Mostrando 1,401 - 1,420 Resultados de 2,396 Para Buscar 'Guarrate~', tiempo de consulta: 1.40s Limitar resultados
  1. 1401
    Tabla de Contenidos: “…The Legacy of the Albanian Evangelicals and Its Continuation Post - 1990 Religious Suspension of the Divine; The Inadvertent Effects of Democratisation on Religious Extremist Groups; The Jews of Albania During the Zogist Period and the Second World War; Between East and West: The Basilian Monks of Grottaferrata in Albania; Religious Tolerance in Montenegro as a Guarantee of Stability and Security of the Country; Interfaith Relations in Serbia; The Bektashi Heritage in Albania; Part Three. …”
    Libro electrónico
  2. 1402
    Publicado 2019
    Tabla de Contenidos: “…Logics, Decision Procedures, and Solvers -- Satisfiability Checking for Mission-Time LTL -- High-Level Abstractions for Simplifying Extended String Constraints in SMT -- Alternating Automata Modulo First Order Theories -- Q3B: An Efficient BDD-based SMT Solver for Quantified Bit-Vectors -- CVC4SY: Smart and Fast Term Enumeration for Syntax-Guided Synthesis -- Incremental Determinization for Quantifier Elimination and Functional Synthesis -- Numerical Programs -- Loop Summarization with Rational Vector Addition Systems -- Invertibility Conditions for Floating-Point Formulas -- Numerically-Robust Inductive Proof Rules for Continuous Dynamical Systems -- Icing: Supporting Fast-math Style Optimizations in a Verified Compiler -- Sound Approximation of Programs with Elementary Functions -- Verification -- Formal verification of quantum algorithms using quantum Hoare logic -- SecCSL: Security Concurrent Separation Logic -- Reachability Analysis for AWS-based Networks -- Distributed Systems and Networks -- Verification of Threshold-Based Distributed Algorithms by Decomposition to Decidable Logics -- Gradual Consistency Checking -- Checking Robustness Against Snapshot Isolation -- Efficient verification of network fault tolerance via counterexampleguided refinement -- On the Complexity of Checking Consistency for Replicated Data Types -- Communication-closed asynchronous protocols -- Verification and Invariants -- Interpolating Strong Induction -- Verifying Asynchronous Event-Driven Programs Using Partial Abstract Transformers -- Inferring Inductive Invariants from Phase Structures -- Termination of Triangular Integer Loops is Decidable -- AliveInLean: A Verified LLVM Peephole Optimization Verifier -- Concurrency -- Automated Parameterized Verification of CRDTs -- What's wrong with on-the-y partial order reduction -- Integrating Formal Schedulability Analysis into a Verifed OS Kernel -- Rely-guarantee Reasoning about Concurrent Memory Management in Zephyr RTOS -- Violat: Generating Tests of Observational Refinement for Concurrent Objects. …”
    Libro electrónico
  3. 1403
    Publicado 2007
    Tabla de Contenidos: “…Component-Based Middleware -- R-OSGi: Distributed Applications Through Software Modularization -- Argos, an Extensible Personal Application Server -- Compadres: A Lightweight Component Middleware Framework for Composing Distributed Real-Time Embedded Systems with Real-Time Java -- Mobile and Ubiquitous Computing -- SIPHoc: Efficient SIP Middleware for Ad Hoc Networks -- Vector-Field Consistency for Ad-Hoc Gaming -- Correlation-Based Content Adaptation for Mobile Web Browsing -- Grid and Cluster Computing -- New Worker-Centric Scheduling Strategies for Data-Intensive Grid Applications -- Interactive Resource-Intensive Applications Made Easy -- Garbage Collecting the Grid: A Complete DGC for Activities -- Enhancing Communication -- XenSocket: A High-Throughput Interdomain Transport for Virtual Machines -- Creating Private Network Overlays for High Performance Scientific Computing -- A Cost-Effective Distributed File Service with QoS Guarantees -- Resource Management -- R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads -- AVMEM - Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems -- iManage: Policy-Driven Self-management for Enterprise-Scale Systems -- Reliability and Fault Tolerance -- Middleware Support for Adaptive Dependability -- Consistent and Scalable Cache Replication for Multi-tier J2EE Applications -- CLASP: Collaborating, Autonomous Stream Processing Systems -- Asynchronous Communication -- A Policy Management Framework for Content-Based Publish/Subscribe Middleware -- Hybrid Dissemination: Adding Determinism to Probabilistic Multicasting in Large-Scale P2P Systems -- A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications -- Programming Wireless Sensor Networks with the TeenyLime Middleware…”
    Libro electrónico
  4. 1404
    Publicado 2022
    Tabla de Contenidos: “…-- Notes -- Chapter 3: Personal Cybersecurity for eHealth Deployments -- Introduction -- Personal Cybersecurity for eHealth Deployments -- The Intuition for Security -- Threat Situations: Identification, Isolation, and Containment -- Escalation and Reporting -- Notes -- Chapter 4: Data/Information Security for eHealth Deployments -- Introduction -- Data/Information Security for eHealth Deployments -- Integrity, Confidentiality, and Availability: Invariant and Non-Negotiable -- Preserving Integrity -- Safeguarding Privacy -- Ensuring Confidentiality -- Guaranteeing Availability -- Notes -- Chapter 5: Securing eHealth Systems and Infrastructures -- Introduction -- Securing eHealth Systems and Infrastructures -- Cybersecurity for eHealth: Physical Imperatives -- Cybersecurity for eHealth: Logical Imperatives -- Cybersecurity for eHealth: Operational Imperatives -- Monitoring and Evaluation for Compliance -- Understanding Ecosystems of eHealth Deployments -- Notes…”
    Libro electrónico
  5. 1405
    Publicado 2009
    Tabla de Contenidos: “…Cartwright -- The European deposit guarantee directive : an appraisal on the reforms / D. …”
    Libro
  6. 1406
    Publicado 2017
    Libro electrónico
  7. 1407
    Publicado 2022
    Libro electrónico
  8. 1408
  9. 1409
    Publicado 2022
    Libro
  10. 1410
    por Yepes, Narciso
    Publicado 2003
    CDROM
  11. 1411
    Publicado 2023
    Libro
  12. 1412
    Publicado 2020
    Tabla de Contenidos: “…Nuclear Deterrence: A Guarantee for or Threat to Strategic Stability? -- Chapter 6. …”
    Libro electrónico
  13. 1413
    Publicado 2019
    Tabla de Contenidos: “…Horizontal and vertical coordination of the European Youth Guarantee / Irene Dingeldey, Lisa Steinberg and Marie-Luise Assmann -- 10. …”
    Libro electrónico
  14. 1414
    Publicado 2013
    Tabla de Contenidos: “…-- Exercises on NP-Completeness Easy reductionsAbout graph coloringScheduling problemsMore involved reductions2-PARTITION is NP-complete -- Beyond NP-Completeness Approximation resultsPolynomial problem instancesLinear programmingRandomized algorithms Branch-and-bound and backtracking -- Exercises Going beyond NP-Completeness Approximation resultsDealing with NP-complete problems -- Reasoning on Problem Complexity Reasoning to Assess a Problem Complexity Basic reasoning Set of problems with polynomial-time algorithms Set of NP-complete problems -- Chains-on-Chains Partitioning Optimal algorithms for homogeneous resources Variants of the problem Extension to a clique of heterogeneous resourcesConclusion -- Replica Placement in Tree Networks Access policies Complexity resultsVariants of the replica placement problem Conclusion -- Packet Routing MEDP: Maximum edge-disjoint pathsPRVP: Packet routing with variable-pathsConclusion -- Matrix Product, or Tiling the Unit Square Problem motivation NP-completeness A guaranteed heuristicRelated problems -- Online Scheduling Flow time optimization Competitive analysisMakespan optimizationConclusion -- Bibliography -- Index…”
    Libro electrónico
  15. 1415
    Publicado 2018
    Tabla de Contenidos: “…-- Making Yourself More Memorable -- Become the Expert -- Better Than a Brochure -- Let's Get Social -- Social Proof -- Giving Testimonials -- 4 Defining Your Sales Process -- Pick Up the Phone -- A Guaranteed Success Formula -- Show That You Care -- Choose Your Allies -- Some Simple Tips -- 5 Making the Moments Count -- Who Holds the Controls? …”
    Libro electrónico
  16. 1416
    por Serdar, Burak
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Chapter 1: Concurrency - A High-Level Overview -- Technical Requirements -- Concurrency and parallelism -- Shared memory versus message passing -- Atomicity, race, deadlocks, and starvation -- Summary -- Question -- Further reading -- Chapter 2: Go Concurrency Primitives -- Technical Requirements -- Goroutines -- Channels -- Mutex -- Wait groups -- Condition variables -- Summary -- Questions -- Chapter 3: The Go Memory Model -- Why a memory model is necessary -- The happened-before relationship between memory operations -- Synchronization characteristics of Go concurrency primitives -- Package initialization -- Goroutines -- Channels -- Mutexes -- Atomic memory operations -- Map, Once, and WaitGroup -- Summary -- Further reading -- Chapter 4: Some Well-Known Concurrency Problems -- Technical Requirements -- The producer-consumer problem -- The dining philosophers problem -- Rate limiting -- Summary -- Chapter 5: Worker Pools and Pipelines -- Technical Requirements -- Worker pools -- Pipelines, fan-out, and fan-in -- Asynchronous pipeline -- Fan-out/fan-in -- Fan-in with ordering -- Summary -- Questions -- Chapter 6: Error Handling -- Error handling -- Pipelines -- Servers -- Panics -- Summary -- Chapter 7: Timers and Tickers -- Technical Requirements -- Timers - running something later -- Tickers - running something periodically -- Heartbeats -- Summary -- Chapter 8: Handling Requests Concurrently -- Technical Requirements -- The context, cancelations, and timeouts -- Backend services -- Distributing work and collecting results -- Semaphores - limiting concurrency -- Streaming data -- Dealing with multiple streams -- Summary -- Chapter 9: Atomic Memory Operations -- Technical Requirements -- Memory guarantees -- Compare and swap…”
    Libro electrónico
  17. 1417
    Publicado 2024
    Tabla de Contenidos: “…3.2.2 Differential privacy -- 3.3 DP guaranteed algorithms -- 3.3.1 Sample-level DP -- 3.3.1.1 Algorithms and discussion -- 3.3.2 Client-level DP -- 3.3.2.1 Clipping strategies for client-level DP -- 3.3.2.2 Algorithms and discussion -- 3.4 Performance of clip-enabled DP-FedAvg -- 3.4.1 Main results -- 3.4.1.1 Convergence theorem -- 3.4.1.2 DP guarantee -- 3.4.2 Experimental evaluation -- 3.5 Conclusion and future work -- References -- 4 Assessing vulnerabilities and securing federated learning -- 4.1 Introduction -- 4.2 Background and vulnerability analysis -- 4.2.1 Definitions and notation -- 4.2.1.1 Horizontal federated learning -- 4.2.1.2 Vertical federated learning -- 4.2.2 Vulnerability analysis -- 4.2.2.1 Clients' updates -- 4.2.2.2 Repeated interaction -- 4.3 Attacks on federated learning -- 4.3.1 Training-time attacks -- 4.3.1.1 Byzantine attacks -- 4.3.1.2 Backdoor attacks -- 4.3.2 Inference-time attacks -- 4.4 Defenses -- 4.4.1 Protecting against training-time attacks -- 4.4.1.1 In Situ defenses -- 4.4.1.2 Post Facto defenses -- 4.4.2 Protecting against inference-time attacks -- 4.5 Takeaways and future work -- References -- 5 Adversarial robustness in federated learning -- 5.1 Introduction -- 5.2 Attack in federated learning -- 5.2.1 Targeted data poisoning attack -- 5.2.1.1 Label flipping -- 5.2.1.2 Backdoor -- 5.2.1.2.1 Trigger-based backdoor -- 5.2.1.2.2 Semantic backdoor -- 5.2.2 Untargeted model poisoning attack -- 5.3 Defense in federated learning -- 5.3.1 Vector-wise defense -- 5.3.2 Dimension-wise defense -- 5.3.3 Certification -- 5.3.4 Personalization -- 5.3.5 Differential privacy -- 5.3.6 The gap between distributed training and federated learning -- 5.3.7 Open problems and further work -- 5.4 Conclusion -- References -- 6 Evaluating gradient inversion attacks and defenses -- 6.1 Introduction -- 6.2 Gradient inversion attacks…”
    Libro electrónico
  18. 1418
    Tabla de Contenidos: “…Restricted access to productive and financial resources -- Laws guarantee women's access to land and non-land assets, yet exclude some groups of women -- Women's access to financial services has made great strides -- Deeply entrenched social norms and specific legal restrictions hamper women's workplace rights -- Restricted civil liberties -- Nationality laws uphold gender inequality in citizenship rights -- Women's political voice has improved at the national level since 2017 -- While legal frameworks generally protect women's freedom of movement, social practices continue to limit women's mobility -- Legal pluralism continues to hamper women's access to justice -- References -- Notes -- Annex A. …”
    Libro electrónico
  19. 1419
    por Kumar, Anurag
    Publicado 2008
    Tabla de Contenidos: “…Application Models and Performance Issues; 3.1 Network Architectures and Application Scenarios; 3.2 Types of Traffic and QoS Requirements; 3.3 Real-Time Stream Sessions: Delay Guarantees; 3.3.1 CBR Speech; 3.3.2 VBR Speech; 3.3.3 Speech Playout; 3.3.4 QoS Objectives; 3.3.5 Network Service Models; 3.4 Elastic Transfers: Feedback Control; 3.4.1 Dynamic Control of Bandwidth Sharing; 3.4.2 Control Mechanisms: MAC andTCP; 3.4.3 TCP Performance over Wireless Links…”
    Libro electrónico
  20. 1420