-Completeness Approximation resultsPolynomial problem instancesLinear programmingRandomized algorithms Branch-and-bound and backtracking -- Exercises Going beyond NP-Completeness Approximation resultsDealing with NP-complete problems -- Reasoning on Problem Complexity Reasoning to Assess a Problem Complexity Basic reasoning Set of problems with polynomial-time algorithms Set of NP-complete problems -- Chains-on-Chains Partitioning Optimal algorithms for homogeneous resources Variants of the problem Extension to a clique of heterogeneous resourcesConclusion -- Replica Placement in Tree Networks Access policies Complexity resultsVariants of the replica placement problem Conclusion -- Packet Routing MEDP: Maximum edge-disjoint pathsPRVP: Packet routing with variable-pathsConclusion -- Matrix Product, or Tiling the Unit Square Problem motivation NP-completeness A guaranteed heuristicRelated problems -- Online Scheduling Flow time optimization Competitive analysisMakespan optimizationConclusion -- Bibliography -- Index…”
Libro electrónico -
1415Publicado 2018Tabla de Contenidos: “…-- Making Yourself More Memorable -- Become the Expert -- Better Than a Brochure -- Let's Get Social -- Social Proof -- Giving Testimonials -- 4 Defining Your Sales Process -- Pick Up the Phone -- A Guaranteed Success Formula -- Show That You Care -- Choose Your Allies -- Some Simple Tips -- 5 Making the Moments Count -- Who Holds the Controls? …”
Libro electrónico -
1416por Serdar, BurakTabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Chapter 1: Concurrency - A High-Level Overview -- Technical Requirements -- Concurrency and parallelism -- Shared memory versus message passing -- Atomicity, race, deadlocks, and starvation -- Summary -- Question -- Further reading -- Chapter 2: Go Concurrency Primitives -- Technical Requirements -- Goroutines -- Channels -- Mutex -- Wait groups -- Condition variables -- Summary -- Questions -- Chapter 3: The Go Memory Model -- Why a memory model is necessary -- The happened-before relationship between memory operations -- Synchronization characteristics of Go concurrency primitives -- Package initialization -- Goroutines -- Channels -- Mutexes -- Atomic memory operations -- Map, Once, and WaitGroup -- Summary -- Further reading -- Chapter 4: Some Well-Known Concurrency Problems -- Technical Requirements -- The producer-consumer problem -- The dining philosophers problem -- Rate limiting -- Summary -- Chapter 5: Worker Pools and Pipelines -- Technical Requirements -- Worker pools -- Pipelines, fan-out, and fan-in -- Asynchronous pipeline -- Fan-out/fan-in -- Fan-in with ordering -- Summary -- Questions -- Chapter 6: Error Handling -- Error handling -- Pipelines -- Servers -- Panics -- Summary -- Chapter 7: Timers and Tickers -- Technical Requirements -- Timers - running something later -- Tickers - running something periodically -- Heartbeats -- Summary -- Chapter 8: Handling Requests Concurrently -- Technical Requirements -- The context, cancelations, and timeouts -- Backend services -- Distributing work and collecting results -- Semaphores - limiting concurrency -- Streaming data -- Dealing with multiple streams -- Summary -- Chapter 9: Atomic Memory Operations -- Technical Requirements -- Memory guarantees -- Compare and swap…”
Publicado 2023
Libro electrónico -
1417Publicado 2024Tabla de Contenidos: “…3.2.2 Differential privacy -- 3.3 DP guaranteed algorithms -- 3.3.1 Sample-level DP -- 3.3.1.1 Algorithms and discussion -- 3.3.2 Client-level DP -- 3.3.2.1 Clipping strategies for client-level DP -- 3.3.2.2 Algorithms and discussion -- 3.4 Performance of clip-enabled DP-FedAvg -- 3.4.1 Main results -- 3.4.1.1 Convergence theorem -- 3.4.1.2 DP guarantee -- 3.4.2 Experimental evaluation -- 3.5 Conclusion and future work -- References -- 4 Assessing vulnerabilities and securing federated learning -- 4.1 Introduction -- 4.2 Background and vulnerability analysis -- 4.2.1 Definitions and notation -- 4.2.1.1 Horizontal federated learning -- 4.2.1.2 Vertical federated learning -- 4.2.2 Vulnerability analysis -- 4.2.2.1 Clients' updates -- 4.2.2.2 Repeated interaction -- 4.3 Attacks on federated learning -- 4.3.1 Training-time attacks -- 4.3.1.1 Byzantine attacks -- 4.3.1.2 Backdoor attacks -- 4.3.2 Inference-time attacks -- 4.4 Defenses -- 4.4.1 Protecting against training-time attacks -- 4.4.1.1 In Situ defenses -- 4.4.1.2 Post Facto defenses -- 4.4.2 Protecting against inference-time attacks -- 4.5 Takeaways and future work -- References -- 5 Adversarial robustness in federated learning -- 5.1 Introduction -- 5.2 Attack in federated learning -- 5.2.1 Targeted data poisoning attack -- 5.2.1.1 Label flipping -- 5.2.1.2 Backdoor -- 5.2.1.2.1 Trigger-based backdoor -- 5.2.1.2.2 Semantic backdoor -- 5.2.2 Untargeted model poisoning attack -- 5.3 Defense in federated learning -- 5.3.1 Vector-wise defense -- 5.3.2 Dimension-wise defense -- 5.3.3 Certification -- 5.3.4 Personalization -- 5.3.5 Differential privacy -- 5.3.6 The gap between distributed training and federated learning -- 5.3.7 Open problems and further work -- 5.4 Conclusion -- References -- 6 Evaluating gradient inversion attacks and defenses -- 6.1 Introduction -- 6.2 Gradient inversion attacks…”
Libro electrónico -
1418por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Restricted access to productive and financial resources -- Laws guarantee women's access to land and non-land assets, yet exclude some groups of women -- Women's access to financial services has made great strides -- Deeply entrenched social norms and specific legal restrictions hamper women's workplace rights -- Restricted civil liberties -- Nationality laws uphold gender inequality in citizenship rights -- Women's political voice has improved at the national level since 2017 -- While legal frameworks generally protect women's freedom of movement, social practices continue to limit women's mobility -- Legal pluralism continues to hamper women's access to justice -- References -- Notes -- Annex A. …”
Publicado 2021
Libro electrónico -
1419por Kumar, AnuragTabla de Contenidos: “…Application Models and Performance Issues; 3.1 Network Architectures and Application Scenarios; 3.2 Types of Traffic and QoS Requirements; 3.3 Real-Time Stream Sessions: Delay Guarantees; 3.3.1 CBR Speech; 3.3.2 VBR Speech; 3.3.3 Speech Playout; 3.3.4 QoS Objectives; 3.3.5 Network Service Models; 3.4 Elastic Transfers: Feedback Control; 3.4.1 Dynamic Control of Bandwidth Sharing; 3.4.2 Control Mechanisms: MAC andTCP; 3.4.3 TCP Performance over Wireless Links…”
Publicado 2008
Libro electrónico -
1420