Mostrando 1 - 5 Resultados de 5 Para Buscar 'Meg White', tiempo de consulta: 0.05s Limitar resultados
  1. 1
    Publicado 2006
    Libro electrónico
  2. 2
    Publicado 2016
    Tabla de Contenidos: “…Brooks -- Pinhole / Darren Constantino -- Macro / Gianluca Fabrizio -- Double exposures / Lisa Garner -- Aerial : plane shots / Alexis Gerard -- Jump shots ; Events / Steph Goralnick -- Working with models / Kevin Mason -- Aerial : kite shots / Ricardo Mendonca Ferreira -- Portraits ; Low-down ; In the water ; Landscapes ; Everyday subjects ; Zone-focus ; Avoiding tourist cliches ; Animals ; Long exposures : night ; Silhouettes ; Reflections ; Time-lapse ; Getting the right light ; Cross-processing ; Minimal ; Architecture ; Perspex reflections ; Backgrounds ; Shallow depth of field ; Action sampling ; People montages ; Black-and-white ; Wide-angle ; Colored flash ; Panoramas ; Camera tossing ; Patterned bokeh ; Long exposures : day ; Get an audience / Kevin Meredith -- TtV : through the viewfinder / Russ Morris -- Polaroids / Michael O'Neal -- Redscale / Tracy Packer -- Camera phones / Meg Pickard -- Sprocket-hole / Dan Smith -- HDR : High dynamic range / Asmundur Thorkelsson -- Cut-outs in-camera / Laura Thorn -- Light painting ; Star trails / Trevor Williams…”
    Libro electrónico
  3. 3
    Publicado 2014
    “…Recent work covering a wide variety of disciplines and technologies, including dense array electroencephalography (dEEG), novel methods of analyses of both the interictal dEEG and intracranial EEG (icEEG), magnetoencephalography (MEG), high-resolution magnetic resonance imaging (MRI), functional MRI (fMRI), simultaneous fMRI-EEG, fMRI connectivity measures, simultaneous dEEG-icEEG, and techniques to coregister patient-specific MRI (including white matter pathways) and dEEG, are all examples of areas of research that have contributed to a greater understanding of potential epileptogenic regions. …”
    Libro electrónico
  4. 4
    Publicado 2018
    Tabla de Contenidos: “…Bindoff -- Exploring the Future of Fuel Loads in Tasmania, Australia: Shifts in Vegetation in Response to Changing -- Fire Weather, Productivity, and Fire Frequency Reprinted from: Forests 2018, 9, 210, doi: 10.3390/f9040210 260 -- Garrett W. Meigs and Meg A. Krawchuk Composition and Structure of Forest Fire Refugia: What Are the -- Ecosystem Legacies across Burned Landscapes? …”
    Libro electrónico
  5. 5
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Editors -- Contributors -- Part I Secure AI/ML Systems: Attack Models -- 1 Machine Learning Attack Models -- 1.1 Introduction -- 1.2 Background -- 1.2.1 Notation -- 1.2.2 Support Vector Machines -- 1.2.3 Neural Networks -- 1.3 White-Box Adversarial Attacks -- 1.3.1 L-BGFS Attack -- 1.3.2 Fast Gradient Sign Method -- 1.3.3 Basic Iterative Method -- 1.3.4 DeepFool -- 1.3.5 Fast Adaptive Boundary Attack -- 1.3.6 Carlini and Wagner's Attack -- 1.3.7 Shadow Attack -- 1.3.8 Wasserstein Attack -- 1.4 Black-Box Adversarial Attacks -- 1.4.1 Transfer Attack -- 1.4.2 Score-Based Black-Box Attacks -- ZOO Attack -- Square Attack -- 1.4.3 Decision-Based Attack -- Boundary Attack -- HopSkipJump Attack -- Spatial Transformation Attack -- 1.5 Data Poisoning Attacks -- 1.5.1 Label Flipping Attacks -- 1.5.2 Clean Label Data Poisoning Attack -- Feature Collision Attack -- Convex Polytope Attack and Bullseye Polytope Attack -- 1.5.3 Backdoor Attack -- 1.6 Conclusions -- Acknowledgment -- Note -- References -- 2 Adversarial Machine Learning: A New Threat Paradigm for Next-Generation Wireless Communications -- 2.1 Introduction -- 2.1.1 Scope and Background -- 2.2 Adversarial Machine Learning -- 2.3 Challenges and Gaps -- 2.3.1 Development Environment -- 2.3.2 Training and Test Datasets -- 2.3.3 Repeatability, Hyperparameter Optimization, and Explainability -- 2.3.4 Embedded Implementation -- 2.4 Conclusions and Recommendations -- References -- 3 Threat of Adversarial Attacks to Deep Learning: A Survey -- 3.1 Introduction -- 3.2 Categories of Attacks -- 3.2.1 White-Box Attacks -- FGSM-based Method -- JSMA-based Method -- 3.2.2 Black-Box Attacks -- Mobility-based Approach -- Gradient Estimation-Based Approach -- 3.3 Attacks Overview…”
    Libro electrónico