Mostrando 126,281 - 126,300 Resultados de 134,823 Para Buscar 'Minsal~', tiempo de consulta: 1.83s Limitar resultados
  1. 126281
    Publicado 2025
    Tabla de Contenidos: “…7.1 Literary Digest-Sampling Trumps "All Data" -- 7.2 Simple Random Samples -- 7.3 Margin of Error: Sampling Distribution for a Proportion -- 7.3.1 The Confidence Interval -- 7.3.2 A More Manageable Box: Sampling with Replacement -- 7.3.3 Summing Up -- 7.4 Sampling Distribution for a Mean -- 7.4.1 Simulating the Behavior of Samples from a Hypothetical Population -- 7.5 The Bootstrap -- 7.5.1 Resampling Procedure (Bootstrap) -- 7.6 Rationale for the Bootstrap -- 7.6.1 Let's Recap -- 7.6.2 Formula‐based Counterparts to Resampling -- 7.6.2.1 FORMULA: The Z‐interval -- 7.6.2.2 Proportions -- 7.6.3 For a Mean: T‐interval -- 7.6.4 Example-Manual Calculations -- 7.6.5 Example-Software -- 7.6.6 A Bit of History-1906 at Guinness Brewery -- 7.6.7 The Bootstrap Today -- 7.6.8 Central Limit Theorem -- 7.7 Standard Error -- 7.7.1 Standard Error via Formula -- 7.8 Other Sampling Methods -- 7.8.1 Stratified Sampling -- 7.8.2 Cluster Sampling -- 7.8.3 Systematic Sampling -- 7.8.4 Multistage Sampling -- 7.8.5 Convenience Sampling -- 7.8.6 Self‐selection -- 7.8.7 Nonresponse Bias -- 7.9 Absolute vs. …”
    Libro electrónico
  2. 126282
    Publicado 2025
    Tabla de Contenidos: “…-- 9.2 Hyperparameter Optimization Techniques -- 9.2.1 Model-Free Algorithms -- 9.2.1.1 Trial-and-Error (Manual Testing) -- 9.2.1.2 Grid Search -- 9.2.1.3 Random Search -- 9.2.2 Gradient-Based Optimization -- 9.2.3 Bayesian Optimization -- 9.2.4 Multifidelity Optimization -- 9.2.4.1 Successive Halving -- 9.2.4.2 Hyperband -- 9.2.5 Metaheuristic Algorithms -- 9.2.5.1 Genetic Algorithm -- 9.2.5.2 Particle Swarm Optimization -- 9.3 Challenges in Hyperparameter Optimization -- 9.4 Concluding Remarks -- References -- Chapter 10 Accuracy Assessment and Model Explainability -- 10.1 Accuracy Assessment -- 10.1.1 Sampling Scheme and Spatial Autocorrelation -- 10.1.2 Sample Size, Scale, and Spatial Variability -- 10.1.3 Adequacy of Training and Testing Data -- 10.1.4 Conventional Accuracy Analysis -- 10.1.5 Accuracy Analysis for Machine Learning -- 10.1.6 Fuzzy Accuracy Assessment -- 10.1.7 Object-Based Accuracy Assessment -- 10.2 Comparison of Thematic Maps -- 10.2.1 McNemar's Test -- 10.2.2 z-Test -- 10.2.3 Wilcoxon Signed-Ranks Test -- 10.2.4 5×2-Cross-Validation t-Test -- 10.2.5 Friedman Test -- 10.3 Explainability Methods -- 10.3.1 SHapley Additive exPlanations -- 10.3.2 Partial Dependence Plot -- 10.3.3 Pairwise Interaction Importance -- 10.3.4 Permutation-Based Feature Importance…”
    Libro electrónico
  3. 126283
    por Prakash, Kolla Bhanu
    Publicado 2024
    Tabla de Contenidos: “…6.7.3 Algorithm -- 6.8 Hierarchical Clustering -- 6.9 Agglomerative Nesting Hierarchical Clustering (AGNES) -- 6.10 DIANA -- References -- Chapter 7 Model Ensembles -- 7.1 Bagging -- 7.1.1 Advantages -- 7.1.2 Disadvantages -- 7.1.3 Bagging Workage -- 7.1.4 Algorithm -- 7.2 Boosting -- 7.2.1 Types of Boosting -- 7.2.2 Advantages -- 7.2.3 Disadvantages -- 7.2.4 Algorithm -- 7.3 Stacking -- 7.3.1 Architecture of Stacking -- 7.3.2 Stacking Ensemble Family -- References -- Chapter 8 Binary and Beyond Binary Classification -- 8.1 Binary Classification -- 8.2 Logistic Regression -- 8.3 Support Vector Machine -- 8.4 Estimating Class Probabilities -- 8.5 Confusion Matrix -- 8.6 Beyond Binary Classification -- 8.7 Multi-Class Classification -- 8.8 Multi-Label Classification -- Reference -- Chapter 9 Model Selection -- 9.1 Model Selection Considerations -- 9.1.1 What Do We Care Approximately When Choosing the Final Version? -- 9.2 Model Selection Strategies -- 9.3 Types of Model Selection -- 9.3.1 Methods of Re-Sampling -- 9.3.2 Random Separation -- 9.3.3 Time Divide -- 9.3.4 K-Fold Cross-Validation -- 9.3.5 Stratified K-Fold -- 9.3.6 Bootstrap -- 9.3.7 Possible Steps -- 9.3.8 Akaike Information Criterion (AIC) -- 9.3.9 Bayesian Information Criterion (BIC) -- 9.3.10 Minimum Definition Length (MDL) -- 9.3.11 Building Risk Reduction (SRM) -- 9.3.12 Excessive Installation (Overfitting) -- 9.4 The Principle of Parsimony -- 9.5 Examples of Model Selection Criterions -- 9.6 Other Popular Properties -- 9.7 Key Considerations -- 9.8 Model Validation -- 9.8.1 Why is Model Validation Important? …”
    Libro electrónico
  4. 126284
    Publicado 2003
    Tabla de Contenidos: “…Partition Definition utility -- 4.1 Using the PDU -- 4.1.1 Configuring the PDU -- 4.1.2 Selecting a database -- 4.1.3 Setting HALDB master DBD parameters -- 4.1.4 Setting processing options and global partition information -- 4.1.5 Creating your partitions manually -- 4.1.6 Creating your partitions automatically -- 4.1.7 Changing partition definitions -- 4.1.8 Deleting definitions -- Chapter 5. …”
    Libro electrónico
  5. 126285
    Publicado 2005
    Tabla de Contenidos: “…7.2 Profile customization -- 7.2.1 Profile customization when using unqualified SQL -- 7.2.2 Reducing the number of SQLJ-generated packages -- 7.2.3 Using manual package versioning -- 7.3 Application design -- 7.3.1 Best practice -- 7.3.2 The detailed application flow -- 7.3.3 Exceptions and transactions -- 7.3.4 SQL exceptions and SQL warnings -- 7.4 SQLJ in WebSphere Studio Application Developer -- 7.4.1 Setting up the environment -- 7.4.2 Create the server and the datasource -- 7.4.3 Using an SQLJ Java project -- 7.4.4 User-managed persistence -- 7.4.5 Container-managed persistence -- 7.4.6 Customization -- 7.4.7 WAS 5.1.0.1 FixPak -- 7.5 Deployment to WebSphere Application Server -- 7.6 Summary -- Chapter 8. …”
    Libro electrónico
  6. 126286
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Brief Contents -- Contents -- Preface -- About the Author -- Part I: Background -- Chapter 1: Data Communications and Network Management Overview -- 1.1 Analogy of Telephone Network Management -- 1.2 Data (Computer) and Telecommunication Network -- 1.3 Distributed Computing Environment -- 1.4 TCP/IP-Based Networks: Internet and Intranet -- 1.5 Communication Protocols and Standards -- 1.5.1 Communication Architectures -- 1.5.2 Protocol Layers and Services -- 1.6 Networks, Systems, and Services -- 1.6.1 Broadband Networks, Systems, and Services -- 1.6.2 Wide Area Networks -- 1.6.3 Broadband Access Networks -- 1.6.4 Home/CPE Networks -- 1.6.5 Quality of Service in Broadband Systems -- 1.6.6 Security and Privacy in Broadband Systems -- 1.7 Case Histories on Network, System, and Service Management -- 1.7.1 Case History 1: Importance of Topology ("Case of the Footprint") -- 1.7.2 Case History 2: Centrally Managed Network Issues -- 1.7.3 Transaction Delays in Client-Server Network -- 1.7.4 Service Impact in End-to-End Service of Customers -- 1.7.5 Some Common Network Problems -- 1.8 Challenges of IT Managers -- 1.9 Network Management: Goals, Organization, and Functions -- 1.9.1 Goal of Network Management -- 1.9.2 Network Provisioning -- 1.9.3 Network Operations and NOC -- 1.9.4 Network Installation and Maintenance -- 1.10 Network Management Architecture and Organization -- 1.11 Network Management Perspectives -- 1.11.1 Network Management Perspective -- 1.11.2 Service Management Perspective -- 1.11.3 OSS Perspective -- 1.11.4 e-Business Management -- 1.12 NMS Platform -- 1.13 Current Status and Future of Network Management -- Summary -- Exercises -- Chapter 2: Review of Information Network and Technology -- 2.1 Network Topology -- 2.2 Local Area Networks -- 2.2.1 Ethernet -- 2.2.2 Fast Ethernet -- 2.2.3 Gigabit Ethernet…”
    Libro electrónico
  7. 126287
    Publicado 2021
    Tabla de Contenidos: “…1 The C Programming For Dummies Approach 2 How This Book Works 3 Icons Used in This Book 4 Parting Thoughts 5 Part 1: The ABs of C 7 Chapter 1: A Quick Start for the Impatient 9 What You Need to Program 9 Command Prompt Programming 10 IDE Programming 11 Installing Code: Blocks 12 Touring the Code: Blocks workspace 13 Your First Program 14 Coding at the command prompt 15 Building a new Code: Blocks project 16 Building and running 18 Chapter 2: The Programming Thing 21 The History of Programming 21 Reviewing early programming history 21 Introducing the C language 22 The Programming Process 23 Understanding programming 23 Writing source code 24 Compiling and linking 26 Running and testing 27 Chapter 3: Anatomy of C 29 Parts of the C Language 29 Keywords 30 Functions 31 Operators 33 Variables and values 33 Statements and structure 33 Comments 35 Behold the Typical C Program 37 Understanding C program structure 37 Setting the main() function 38 Returning something to the operating system 39 Adding a function 40 Part 2: C Programming 101 43 Chapter 4: Trials and Errors 45 Display Stuff on the Screen 45 Displaying a humorous message 45 Introducing the puts() function 46 Adding more text 47 Commenting out a statement 49 Goofing up on purpose 49 More Text Output Nonsense 51 Displaying text with printf() 52 Introducing the printf() function 52 Understanding the newline 53 Employing escape sequences 54 Goofing up on purpose again 55 Chapter 5: Values and Simple Math 57 A Venue for Various Values 57 Understanding values 58 Displaying values with printf() 59 Minding the extra zeros 61 The Computer Does the Math 61 Doing simple arithmetic 61 Reviewing the float-integer thing 63 Pretending integers are floats 64 Chapter 6: A Place to Put Stuff 67 Values That Vary 67 Setting up a quick example 68 Introducing data types 69 Using variables 70 Variable Madness! …”
    Libro electrónico
  8. 126288
    por Henningsen, Peter
    Publicado 2004
    Tabla de Contenidos: “…Introduction to Workload Simulator -- 4.1 Overview -- 4.1.1 General process -- 4.1.2 WSim installation -- 4.1.3 Resources WSim can simulate -- 4.1.4 Testing with WSim -- 4.2 System configuration -- 4.2.1 Physical configurations -- 4.2.2 Logical configurations -- 4.3 Script preparation -- 4.3.1 Network definition statements -- 4.3.2 Message generation decks…”
    Libro electrónico
  9. 126289
    por Loth, Alexander
    Publicado 2024
    Tabla de Contenidos: “…Midjourney: Die wesentlichen Unterschiede -- 9.6.2 Besonderheiten von Stable Diffusion XL (SDXL‌) -- 9.6.3 Kostenlose Nutzung durch Open Source‌ auf Ihrer eigenen Hardware -- 9.6.4 DreamStudio‌ als Alternative zur eigenen Installation -- 9.7 Adobe Firefly‌: Professionelle Bildgenerierung von Adobe -- 9.8 Craiyon‌: Spaß mit dem Original DALL-E Modell -- 9.9 Beispiel-Prompts und generierte Bilder im Vergleich‌ -- 9.9.1 Einfacher Prompt für ein Stillleben‌ -- 9.9.2 Mittlerer Komplexitätsgrad für eine Illustration‌…”
    Libro electrónico
  10. 126290
    Publicado 2004
    Tabla de Contenidos: “…Web services in DB2 -- 10.1 Introduction to Web services -- 10.1.1 Motivation -- 10.1.2 Requirements for a service-oriented architecture -- 10.1.3 Service-oriented architecture overview -- 10.1.4 Characteristics of the Web service architecture -- 10.1.5 Web services approach for a SOA architecture -- 10.1.6 Properties of the service-oriented architecture -- 10.1.7 More information -- 10.2 DB2 as Web service provider -- 10.2.1 Web Services Object Runtime Framework -- 10.2.2 Installing WORF on IBM WebSphere Application Server -- 10.2.3 Creating DB2 Web services -- 10.2.4 Deploying the Web application -- 10.2.5 Starting the enterprise application -- 10.2.6 Testing the DB2 Web services -- 10.2.7 DADX and auto-deploy feature of WORF -- 10.2.8 WORF test facility -- 10.3 DB2 as Web service consumer -- 10.3.1 Prerequisites -- 10.3.2 Enabling DB2 Web service consumer UDFs -- 10.3.3 Using the Web service consumer UDFs -- 10.3.4 Web service consumer UDFs -- 10.3.5 From WSDL to Web service consumer function -- 10.3.6 Testing the Web service consumer functions -- 10.3.7 Creating a wrapper UDF to Web services consumer function -- Chapter 11. …”
    Libro electrónico
  11. 126291
    por Ropero, Alfonso
    Publicado 2018
    Tabla de Contenidos: “…La prueba por medio de las Escrituras -- 1 El Evangelio apostólico -- 2 Rechazo herético de las Escrituras -- 3 Iglesias de origen apostólico -- 4 Necesidad de la tradición apostólica -- Novedad de las herejías -- 5 El mensaje directo de Cristo y sus apóstoles -- 6 Testimonio de las Escrituras sobre el Dios verdadero -- 7 La enseñanza de Pablo sobre Dios -- 8 Enseñanza de Cristo sobre el Señor verdadero -- 9 Testimonio de Mateo -- 10 Testimonio de Lucas -- Testimonio de Marcos -- 11 Testimonio de Juan…”
    Libro electrónico
  12. 126292
    Publicado 2021
    Tabla de Contenidos: “…2.11 RetinaNet -- 2.11.1 Focal loss -- 2.12 Detection performances -- 2.13 Conclusion -- References -- Biographies -- 3 Learning with limited supervision -- 3.1 Introduction -- 3.2 Context-aware active learning -- 3.2.1 Active learning -- 3.2.2 Context in active learning -- 3.2.3 Framework for context-aware active learning -- 3.2.4 Applications -- 3.3 Weakly supervised event localization -- 3.3.1 Network architecture -- 3.3.2 k-max multiple instance learning -- 3.3.3 Coactivity similarity -- 3.3.4 Applications -- 3.4 Domain adaptation of semantic segmentation using weak labels -- 3.4.1 Weak labels for category classification -- 3.4.2 Weak labels for feature alignment -- 3.4.3 Network optimization -- 3.4.4 Acquiring weak labels -- 3.4.5 Applications -- 3.4.6 Output space visualization -- 3.5 Weakly-supervised reinforcement learning for dynamical tasks -- 3.5.1 Learning subgoal prediction -- 3.5.2 Supervised pretraining -- 3.5.3 Applications -- 3.6 Conclusions -- Acknowledgments -- References -- Biographies -- 4 Efficient methods for deep learning -- 4.1 Model compression -- 4.1.1 Parameter pruning -- 4.1.2 Low-rank factorization -- 4.1.3 Quantization -- 4.1.4 Knowledge distillation -- 4.1.5 Automated model compression -- 4.2 Efficient neural network architectures -- 4.2.1 Standard convolution layer -- 4.2.2 Efficient convolution layers -- 4.2.3 Manually designed efficient CNN models -- 4.2.4 Neural architecture search -- 4.2.5 Hardware-aware neural architecture search -- 4.3 Conclusion -- References -- 5 Deep conditional image generation -- 5.1 Introduction -- 5.2 Visual pattern learning: a brief review -- 5.3 Classical generative models -- 5.4 Deep generative models -- 5.5 Deep conditional image generation -- 5.6 Disentanglement for controllable synthesis -- 5.6.1 Disentangle visual content and style -- 5.6.2 Disentangle structure and style…”
    Libro electrónico
  13. 126293
    Publicado 2024
    Tabla de Contenidos: “…-- Notes -- Chapter 2: Cyber threats and the necessary clarifications -- 2.1 Risk -- 2.2 Different types of risk -- 2.2.1 Artificial Intelligence and risk -- 2.2.2 Human rights -- 2.3 Briefly about cyberattacks -- 2.4 Kill chain - a useful thought model -- 2.4.1 Reconnaissance -- 2.4.2 Weaponization -- 2.4.3 Delivery -- 2.4.4 Exploitation -- 2.4.5 Installation -- 2.4.6 Command and control -- 2.4.7 Achieving goals -- 2.4.8 Kill chain - summary -- 2.5 The MITRE model -- 2.6 Social engineering and phishing -- 2.6.1 Masquerade in France using the "minister" method -- 2.7 Threat groups -- 2.7.1 Hacktivists -- 2.7.2 Cybercriminals -- 2.7.3 State groups, APT -- 2.7.4 Groups - synthesis -- 2.8 Cyber tools or cyberweapons? …”
    Libro electrónico
  14. 126294
    por Francisco, Papa, 1936-
    Publicado 2015
    “…ha salido a la venta en España y mezcla canciones de chill out, ambient y pop suave con algunos de los mensajes más famosos del Pontífice…”
    CDROM
  15. 126295
    Publicado 2010
    “…In this therapy manual intended for parents as well as pediatric speech-language pathologists and other early childhood professionals, the author shares techniques and best practices from her own speech-language therapy practice work with language-delayed children ages birth to four and their families…”
    Libro
  16. 126296
    Publicado 2009
    “…Recopila las ponencias del simposio homónimo en el que 16 especialistas analizan el proceso de cambio cultural en la España del Renacimiento, proceso cuyas realidades sociales, mentales y económicas plasma magistralmente "La Celestina"…”
    Libro electrónico
  17. 126297
    Publicado 2005
    “…Ofrece un modelo de descripción integral de las diferentes dimensiones que intervienen en la interacción comunicativa, desde la cortesía verbal a la comunicación no verbal, y una propuesta de interpretación de los mensajes sociales…”
    Libro electrónico
  18. 126298
    por McKee, Geoffrey R.
    Publicado 2006
    Tabla de Contenidos: “…-- Risk analysis and the maternal filicide risk matrix -- Prevention and risk intervention points -- Detached mother, denial type: Cathy -- Detached mother, ambivalent type: Edna -- Detached mother, resentful type: Francine -- Detached mother, exhausted type: Glenda -- Abusive/neglectful mother, recurrent type: Harriet -- Abusive/neglectful mother, reactive type: Janet -- Abusive/neglectful mother, inadequate type: Kaye -- Psychotic/depressed mother, delusional type: Barbara -- Psychotic/depressed mother, impulsive type: Susan Smith -- Psychotic/depressed mother, suicidal type: Marilyn -- Retaliatory mother: Olivia -- Psychopathic mother, financial type: Pauline -- Psychopathic mother, addicted type: Samantha -- Psychopathic mother, narcissistic type: Rhonda -- Final thoughts: what have we learned and what do we need to do?…”
    Libro electrónico
  19. 126299
    Publicado 2020
    “…'Explaining Imagination' is a guidebook for doing just that, where the parts are other ordinary mental states like beliefs, desires, judgments and decisions…”
    Libro electrónico
  20. 126300
    por Lång, Sara
    Publicado 2010
    “…Le présent article examine la planification et la conception des installations éducatives en intégrant la dimension homme-femme, en vue d’orienter la recherche et l’analyse des politiques adoptées dans l’avenir…”
    Capítulo de libro electrónico