Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
8181por Enea, ConstantinTabla de Contenidos: “…2 Background -- 2.1 Fairness of the Learned Model -- 2.2 Fairness in the Presence of Dataset Bias -- 3 Overview of Our Method -- 3.1 The KNN Algorithm -- 3.2 Certifying the KNN Algorithm -- 4 Abstracting the KNN Prediction Step -- 4.1 Finding the K-Nearest Neighbors -- 4.2 Checking the Classification Result -- 5 Abstracting the KNN Learning Step -- 5.1 Overapproximating the Classification Error -- 5.2 Underapproximating the Classification Error -- 6 Experiments -- 7 Related Work -- 8 Conclusions -- References -- Monitoring Algorithmic Fairness -- 1 Introduction -- 1.1 Motivating Examples -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Markov Chains as Randomized Generators of Events -- 2.2 Randomized Register Monitors -- 3 Algorithmic Fairness Specifications and Problem Formulation -- 3.1 Probabilistic Specification Expressions -- 3.2 The Monitoring Problem -- 4 Frequentist Monitoring -- 4.1 The Main Principle -- 4.2 Implementation of the Frequentist Monitor -- 5 Bayesian Monitoring -- 5.1 The Main Principle -- 5.2 Implementation of the Bayesian Monitor -- 6 Experiments -- 7 Conclusion -- References -- nl2spec: Interactively Translating Unstructured Natural Language to Temporal Logics with Large Language Models -- 1 Introduction -- 2 Background and Related Work -- 2.1 Natural Language to Linear-Time Temporal Logic -- 2.2 Large Language Models -- 3 The nl2spec Framework -- 3.1 Overview -- 3.2 Interactive Few-Shot Prompting -- 4 Evaluation -- 4.1 Study Setup -- 4.2 Results -- 5 Conclusion -- References -- NNV 2.0: The Neural Network Verification Tool -- 1 Introduction -- 2 Related Work -- 3 Overview and Features -- 3.1 NNV 2.0 vs NNV -- 4 Evaluation -- 4.1 Comparison to MATLAB's Deep Learning Verification Toolbox -- 4.2 Neural Ordinary Differential Equations -- 4.3 Recurrent Neural Networks -- 4.4 Semantic Segmentation -- 5 Conclusions -- References…”
Publicado 2023
Libro electrónico -
8182Publicado 1990Tabla de Contenidos: “…3.3 Target characteristics3.4 Target enhancement - passive; 3.5 Target enhancement - active; 3.6 The detection of targets in sea clutter; 3.7 The detection of targets in precipitation clutter; 3.8 The radar horizon; 3.9 False and unwanted radar responses; Chapter 4. …”
Libro electrónico -
8183Publicado 2021Tabla de Contenidos: “…Paul 3.1 -- Introduction 36 -- 3.2 Objectives 36 -- 3.3 Methods 37 -- 3.4 Agricultural -- Informatics: An -- Account 37 3.5 -- Agricultural -- Informatics & -- Technological -- Components: -- Basics & -- Emergence 40 -- 3.6 IoT: Basics -- and -- Characteristics -- 41 3.7 IoT: The -- Applications & -- Agriculture Areas --43 3.8 -- Agricultural -- Informatics & IoT: -- The Scenario 45 -- 3.9 IoT in -- Agriculture: -- Requirement, -- Issues & -- Challenges 49 -- 3.10 -- Development, -- Economy and -- Growth: -- Agricultural -- Informatics -- Context 50 3.11 -- Academic -- Availability and -- Potentiality of IoT -- in Agricultural -- Informatics: -- International -- Scenario & Indian -- Possibilities 51 -- 3.12 Suggestions -- 60 3.13 -- Conclusion 60 4 -- Application of -- Agricultural -- Drones and IoT -- to Understand Food -- Supply Chain -- During Post -- COVID-19 -- 67Pushan Kumar -- Dutta and -- Susanta Mitra 4.1 -- Introduction 68 -- 4.2 Related Work -- 69 4.3 Smart -- Production With -- the Introduction -- of Drones and IoT -- 72 4.4 -- Agricultural -- Drones 75 4.5 -- IoT Acts as a -- Backbone in -- Addressing -- COVID-19 -- Problems in -- Agriculture 77 -- 4.6 Conclusion -- 81 5 IoT and -- Machine --Learning-Based -- Approaches for -- Real Time -- Environment -- Parameters -- Monitoring in -- Agriculture: An -- Empirical Review -- 89Parijata -- Majumdar and -- Sanjoy Mitra 5.1 -- Introduction 90 -- 5.2 Machine -- Learning (ML)- -- Based IoT -- Solution 90 5.3 -- Motivation of the -- Work 91 5.4 -- Literature Review -- of IoT-Based -- Weather and -- Irrigation -- Monitoring for -- Precision -- Agriculture 91 -- 5.5 Literature -- Review of -- Machine -- Learning-Based -- Weather and -- Irrigation -- Monitoring for -- Precision -- Agriculture 92 -- 5.6 Challenges -- 112 5.7 -- Conclusion and -- Future Work 113 -- 6 Deep Neural -- Network-Based -- Multi-Class -- Image -- Classification for -- Plant Diseases -- 117Alok Negi, -- Krishan Kumar -- and Prachi Chauhan 6.1 -- Introduction 117 -- 6.2 Related Work -- 119 6.3 -- Proposed Work -- 121 6.4 Results -- and Evaluation -- 124 6.5 -- Conclusion 127 7 -- Deep Residual -- Neural Network -- for Plant Seedling -- Image -- Classification -- 131Prachi -- Chauhan, -- Hardwari Lal -- Mandoria and -- Alok Negi 7.1 -- Introduction 131 -- 7.2 Related Work -- 136 7.3 -- Proposed Work -- 139 7.4 Result -- and Evaluation -- 142 7.5 -- Conclusion 144 8 -- Development of -- IoT-Based Smart -- Security and -- Monitoring -- Devices for -- Agriculture -- 147Himadri Nath -- Saha, Reek Roy, -- Monojit -- Chakraborty and -- Chiranmay Sarkar -- 8.1 Introduction -- 148 8.2 -- Background & -- Related Works -- 150 8.3 -- Proposed Model -- 155 8.4 -- Methodology -- 160 8.5 -- Performance -- Analysis 165 8.6 -- Future Research -- Direction 166 8.7 -- Conclusion 167 9 -- An Integrated -- Application of -- IoT-Based WSN -- in the Field of -- Indian Agriculture -- System Using -- Hybrid -- Optimization -- Technique and -- Machine -- Learning -- 171Avishek -- Banerjee, Arnab -- Mitra and -- Arindam Biswas -- 9.1 Introduction -- 172 9.2 -- Literature Review -- 175 9.3 -- Proposed Hybrid -- Algorithms (GA- -- MWPSO) 177 -- 9.4 Reliability -- Optimization and -- Coverage -- Optimization -- Model 179 9.5 -- Problem -- Description 181 -- 9.6 Numerical -- Examples, -- Results and -- Discussion 182 -- 9.7 Conclusion - 183 10 -- Decryption and -- Design of a -- Multicopter -- Unmanned Aerial -- Vehicle (UAV) for -- Heavy Lift -- Agricultural -- Operations -- 189Raghuvirsinh -- Pravinsinh -- Parmar 10.1 -- Introduction 190 -- 10.2 History of -- Multicopter -- UAVs 192 10.3 -- Basic -- Components of -- Multicopter UAV -- 193 10.4 -- Working and -- Control -- Mechanism of -- Multicopter UAV -- 207 10.5 Design -- Calculations and -- Selection of -- Components 210 -- 10.6 Conclusion -- 218 11 IoT- -- Enabled -- Agricultural -- System -- Application, -- Challenges and -- Security Issues -- 223Himadri Nath -- Saha, Reek Roy, --Monojit --Chakraborty and -- Chiranmay Sarkar -- 11.1 Introduction -- 224 11.2 -- Background & -- Related Works -- 226 11.3 -- Challenges to -- Implement IoT- -- Enabled Systems -- 232 11.4 -- Security Issues -- and Measures -- 240 11.5 Future -- Research -- Direction 243 -- 11.6 Conclusion -- 244 12 Plane -- Region Step -- Farming, Animal -- and Pest Attack -- Control Using -- Internet of -- Things -- 249Sahadev Roy, -- Kaushal -- Mukherjee and -- Arindam Biswas -- 12.1 Introduction -- 250 12.2 -- Proposed Work -- 254 12.3 -- Irrigation -- Methodology -- 257 12.4 Sensor -- Connection -- Using Internet of -- Things 259 12.5 -- Placement of -- Sensor in the -- Field 263 12.6 -- Conclusion 267 -- References 268 -- Index 271.…”
Libro electrónico -
8184Publicado 2016Tabla de Contenidos: “…Considering Client Pain Points -- Migrating to Skype for Business -- Upgrading to Skype for Business -- The Bottom Line -- Chapter 10 Online and Hybrid -- Putting Skype for Business Online in Context -- Understanding Hybrid Voice and Cloud PBX -- Configuring for Office 365 -- Configuring Skype for Business Online for Hybrid -- Implementing Cloud PBX -- Migrating to Hosted Voicemail -- The Bottom Line -- Part 3 Administration -- Chapter 11 Role-Based Access Control -- Introducing RBAC -- Understanding the Standard Roles -- Creating New Roles -- Manipulating Roles -- The Bottom Line -- Chapter 12 User Administration -- User Configuration Basics -- Understanding Skype for Business Policies -- Manipulating Policies -- Choosing the Right Policy for the Job -- The Bottom Line -- Chapter 13 Archiving and Monitoring -- Deploying the Architecture -- Configuring Policies -- Deploying the Reporting Pack -- Interpreting the Monitoring Server Reports -- Monitoring Service with the Management Pack -- Chapter 14 Planning for Adoption -- Understanding the Power of UC -- Introducing Skype for Business to Your Business -- The Bottom Line -- Chapter 15 Troubleshooting -- Covering the Basics -- Using Logging to Identify Problems -- Advanced Troubleshooting Methods -- The Bottom Line -- Part 4 Voice -- Chapter 16 Getting Started with Voice -- The Backstory -- Understanding the Voice Capabilities -- Understanding the Voice Architecture -- Configuring Enterprise Voice -- The Bottom Line -- Chapter 17 Call Admission Control -- Understanding Call Admission Control -- Designing for Call Admission Control -- Configuring Call Admission Control -- Identifying Calls on a Network -- Reporting on Call Admission Control -- The Bottom Line -- Chapter 18 E9-1-1 and Location Information Services -- Understanding E9-1-1 -- Configuring E9-1-1 -- Configuring Location Information…”
Libro electrónico -
8185por Provost, Lloyd P.Tabla de Contenidos: “…Introduction to the Drill Down Pathway.An Illustration.Part III Applications of Shewhart Charts in Health Care.10 Using Shewhart Charts for Individual Patient Care.Examples of Shewhart Charts for Individual Patients.Example 1: Temperature Readings for a Hospitalized Patient.Example 2: Bone Density for a Patient Diagnosed with Osteoporosis.Example 3: PSA Screening for Prostate Cancer.Example 4: Shewhart Charts for Continuous Monitoring of Patients.Example 5: Asthma Patient Use of Shewhart Charts.Example 6: Monitoring Weight.Example 7: Monitoring Blood Sugar Control for Patients with Diabetes.Example 8: Monitoring Patient Measures in the Hospital.Example 9: Using Shewhart Charts in Pain Management.11 Learning from Patient Feedback to Improve CarePatient Surveys.Summarizing Patient Feedback Data.Presentation of Patient Satisfaction Data.Using Patient Feedback for Improvement.Using Patient Satisfaction Data in Planning for Improvement.Special Issues with Patient Feedback Data.12 Using Shewhart Charts in Health Care Leadership.A Health Care Organization's Vector of Measures.Developing a Vector of Measures.Displaying and Learning from a Vector of Measures.Administrative Issues with a Vector of Measures.Some Examples of Other Vectors of Measures.Summary.Part IV Case Studies.13 Case Studies Using Shewhart Charts.Case Study A Improving Access to a Specialty Care Clinic.Case Study B Radiology Improvement Projects.Case Study C Reducing Post CABG Infections.Case Study D Drilling Down Into Percent of C-Sections.Case Study E Accidental Puncture/Laceration Rate.Case Study F Reducing Readmission Rates.Case Study G Variation in Financial Data.Shewhart Chart Selection Guide.Notes.Index…”
Publicado 2011
Libro electrónico -
8186Publicado 2017Tabla de Contenidos: “…. -- Destroying your microservice in Marathon -- Getting ready -- How to do it... -- Monitoring your microservice logs in Marathon -- Getting ready -- How to do it... -- Monitoring your microservice logs in Mesos -- Getting ready -- How to do it... -- Managing your microservice using Marathon's REST API -- Getting ready -- How to do it... -- Chapter 4: Deploying Microservices on Kubernetes -- Introduction -- Kubernetes master -- API server -- etcd -- Scheduler -- Controller manager -- Kubernetes node -- Setting up Kubernetes cluster using Docker -- Getting ready -- How to do it... -- Understanding the Kubernetes dashboard -- Getting ready -- How to do it... -- Deploying your microservice on Kubernetes -- Getting ready -- How to do it... -- Configuring ports in Kubernetes -- Getting ready -- How to do it... -- Configuring volumes in Kubernetes -- Getting ready -- How to do it... -- Configuring environment variables in Kubernetes -- Getting ready -- How to do it... -- Scaling your microservice in Kubernetes -- Getting ready -- How to do it... -- Destroying your microservice in Kubernetes -- Getting ready -- How to do it... -- Monitoring your microservice logs in Kubernetes -- Getting ready -- How to do it... -- Chapter 5: Service Discovery and Load Balancing Microservices -- Introduction -- Setting up Zookeeper using Docker -- Getting ready -- How to do it... -- Load balancing microservices using Zookeeper -- Getting ready -- How to do it... -- Setting up Consul using Docker -- Getting ready -- How to do it... -- Understanding the concepts of Consul -- Implementing service discovery using Spring Cloud Consul -- Getting ready -- How to do it... -- Load balancing your microservice using Spring Cloud Consul…”
Libro electrónico -
8187Publicado 2024Tabla de Contenidos: “…-- MongoDB is a NoSQL database -- Setting up MongoDB -- Optional: creating a paid cluster for production databases -- Creating a database user -- Setting up our MongoDB cluster for Django -- Creating a Database -- Creating documents inside a collection -- Updating documents -- Deleting documents and collections -- Mapping CRUD operations to HTTP methods -- CRUD operations on MongoDB with Django ORM -- CRUD operations on MongoDB with pymongo -- Cleaning up -- Summary -- Chapter 5: Creating RESTful APIs for Microservices -- Technical requirements -- Introducing RESTful APIs -- Benefits of RESTful APIs -- The RESTful API architecture -- Building RESTful APIs with DRF -- Setting up DRF -- Creating a model and a serializer -- Creating a view and the URL endpoints -- Browsing a DRF RESTful API -- Error handling -- Handling wrong-formatted requests -- Handling validation errors -- Summary -- Chapter 6: Orchestrating Microservices with Celery and RabbitMQ -- Technical requirements -- Introducing task queues -- Implementing the work queue scenario -- Implementing the Publish-Subscribe scenario -- Implementing the Request-Response scenario -- Exploring Celery and RabbitMQ -- Celery -- RabbitMQ -- Creating and running asynchronous tasks -- Creating and running a Celery-based task -- Creating and running a RabbitMQ-based task -- Monitoring tasks and task queues -- Monitoring Celery tasks with Flower -- Monitoring RabbitMQ tasks -- Summary -- Chapter 7: Testing Microservices -- Technical requirements…”
Libro electrónico -
8188Publicado 2022Tabla de Contenidos: “…Public Key Infrastructure -- Security Monitoring and Enforcement -- Privileged Access Management -- Security Information and Event Management -- Database Activity Monitoring -- Single Sign-on -- Risk Register -- Chapter 5: Corporate Information Security Processes and Services -- Security Governance -- Policies and Procedures -- Cybersecurity and Risk Assessment -- Penetration Testing -- Red Teaming -- Code Review and Testing -- Compliance Scans -- Vulnerability Scans -- CVSS: Common Vulnerability Scoring System -- CVE: Common Vulnerabilities and Exposures -- CCE: Common Configuration Enumeration -- CPE: Common Platform Enumeration -- XCCDF: Extensible Configuration Checklist Description Format -- OVAL: Open Vulnerability and Assessment Language -- Vulnerability Scanning Procedures -- Firewalls and Network Devices Assurance -- Security Operations Center -- Incident Response and Recovery -- Preparation -- Detection and Analysis -- Containment, Eradication, and Recovery -- Post-Incident Activity -- Threat Hunting -- Threat Intelligence -- Security Engineering -- Asset Management -- Media Sanitation -- Configuration and Patch Management -- Security Architecture -- Chapter 6: People -- Security Awareness -- Security Training -- Chapter 7: Security Metrics -- Governance and Oversight -- Antivirus and Anti-Malware Metrics -- Clean Pipes -- Network Security -- Internet Access: Proxy and Content Filtering -- Security Awareness and Training -- Firewall Management -- Enterprise Mobility Management -- Incident Management and Response -- Vulnerability Management -- Penetration Testing, Code Review, and Security Assessments -- Change Management -- Access Control -- Other Metrics -- Summary -- Chapter 8: Case Studies -- Target Data Breach -- DynDNS Distributed Denial-of-Service Attack -- NHS WannaCry Ransomware…”
Libro electrónico -
8189Publicado 2013Tabla de Contenidos: “…The Legacies of Atrocities in Asia -- An Ongoing Legacy of Atrocity : Torture and the Indonesian State / Annie Pohlman -- International Civil Society as Agent of Protection : Responses to the Famine in East Timor / Clinton Fernandes -- Maximizing Transitional Justice Opportunities : The Case of East Timor's CAVR / Heather Castel -- Transitional Justice Time : Uncle San, Aunty Yan, and Outreach at the Khmer Rouge Tribunal / Alex Hinton -- Humanitarian Intervention and the Legacies of Security Council (In) action : East Pakistan (1971) and East Timor (1976-1979) / Phil Orchard -- Part 2. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
8190Publicado 2012Tabla de Contenidos: “…Manuel Gómez Ríos -- Leopoldo Panero : el latido de Dios / José Luis Puerto -- La casa de Leopoldo Panero / Javier Huerta Calvo -- Panero, después de muerto / Pedro G. Trapiello -- Un montón de tierra / Antonio Ojanguren Areces…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
8191por Boyd, Brian, 1952-Tabla de Contenidos: “…-- Art as cognitive play -- Art and attention -- From tradition to innovation -- Part 3: Evolution and fiction -- Art, narrative, fiction -- Understanding and recalling events -- Narrative: representing events -- Fiction: inventing events -- Fiction as adaptation -- Book II: From Zeus to Seuss: origins of stories -- Part 4: Phylogeny: the Odyssey -- Earning attention (1): natural patterns: character and plot -- Earning attention (s): open-ended patterns: ironies of structure -- The evolution of intelligence (1): in the here and now -- The evolution of intelligence (2): beyond the here and now -- The evolution of cooperation (1): expanding the circle -- The evolution of cooperation (2): punishment -- Part 5: Ontogeny: Horton hears a who! -- Levels of explanation: universal, local, and individual -- Levels of explanation: individuality again -- Levels of explanation: particular -- Meanings -- Conclusion: retrospect and prospects: evolution, literature, criticism…”
Publicado 2009
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro -
8192Publicado 2015“…En este enfoque hay varios papeles muy diferenciados: el de la entidad facilitadora de alternativas; el de la persona "experta" (monitor/a); y el de las personas mayores, receptoras de los conocimientos, habilidades. …”
Acceso restringido con credenciales UPSA
Libro electrónico -
8193por Velasco Imedio, InmaculadaTabla de Contenidos: “…Valoración de las funciones del monitor (...); 6. Resumen; Ejercicios de repaso y autoevaluación; Bibliografía…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8194por Bouvet, André“…Jadis omniprésent dans la modernisation du sport en France, l'État était devenu un État animateur et partenaire du mouvement sportif et des collectivités territoriales avant de donner l'impression, récemment, de recentrer encore ses prérogatives, les ramenant à quelques missions prioritaires. L'horizon semble s'être peu à peu rétréci, au fur et à mesure que le sport le cédait aux lois du marché, du spectacle, avec la complicité des grands médias, des sponsors et de la consommation. …”
Publicado 2019
Electrónico -
8195Publicado 2019“…Emerging new technologies are now enabling researchers to step up a gear, to look enthusiastically beyond the previous limits of the horizon, and to uncover the secrets of these “silent” chromosomes. …”
Libro electrónico -
8196por Czaika, Otfried“…L’expérience européenne des conflits religieux se fait en outre dans un horizon global de la rencontre avec d’autres religions et civilisations où les Européens découvrent leur propre barbarie. …”
Publicado 2019
Electrónico -
8197por Bähler, Ursula“…N'en déplaise à certains, l'érudition n'est pas toujours l'ennemie du plaisir esthétique et, dans le cas du Moyen Âge, en particulier, le rôle joué par nombre d'universitaires et d'érudits dans la réapparition de la civilisation et de la littérature médiévales à l'horizon de notre quotidien est considérable. Les communications réunies ici, issues d'un colloque de l'Association « Modernités médiévales » qui s'est tenu à Lausanne du 21 au 23 octobre 2010 évoquent un très large spectre de pratiques : écrivains frottés d'érudition, savants tentés par la littérature ou simplement poussés par un goût vif et empathique de la vulgarisation, érudits désireux de construire des passerelles entre le passé et le présent. …”
Publicado 2018
Electrónico -
8198por Belissa, Marc“…Le Nord froid, hostile et mystérieux émerge à l'horizon. Sa définition géographique longtemps floue se précise peu à peu au XVIIIe siècle pour désigner la Scandinavie ainsi que les régions arctiques et subarctiques allant du Groenland à la Sibérie. …”
Publicado 2019
Electrónico -
8199por Bresson, Alain“…C’est sur ce paradoxe que s’interrogent les quinze communications de ce recueil. Elles couvrent un horizon chronologique large, qui va de l’Égypte et la Mésopotamie anciennes à nos jours, mais toujours dans le cadre de sociétés qui n’ont pas encore connu le “désenchantement du monde” et la rationalité de l’État moderne. …”
Publicado 2018
Electrónico -
8200por Bats, Raphaëlle“…Internet, construction européenne, mondialisation... : notre horizon ne s'arrête plus à nos frontières. Du jumelage à la coopération décentralisée, les municipalités demandent à leurs services de participer à des projets à dimension internationale. …”
Publicado 2016
Electrónico