Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 103
- Management 62
- History 47
- Data processing 40
- Machine learning 38
- Development 36
- Web search engines 35
- Artificial intelligence 33
- Leadership 33
- Internet marketing 32
- Web sites 32
- Python (Computer program language) 29
- Application software 27
- Data mining 26
- Engineering & Applied Sciences 26
- Design 25
- Internet searching 25
- Education 24
- Business & Economics 23
- Computer networks 22
- Computer programs 21
- Database management 21
- Filosofía 21
- Economics 20
- Business 19
- Computer Science 19
- Història 19
- Web site development 18
- Finance 17
- Psicoanálisis 17
-
1421Publicado 2015Tabla de Contenidos: “…; What Reverse Does to Influence; Why Self-Preservation Undermines Influence; Fear Is a Killer; Secure Confidence Wins; How to Say I Am Sorry; The Reverse Challenge; Chapter 10: Ranking Your Gear Order; What Is Your Gear Order?; Gear Order Under Stress; Introvert/Extrovert Gear Order; Understanding Others' Gear Order; Section Three: Living and Leading Connected…”
Libro electrónico -
1422por Şuhubi, Erdoğan S.Tabla de Contenidos: “…Exterior Algebra; 1.6. Rank of an Exterior Form; I. Exercises; Chapter II: Differentiable Manifolds; 2.1. …”
Publicado 2013
Libro electrónico -
1423Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- About the Authors -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Governance -- Organizational Governance -- Organizational Strategy, Goals, and Objectives -- Organizational Structure, Roles, and Responsibilities -- Organizational Culture -- Policies and Standards -- Business Processes -- Organizational Assets -- Risk Governance -- Enterprise Risk Management and Risk Management Frameworks -- Three Lines of Defense -- Risk Profile -- Risk Appetite and Risk Tolerance -- Legal, Regulatory, and Contractual Requirements -- Professional Ethics of Risk Management -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 2 IT Risk Assessment -- IT Risk Identification -- Risk Events -- Threat Modeling and Threat Landscape -- Vulnerability and Control Deficiency Analysis -- Risk Scenario Development -- IT Risk Analysis and Evaluation -- Risk Assessment Concepts, Standards, and Frameworks -- Risk Assessment Standards and Frameworks -- Risk Ranking -- Risk Ownership -- Risk Register -- Risk Analysis Methodologies -- Business Impact Analysis -- Inherent and Residual Risk -- Miscellaneous Risk Considerations -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 3 Risk Response and Reporting -- Risk Response -- Risk and Control Ownership -- Risk Treatment/Risk Response Options -- Third-Party Risk -- Issues, Findings, and Exceptions Management -- Management of Emerging Risk -- Control Design and Implementation -- Control Types and Functions -- Control Standards and Frameworks -- Control Design, Selection, and Analysis -- Control Implementation -- Control Testing and Effectiveness Evaluation -- Risk Monitoring and Reporting -- Risk Treatment Plans -- Data Collection, Aggregation, Analysis, and Validation -- Risk and Control Monitoring Techniques…”
Libro electrónico -
1424por Chandramouli, SubramanianTabla de Contenidos: “…Defect Detection Rate -- Escaped Defects -- Chapter 7 Agile Analysis and Design -- Introduction -- Collecting and Validating Requirements of Agile Projects -- Participatory Decision Model -- Product Vision -- Product Roadmap -- Backlog -- Story Maps -- Agile Modeling -- Business Case Development -- Chartering -- Chapter 8 Product Quality and Process Improvement -- Introduction -- Frequent Verification and Validation -- Test-Driven Development (TDD) -- Definition of Done -- Incremental Delivery -- Feedback Techniques for Product -- Continuous Improvement Process -- Process Analysis and Improvement Techniques -- Value Stream Mapping -- Five Whys -- Cause and Effect/Fishbone Diagrams -- Control Limits -- Chapter 9 Interpersonal Skills -- Emotional Intelligence Quotient (EQ) -- Collaboration -- Adaptive Leadership -- Negotiations -- Conflict Resolution -- Quick Quiz on Conflict Management -- Servant Leadership -- Brainstorming Techniques -- Building Empowered Team -- Coaching and Mentoring -- Team Motivation and Knowledge Sharing -- Leadership Styles -- Problem-solving Steps -- Culture and Team Diversity -- Chapter 10 Value-based Prioritization -- Introduction -- Definition of Value -- ROI, NPV, IRR -- Value-driven Delivery -- Elicit Non-functional Requirements -- Relative Prioritization and Ranking -- Value-based Prioritization -- Minimally Marketable Feature (MMF) -- Agile Compliance -- Regulatory Compliance -- Chapter 11 Agile Project Risk Management -- Introduction -- Approaching risk in Agile Projects -- Identify Risks -- Risk Adjusted Backlog -- Risk Burn-down Graphs -- Perform Qualitative Risk Analysis -- Risk-based Spike -- Architectural Spike -- Plan Risk Responses -- Monitoring and Control Risks -- Checkpoints in Agile Projects -- Chapter 12 PMI Code of Ethics and Professional Conduct -- Introduction -- Structure of the Code…”
Publicado 2016
Libro electrónico -
1425Publicado 2021Tabla de Contenidos: “…COEFICIENTE DE CORRELACIÓN DE PEARSON (R) -- COEFICIENTE DE DETERMINACIÓN (R2) -- 10.3 REGRESIÓN MÚLTIPLE -- PREGUNTAS Y EJERCICIOS PARA EL CAPÍTULO 10 -- CAPÍTULO 11 PRUEBAS NO PARAMÉTRICAS -- 11.1 PRUEBAS ESTADÍSTICAS PARAMÉTRICAS Y NO PARAMÉTRICAS -- UTILIDAD Y DESCRIPCIÓN DE LAS PRUEBAS NO PARAMÉTRICAS -- PRUEBA DE NORMALIDAD -- JI CUADRADO -- 11.2 PRUEBAS DE CORRELACIÓN NO PARAMÉTRICA -- COEFICIENTE DE CORRELACIÓN DE SPEARMAN (RS) -- PRUEBA KENDALL TAU(T) -- COEFICIENTE ALFA DE CRONBACH -- 11.3 PRUEBAS DE HIPÓTESIS NO PARAMÉTRICAS -- PRUEBA KRUSKAL-WALLIS -- PRUEBA DEL SIGNO -- PRUEBA DE MANN-WHITNEY -- WILCONXON SIGNED-RANK -- PREGUNTAS Y EJERCICIOS PARA EL CAPÍTULO 11 -- APÉNDICES -- APÉNDICE A ENLACES RECOMENDADOS -- APÉNDICE B TABLAS PARA LAS ESTADÍSTICAS -- APÉNDICE C FÓRMULAS -- REFERENCIAS -- ÍNDICE -- SOBRE LA OBRA…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1426Publicado 2021Tabla de Contenidos: “…COEFICIENTE DE DETERMINACIÓN DE PEARSON (R2) -- 10.3 REGRESIÓN MÚLTIPLE -- PREGUNTAS Y EJERCICIOS PARA EL CAPÍTULO 10 -- CAPÍTULO 11 PRUEBAS NO PARAMÉTRICAS -- 11.1 PRUEBAS ESTADÍSTICAS PARAMÉTRICAS Y NO PARAMÉTRICAS -- UTILIDAD Y DESCRIPCIÓN DE LAS PRUEBAS NO PARAMÉTRICAS -- PRUEBA DE NORMALIDAD -- PRUEBA DE JI-CUADRADO ( 2) -- 11.2 PRUEBAS DE CORRELACIÓN NO PARAMÉTRICA -- COEFICIENTE DE CORRELACIÓN DE SPEARMAN (RS) -- PRUEBA KENDALL TAU(T) -- 11.3 PRUEBAS DE HIPÓTESIS NO PARAMÉTRICAS -- PRUEBA KRUSKAL-WALLIS -- PRUEBA DEL SIGNO -- PRUEBA DE MANN-WHITNEY -- WILCONXON SIGNED-RANK -- PREGUNTAS Y EJERCICIOS PARA EL CAPÍTULO 11 -- APÉNDICES -- APÉNDICE A ENLACES RECOMENDADOS -- APÉNDICE B TABLAS PARA LAS ESTADÍSTICAS -- APÉNDICE C FÓRMULAS -- REFERENCIAS -- ÍNDICE -- SOBRE LA OBRA…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1427Publicado 2018Tabla de Contenidos: “…-- Challenges of multimodality learning -- Representation -- Translation -- Alignment -- Fusion -- Co-learning -- Image captioning -- Show and tell -- Encoder -- Decoder -- Training -- Testing/inference -- Beam Search -- Other types of approaches -- Datasets -- Evaluation -- BLEU -- ROUGE -- METEOR -- CIDEr -- SPICE -- Rank position -- Attention models -- Attention in NLP -- Attention in computer vision -- The difference between hard attention and soft attention -- Visual question answering -- Multi-source based self-driving -- Summary -- Chapter 8: Deep Reinforcement Learning -- What is reinforcement learning (RL)? …”
Libro electrónico -
1428Publicado 2022Tabla de Contenidos: “…Restoring Network -- Restore IT Security Services -- Restore Virtual Machines and/or Cloud Services -- Restore Backup Systems -- Restore Clients, Servers, Applications, Services -- Conduct Unit Testing -- Rebuild Process Summary -- Recovery Process Summary -- Recovering a Windows Computer -- Recovering/Restoring Microsoft Active Directory -- Summary -- Chapter 10 Next Steps -- Paradigm Shifts -- Implement a Data-Driven Defense -- Focus on Root Causes -- Rank Everything! -- Get and Use Good Data -- Heed Growing Threats More -- Row the Same Direction -- Focus on Social Engineering Mitigation -- Track Processes and Network Traffic -- Improve Overall Cybersecurity Hygiene -- Use Multifactor Authentication -- Use a Strong Password Policy -- Secure Elevated Group Memberships -- Improve Security Monitoring -- Secure PowerShell -- Secure Data -- Secure Backups -- Summary -- Chapter 11 What Not to Do -- Assume You Can't Be a Victim -- Think That One Super-Tool Can Prevent an Attack -- Assume Too Quickly Your Backup Is Good -- Use Inexperienced Responders -- Give Inadequate Considerations to Paying Ransom -- Lie to Attackers -- Insult the Gang by Suggesting Tiny Ransom -- Pay the Whole Amount Right Away -- Argue with the Ransomware Gang -- Apply Decryption Keys to Your Only Copy -- Not Care About Root Cause -- Keep Your Ransomware Response Plan Online Only -- Allow a Team Member to Go Rogue -- Accept a Social Engineering Exclusion in Your Cyber-Insurance Policy -- Summary -- Chapter 12 Future of Ransomware -- Future of Ransomware -- Attacks Beyond Traditional Computers -- IoT Ransoms -- Mixed-PurposeHacking Gangs -- Future of Ransomware Defense -- Future Technical Defenses -- Ransomware Countermeasure Apps and Features -- AI Defense and Bots -- Strategic Defenses -- Focus on Mitigating Root Causes -- Geopolitical Improvements -- Systematic Improvements…”
Libro electrónico -
1429por Munagavalasa, Srini“…You'll learn how to use tacit business analysis and Salesforce system analysis skills to rank and stack all requirements as well as get buy-in from stakeholders. …”
Publicado 2022
Libro electrónico -
1430Publicado 2016Tabla de Contenidos: “…-- Tools for text summarization -- Naive text summarization using NLTK -- Text summarization using Gensim -- Text summarization using Sumy -- Sumy's Luhn summarizer -- Sumy's TextRank summarizer -- Sumy's LSA summarizer -- Sumy's Edmundson summarizer -- Summary -- Topic Modeling -- What is topic modeling? …”
Libro electrónico -
1431Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Working with Rank-N type -- How to do it... -- How it works... -- Working with type family -- How to do it... -- How it works... -- Working with GADTs -- How to do it... -- How it works... -- Chapter 11: Working with Lens and Prism -- Introduction -- Creating lenses -- How to do it... -- How it works... -- Working with lenses -- How to do it... -- How it works... -- Working with Traversal -- How to do it... -- How it works... -- Working with Iso -- How to do it... -- How it works... -- Working with Prism -- How to do it... -- How it works... -- Working with predefined lenses -- Getting ready -- How to do it... -- How it works... -- Chapter 12: Concurrent and Distributed Programming in Haskell -- Introduction -- Working with IORef -- How to do it... -- How it works... -- Working with MVar -- How to do it... -- How it works... -- Working with STM -- How it works... -- How it works... -- Working with strategies -- How to do it... -- How it works... -- Working with monad-par -- How to do it... -- How it works... -- Working with Cloud Haskell -- Getting ready -- How to do it... -- How it works... -- Using Cloud Haskell to start master and slave nodes -- How to do it... -- How it works... -- Using closure to communicate between nodes -- How to do it... -- How it works... -- Index…”
Libro electrónico -
1432por Kloostra, Simon. author“…Joomla 3 SEO and Performance is a concise, 150-page book that helps you to build websites that dominate search engine rankings and have super-fast load times, giving your sites an increased audience. …”
Publicado 2015
Libro electrónico -
1433Publicado 2024Tabla de Contenidos: “…-- 6.1.1 Egalitarianism -- 6.1.2 Dignitas Christiana -- 6.1.3 The Raising of the Poor -- 6.1.4 Lumen Orientale -- 6.1.5 The Delphic Maxim -- 6.1.6 Establishing Christmas Liturgy -- 6.1.7 Christian Reading of the Psalms -- 6.1.8 Features of Human Dignity as an Indication of Homonymy Replacing Polysemy -- 6.2 Existing Assessments of the Role of the Patristic Period -- 6.2.1 Did Human Dignity Develop from an Idea of a Rank? -- 6.2.2 Was the Coining of the Category of Human Dignity a Discontinuous Process in European Culture? …”
Libro electrónico -
1434por Sargeant, AdrianTabla de Contenidos: “…A Digital Fundraising Mix -- Search Engine Optmization (Seo) -- Natural or Organic Search -- Pay Per Click -- Ad Rank -- Quality Scores -- Cost Per Action Bidding -- Google Ad Grants -- Digital Public Relations -- Cornerstones of a Digital PR Strategy -- Display Advertising -- Designing an Effective Ad -- Behavioral Targeting -- Paying for Display Advertising -- Google Analytics -- Opt-In Email -- Making Email Work -- Viral Marketing -- Website Design and Optimization -- Giving Page Design -- Mobile -- Benefits of Mobile -- Mobile Apps -- Conclusion -- Discussion Questions -- References -- Chapter 12 Social Media -- Objectives -- Introduction -- The Major Players -- Facebook -- Twitter (Now X) -- LinkedIn -- YouTube -- Instagram -- TikTok -- Pinterest -- Other Social Networks -- Snapchat -- Reddit -- Tumblr -- Periscope -- Flickr -- Developing a Strategy -- People -- Objectives -- Strategy -- Technology -- Formulating a Content Strategy -- Integrating Your Approach -- Website -- Events -- Email -- Direct Mail -- Other Ideas -- Leveraging Fans, Followers, and Influencers -- Algorithms and Getting Your Content Seen -- Measuring the Effectiveness of Your Social Media Efforts -- Safeguarding Contacts -- Summary -- Discussion Questions -- References -- Chapter 13 Donor Retention and Development -- Objectives -- Introduction -- What Do We Mean By Loyalty and Retention? …”
Publicado 2024
Libro electrónico -
1435por Johnston, Benjamin, authorTabla de Contenidos: “…Activity 4.01: Analyzing Sales Data Using Aggregate Functions -- Summary -- Chapter 5: Window Functions for Data Analysis -- Introduction -- Window Functions -- The Basics of Window Functions -- Exercise 5.01: Analyzing Customer Data Fill Rates over Time -- The WINDOW Keyword -- Statistics with Window Functions -- Exercise 5.02: Rank Order of Hiring -- Window Frame -- Exercise 5.03: Team Lunch Motivation -- Activity 5.01: Analyzing Sales Using Window Frames and Window Functions -- Summary -- Chapter 6: Importing and Exporting Data -- Introduction -- The COPY Command -- Running the psql Command -- The COPY Statement -- \COPY with psql -- Creating Temporary Views -- Configuring COPY and \COPY -- Using COPY and \COPY to Bulk Upload Data to Your Database -- Exercise 6.01: Exporting Data to a File for Further Processing in Excel -- Using Python with your Database -- Getting Started with Python -- Improving PostgreSQL Access in Python with SQLAlchemy and pandas -- What is SQLAlchemy? …”
Publicado 2022
Libro electrónico -
1436Publicado 2023Tabla de Contenidos: “…-- Setting up our environment -- Data representation -- Creating tensors -- Tensor rank -- Properties of tensors -- Basic tensor operations -- Hello World in TensorFlow -- Debugging and solving error messages -- Summary -- Questions -- Further reading -- Chapter 3: Linear Regression with TensorFlow -- Technical requirements -- Linear regression with TensorFlow -- Evaluating regression models -- Salary prediction with TensorFlow -- Loading the data -- Data preprocessing -- Model building -- Model evaluation -- Making predictions -- Saving and loading models -- Summary -- Questions -- Further reading -- Chapter 4: Classification with TensorFlow -- Technical requirements -- Classification with TensorFlow -- Evaluating classification models -- Confusion matrix -- A student dropout prediction -- Loading the data -- Exploratory data analysis -- Data preprocessing -- Model building -- Classification performance evaluation -- Summary -- Questions…”
Libro electrónico -
1437Publicado 2020Tabla de Contenidos: “…Iteratorkardinalität verstehen -- Kontextübergänge in Iteratoren nutzen -- CONCATENATEX verwenden -- Iteratoren, die Tabellen zurückgeben -- Häufige Aufgabenstellungen mit Iteratoren lösen -- Durchschnitte und gleitende Durchschnitte berechnen -- RANKX verwenden -- Berechnungsgranularität ändern -- Fazit -- Kapitel 8 - Zeitintelligenzberechnungen -- Einführung in die Zeitintelligenz -- Automatik für Datum/Uhrzeit in Power BI -- Automatische Datumsspalten in Power Pivot für Excel -- Datumstabellenvorlage in Power Pivot für Excel -- Datumstabelle erstellen -- CALENDAR und CALENDARAUTO verwenden -- Mit mehreren Datumsangaben arbeiten -- Umgang mit mehreren Beziehungen zur Date-Tabelle -- Mehrere Datumstabellen verwalten -- Grundlegende Zeitintelligenzberechnungen verstehen -- Als Datumstabelle markieren verwenden -- Einführung in grundlegende Zeitintelligenzberechnungen -- YTD, QTD und MTD verwenden -- Zeiträume aus früheren Zeiträumen berechnen -- Zeitintelligenzfunktionen kombinieren -- Differenz über frühere Zeiträume berechnen -- Gleitende Jahresgesamtsumme berechnen -- Die richtige Aufrufreihenfolge für verschachtelte Zeitintelligenzfunktionen nutzen -- Semiadditive Berechnungen verstehen -- LASTDATE und LASTNONBLANK verwenden -- Mit Eröffnungs- und Abschlusssaldo arbeiten -- Fortgeschrittene Zeitintelligenzberechnungen verstehen -- To-Date-Zeiträume verstehen -- DATEADD verstehen -- FIRSTDATE, LASTDATE, FIRSTNONBLANK und LASTNONBLANK verstehen -- Drillthrough mit Zeitintelligenz verwenden -- Mit benutzerdefinierten Kalendern arbeiten -- Mit Wochen arbeiten -- YTD, QTD und MTD benutzerdefiniert -- Fazit -- Kapitel 9 - Berechnungsgruppen -- Einführung in Berechnungsgruppen -- Berechnungsgruppen erstellen -- Berechnungsgruppen verstehen -- Anwendung von Berechnungselementen verstehen -- Priorität bei Berechnungsgruppen verstehen…”
Libro electrónico -
1438Tabla de Contenidos: “…Scale-Out -- Rack-Optimized Servers -- Blade Servers -- Server Sprawl -- Virtualization -- Server Deployment Today -- Unified Computing System (UCS) -- Chapter 2 Server Architectures -- The Processor Evolution -- Sockets -- Cores -- Threads -- Intel® Hyper-Threading Technology -- Front-Side Bus -- Dual Independent Buses -- Dedicated High-Speed Interconnect -- Intel® QuickPath Interconnect -- The Memory Subsystem -- SRAMs -- DRAMs -- SDRAMs -- DIMMs -- ECC and Chipkill® -- Memory Ranks -- UDIMMs and RDIMMs -- DDR2 and DDR3 -- The I/O Subsystem -- PCI Express® -- Intel Microarchitectures -- Platform Architecture -- CPU Architecture -- Virtualization Support -- Advanced Reliability -- Advanced Encryption Standard -- Trusted Execution Technology -- Chip Design -- Chipset Virtualization Support -- Intel® VT-d for Direct I/O -- Intel® VT-c for Connectivity -- VMDirectPath® -- Chapter 3 UCS Enabling Technologies -- Unified Fabric -- 10 Gigabit Ethernet -- Lossless Ethernet -- Terminology -- PFC (Priority-Based Flow Control) -- DCBX: Data Center Bridging eXchange -- Bandwidth Management -- FCoE (Fibre Channel over Ethernet) -- Virtualization -- Server Virtualization -- SR-IOV -- The IEEE Standard Effort -- Port Extenders and Virtualization -- VNTag -- Fabric Extenders -- VN-Link -- Memory Expansion -- Speed vs. …”
Libro electrónico -
1439Publicado 2015Tabla de Contenidos: “…-- Standards and Best Practices for Risk Management -- Methodologies for Assessing Risk Within Industrial Control Systems -- Security Tests -- Security Audits -- Security and Vulnerability Assessments -- Establishing a Testing and Assessment Methodology -- Tailoring a Methodology for Industrial Networks -- Theoretical versus Physical Tests -- Online versus Offline Physical Tests -- System Characterization -- Data Collection -- Scanning of Industrial Networks -- Device Scanners -- Vulnerability Scanners -- Traffic Scanners -- Live Host Identification -- "Quiet" / "Friendly" Scanning Techniques -- Potentially "Noisy"/"Dangerous" Scanning Techniques -- Port Mirroring and Span Ports -- Command Line Tools -- Hardware and Software Inventory -- Data Flow Analysis -- Threat Identification -- Threat Actors/Sources -- Threat Vectors -- Threat Events -- Identification of Threats During Security Assessments -- Vulnerability Identification -- Vulnerability Scanning -- Configuration Auditing -- Vulnerability Prioritization -- Common Vulnerability Scoring System -- Risk Classification and Ranking -- Consequences and Impact…”
Libro electrónico -
1440Publicado 2018Tabla de Contenidos: “…Training a fully connected layer as a convolution layer -- Convolution implementation of sliding window -- Thinking about localization as a regression problem -- Applying regression to other problems -- Combining regression with the sliding window -- Detecting objects -- Regions of the convolutional neural network (R-CNN) -- Fast R-CNN -- Faster R-CNN -- Single shot multi-box detector -- Object detection API -- Installation and setup -- Pre-trained models -- Re-training object detection models -- Data preparation for the Pet dataset -- Object detection training pipeline -- Training the model -- Monitoring loss and accuracy using TensorBoard -- Training a pedestrian detection for a self-driving car -- The YOLO object detection algorithm -- Summary -- Chapter 5: Semantic Segmentation -- Predicting pixels -- Diagnosing medical images -- Understanding the earth from satellite imagery -- Enabling robots to see -- Datasets -- Algorithms for semantic segmentation -- The Fully Convolutional Network -- The SegNet architecture -- Upsampling the layers by pooling -- Sampling the layers by convolution -- Skipping connections for better training -- Dilated convolutions -- DeepLab -- RefiNet -- PSPnet -- Large kernel matters -- DeepLab v3 -- Ultra-nerve segmentation -- Segmenting satellite images -- Modeling FCN for segmentation -- Segmenting instances -- Summary -- Chapter 6: Similarity Learning -- Algorithms for similarity learning -- Siamese networks -- Contrastive loss -- FaceNet -- Triplet loss -- The DeepNet model -- DeepRank -- Visual recommendation systems -- Human face analysis -- Face detection -- Face landmarks and attributes -- The Multi-Task Facial Landmark (MTFL) dataset -- The Kaggle keypoint dataset -- The Multi-Attribute Facial Landmark (MAFL) dataset -- Learning the facial key points -- Face recognition…”
Libro electrónico