Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4541Publicado 2023Tabla de Contenidos: “…-- Why Git is popular -- Drawbacks of Git -- Committing code to keep it safe -- Excluding files from a repository -- Tagging commits to identify versions of code -- Branching code for developing in an isolated space -- Git commands for managing branches -- Handling merge conflicts -- Syncing local and remote copies of repositories -- The "golden" repository -- Configuring remote repositories -- Pushing -- Fetching -- Pulling -- Additional resources for learning Git -- Summary -- Chapter 3: Understanding GitLab Components -- Technical requirements -- Emphasizing the "why" over the "how" -- Introducing the GitLab platform -- What is GitLab? …”
Libro electrónico -
4542Publicado 2010Tabla de Contenidos: “…-- Working with Browser Items -- Mouseless Browser Navigation -- Chapter 8: Working with Clips in the Viewer -- Anatomy of the Viewer -- Transport controls -- Clip-marking controls -- Pop-up selectors -- View selectors -- Playhead Sync pop-up menu -- Timecode navigation and display -- Working with Clips in the Viewer -- Playing clips -- JKL Keys: The Way to Move -- FCP 7 Update: Multi-Touch Gestures Support -- Other ways to move: jogging, scrubbing, and shuttling -- Navigating with Timecode -- FCP Protocol: Entering Timecode Numbers -- Working with In and Out Points -- Other Ways to Set In and Out Points -- About Subclips -- Marking Shortcuts -- FCP Protocol: Subclips Are Master Clips, Too -- Using Markers -- On the Fly: Working With Markers During Playback -- Adjusting the Viewer Display -- Changing magnification and window size in the Viewer or Canvas -- Wireframes in the Viewer -- Viewing overlays -- Viewing Title Safe and Action Safe boundaries -- Viewing Timecode overlays -- Viewing with different backgrounds -- Chapter 9: Basic Editing -- Basic Editing Overview -- Basic Editing Step-by-Step -- Many Ways to Make an Edit -- FCP Protocol: Three-Point Editing -- Specifying target tracks -- Moving the playhead -- FCP Protocol: Editing Multiple Tracks in Final Cut Pro…”
Libro electrónico -
4543Publicado 2022Tabla de Contenidos: “…-- Can I Just Copy and Paste the Code? -- How Safe Is PHP? -- What's New in PHP 8? -- What Software Do I Need to Write PHP? …”
Libro electrónico -
4544por Gurfinkel, ArieTabla de Contenidos: “…4.1 Generating Attractor Caches from Sub-Games -- 4.2 Constructing Sub-games from Abstract Strategy Templates -- 5 Game Solving with Abstract Template-Based Caching -- 6 Experimental Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Learning -- Bisimulation Learning -- 1 Introduction -- 2 Illustrative Example -- 3 Stutter-Insensitive Bisimulations of Deterministic Transition Systems -- 3.1 Model Checking -- 4 Counterexample-Guided Bisimulation Learning -- 4.1 Learner-Verifier Framework for Bisimulation Learning -- 4.2 Binary Decision Tree Partition Templates -- 5 Experimental Evaluation -- 5.1 Discrete-Time Clock Synchronization -- 5.2 Conditional Termination -- 6 Conclusion -- References -- Regular Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Regular Languages -- 3.2 Rational Transductions -- 3.3 Markov Decision Processes -- 4 Regular Markov Decision Processes -- 4.1 Undecidability of Values -- 4.2 Discounted Optimization -- 4.3 Finiteness Conditions -- 4.4 Q-Learning in RMDPs -- 5 Deep Regular Reinforcement Learning -- 5.1 Token Passing -- 5.2 Duplicating Pebbles -- 5.3 Shunting Yard Algorithm -- 5.4 Modified Tangrams -- 6 Conclusion -- References -- LTL Learning on GPUs -- 1 Introduction -- 2 Formal Preliminaries -- 3 High-Level Structure of the Algorithm -- 4 In-Memory Representation of Search Space -- 5 Correctness and Complexity of the Branch-Free Implementation of Temporal Operators -- 6 Relaxed Uniqueness Checks -- 7 Divide & -- Conquer -- 8 Evaluation of Algorithm Performance -- 9 Conclusion -- References -- Safe Exploration in Reinforcement Learning by Reachability Analysis over Learned Models -- 1 Introduction -- 2 Problem Setup -- 3 Verified Exploration Through Learned Models -- 3.1 Symbolic Environment Models -- 3.2 Shielding for Verified Safe Exploration…”
Publicado 2024
Libro electrónico -
4545por O'Sullivan, BryanTabla de Contenidos: “…-- A Naive Finding Function -- Predicates: From Poverty to Riches, While Remaining Pure -- Sizing a File Safely -- The Acquire-Use-Release Cycle -- A Domain-Specific Language for Predicates…”
Publicado 2009
Libro electrónico -
4546Publicado 2012Tabla de Contenidos: “…Operational Procedures -- Workplace Safety and Safe Equipment Handling -- Cable Management -- Using Appropriate Tools -- Fire Safety -- Lifting and Moving Equipment -- Exercise 1-1: Research Lifting Guidelines -- Hot Components -- Electrical Safety -- Electrostatic Discharge (ESD) -- Exercise 1-2: ESD-Proofing Your Workspace -- Electromagnetic Interference (EMI) -- Working Safely with Power Supplies -- Display Devices -- Printers -- Compressed Air -- Environmental Concerns for IT Professionals -- Working in a Harsh Environment -- Disposing of Computing Waste -- Exercise 1-3: Researching Recycling Centers -- Professionalism and Proper Communication -- Professionalism -- Dealing with Prohibited Content and Prohibited Activities -- Defining Prohibited Content and Behavior -- Policies Concerning Prohibited Content and Behavior -- Responding to the Discovery of Prohibited Content and/or Behavior -- Two-Minute Drill -- Self Test -- Self Test Answers -- 2. …”
Libro electrónico -
4547Publicado 2018Tabla de Contenidos: “…Parallel sort algorithm -- 65. Thread-safe logging to the console -- 66. Customer service system -- Solutions -- 61. …”
Libro electrónico -
4548Publicado 2023Tabla de Contenidos: “…-- "What is the purpose of the safe area in Auto Layout, and how do you ensure that your views are properly positioned within the safe area?" …”
Libro electrónico -
4549Publicado 2024Tabla de Contenidos: “…5.4 Instruction optimization -- 5.4.1 Device intrinsics -- 5.4.1.1 Directed rounding -- 5.4.1.2 C intrinsics -- 5.4.1.3 Fast math intrinsics -- 5.4.1.4 Compiler options -- 5.4.2 Divergent warps -- 6 Porting tips and techniques -- 6.1 CUF kernels -- 6.2 Conditional inclusion of code -- 6.3 Renaming variables -- 6.3.1 Renaming via use statements -- 6.3.2 Renaming via the associate construct -- 6.4 Minimizing memory footprint for work arrays -- 6.5 Array compaction -- 7 Interfacing with CUDA C code and CUDA libraries -- 7.1 Calling user-written CUDA C code -- 7.1.1 The ignore"80"137tkr directive -- 7.2 cuBLAS -- 7.2.1 Legacy cuBLAS API -- 7.2.2 New cuBLAS API -- 7.2.3 Batched cuBLAS routines -- 7.2.4 GEMM with tensor cores -- 7.3 cuSPARSE -- 7.4 cuSOLVER -- 7.5 cuTENSOR -- 7.5.1 Low-level cuTENSOR interfaces -- 7.6 Thrust -- 8 Multi-GPU programming -- 8.1 CUDA multi-GPU features -- 8.1.1 Peer-to-peer communication -- 8.1.1.1 Requirements for peer-to-peer communication -- 8.1.2 Peer-to-peer direct transfers -- 8.1.3 Peer-to-peer transpose -- 8.2 Multi-GPU programming with MPI -- 8.2.1 Assigning devices to MPI ranks -- 8.2.2 MPI transpose -- 8.2.3 GPU-aware MPI transpose -- 2 Case studies -- 9 Monte Carlo method -- 9.1 CURAND -- 9.2 Computing π with CUF kernels -- 9.2.1 IEEE-754 precision -- 9.3 Computing π with reduction kernels -- 9.3.1 Reductions with SHFL instructions -- 9.3.2 Reductions with atomic locks -- 9.3.3 Reductions using the grid"80"137group cooperative group -- 9.4 Accuracy of summation -- 9.5 Option pricing -- 10 Finite difference method -- 10.1 Nine-point 1D finite difference stencil -- 10.1.1 Data reuse and shared memory -- 10.1.2 The x-derivative kernel -- 10.1.2.1 Performance of the x-derivative kernel -- 10.1.3 Derivatives in y and z -- 10.1.4 Nonuniform grids -- 10.2 2D Laplace equation…”
Libro electrónico -
4550Publicado 2022Libro electrónico
-
4551Publicado 2018Tabla de Contenidos: “…ANDROID SOFTWARE STACK [18] -- FIGURA 2. ARQUITECTURA DE SAFE CANDY -- FIGURA 3. MARCO DE TRABAJO PARA EL ANÁLISIS ESTÁTICO -- FIGURA 4. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
4552Publicado 2021Tabla de Contenidos: “…El síndrome general de adaptación de Selye -- 3. Los datos biológicos -- 3.1. La respuesta endocrina y neurovegetativa -- 3.2. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4553Publicado 2018Tabla de Contenidos: “…The case study of Tor Vergata (Rome, Italy) -- chapter New ornaments’ influence on the character of modern cities -- part, History and arts -- chapter Arabian urban text art: Between cultural identity and artistic identity -- chapter The remaining houses of the two pearl merchants Ahmed Munawar Rifai and Hussein Bin Yahiya Rifai in the Farasan Islands in the 14th century AH/20th century AD: A study of aesthetic and artistic values -- part, City as an organism -- part, Architecture -- chapter Architecture of the 21st century museum as a catalytic phenomenon in the evolving cultural identity of a city -- chapter Conserving historical areas through the roles of main cities: Urban identity in the era of globalisation -- chapter Entrance gateway of Kerala temples: Assessing the form of a Kerala temple gopuram through material and construction -- chapter Expression of cultural identity in the contemporary urban built form of Kathmandu -- chapter Reimagining city identity through safe and sustainable public environments -- chapter Smart grids, smart cities, interior spaces and human behaviour: An interactive development process -- part, History and arts -- chapter Identity in transformation of rural Egyptian villages -- chapter Metaphysics and identity in architecture: Peter Eisenman’s Wexner Center for the Arts as case study -- chapter Immersing the landscape in its music: The case of iso-polyphony in South Albania -- chapter The changing image of Istanbul through its monuments (1923–1973) -- chapter The cumulative effect of an interdisciplinary project -- chapter Unearthing the spatial archetypes of two indigenous South Asian cities: The walled city of Old Delhi and Old Dhaka -- part, Planning and approaching the city…”
Libro electrónico -
4554Publicado 2020Tabla de Contenidos: “…Modifications de l'occupation des sols en France, en Irlande, au Mexique et en Nouvelle-Zélande -- 3 Des stratégies et des plans nationaux cohérents pour une utilisation durable des terres -- Influence des accords multilatéraux sur les stratégies nationales -- Autres accords et instances -- Cohérence des stratégies et plans d'action nationaux touchant à l'utilisation des terres -- Objectifs d'atténuation des GES figurant dans les CDN et les SDFE et présence d'éléments de la problématique de l'utilisation des terres -- Présence d'éléments de la problématique de l'utilisation des terres dans les SPANB -- Présence d'éléments de la problématique de l'utilisation des terres dans les plans de développement agricole -- Présence d'éléments de la problématique de l'utilisation des terres dans les plans nationaux de développement (ou les stratégies équivalentes)…”
Libro electrónico -
4555por Loshin, PeterTabla de Contenidos: “…1.6.7 Business People and IT Professionals1.6.8 Others; 1.6.9 The Benefit of Having Diverse Users; 1.7 How Do I Use Tor; 1.7.1 Plan Ahead and Learn Tor Now; 1.7.2 TBB or Tails; 1.7.3 Tor Browser Bundle; 1.7.4 Tails; 1.7.5 What Can Go Wrong; 1.8 Using Tor Safely; 1.8.1 Use the Tor Browser; 1.8.2 Don't Open Documents; 1.8.3 Don't Install or Enable Browser Plugins; 1.8.4 Avoid Websites that Are Not HTTPS-Enabled; 1.8.5 Use Bridges/Find Company; 2 Using the Tor Browser Bundle; 2.1 What Is Bundled in the Tor Browser Bundle; 2.1.1 Vidalia; 2.1.2 Tor; 2.1.3 Mozilla Firefox ESR+Torbutton…”
Publicado 2013
Libro electrónico -
4556Publicado 2016Tabla de Contenidos: “…-- Part 1 The Board -- Chapter 1 Meet the Raspberry Pi -- A Trip Around the Board -- Model A/B -- Model A+/B+ -- Raspberry Pi 2 -- Raspberry Pi 3 -- Raspberry Pi Zero -- A Bit of Background -- ARM Versus x86 -- Windows Versus Linux -- Chapter 2 Getting Started with the Raspberry Pi -- Connecting a Display -- Composite Video -- HDMI Video -- DSI Video -- Connecting Audio -- Connecting a Keyboard and Mouse -- Installing NOOBS on an SD Card -- Connecting External Storage -- Connecting the Network -- Wired Networking -- Wireless Networking -- Connecting Power -- Installing the Operating System -- Installing Using NOOBS -- Installing Manually -- Connecting Bluetooth Devices -- Chapter 3 Linux System Administration -- Linux: An Overview -- Linux Basics -- Introducing Raspbian -- About Raspbian's Parent, Debian -- Alternatives to Raspbian -- Using External Storage Devices -- Creating a New User Account -- File System Layout -- Logical Layout -- Physical Layout -- Installing and Uninstalling Software -- Managing Software Graphically -- Managing Software at the Command Line -- Finding the Software You Want -- Installing Software -- Uninstalling Software -- Upgrading Software -- Shutting the Pi Down Safely -- Chapter 4 Troubleshooting -- Keyboard and Mouse Diagnostics -- Power Diagnostics -- Display Diagnostics -- Boot Diagnostics -- Network Diagnostics -- Chapter 5 Network Configuration -- Wired Networking -- Connecting to a Wired Network via the GUI -- Connecting to a Wired Network via the Console -- Testing Your Connectivity -- Wireless Networking -- Connecting to a Wireless Network via the GUI…”
Libro electrónico -
4557Publicado 2014Tabla de Contenidos: “…Systemically Important Financial Institutions (SIFI) The Universal Banking Model Separation Models United Kingdom United States European Union Switzerland The Volcker Rule and Proprietary Trading 15 Too Big To Fail (TBTF): Is Size the Problem? …”
Libro electrónico -
4558Publicado 2023Tabla de Contenidos: “…Large classes -- Switches -- Primitive Obsession -- Middle man -- Message chains -- Feature envy methods -- Divergent change -- Shotgun Surgery -- God object -- Summary -- Further reading -- Chapter 4: Testing -- Why you should test (often) -- Identifying and fixing defects -- Ensuring quality and reliability -- Customer satisfaction -- Compliance and standards -- Security -- Integration and compatibility -- Confidence and peace of mind -- Unit testing -- JUnit framework -- Integration testing -- Mockito -- Contract testing -- Be safe - checking and improving your test coverage -- What is test coverage? …”
Libro electrónico -
4559Publicado 2023Tabla de Contenidos: “…Intro -- Table of Contents -- Title Page -- Copyright -- Dedication -- Introduction -- Eight Feedback Styles -- Pushing Past Style to Completion -- Collaboration Is Key -- Note -- 1 Why Feedback Hurts -- How the Human Brain Processes Feedback -- Better Feedback Can Be Learned -- Completion with Kindness -- Notes -- 2 The Good, the Bad, and the Ugly of Review -- Defining the Creator‐Reviewer Relationship -- Good Feedback Is about Feeling Safe -- What Is Kind Review? -- Feedback Is Always Personal -- 3 Receiving Feedback: Tough Skin, Tough Love, or Tough -- Face Your Anxieties -- Learn the Levels of Feedback -- Manage Feedback Before You Burn Out -- 4 Giving Feedback -- Polish the Idea to Make It Shine -- Improve through Process -- Editing Is Not Creating -- Take a Hot Minute and Reflect -- 5 Taste Is an Unconscious Bias -- Feedback Is a Personal Opinion of Quality -- Risk Avoidance Can Be an Unconscious Bias -- Use Taste to Be Inclusive -- 6 Feedback Styles -- The Eight Review Styles -- When Styles Meet -- It's Part of Who You Are -- 7 Kind Collaborator -- Attributes of the Kind Collaborator -- How to Manage a Kind Collaborator -- How to Become a Kind Collaborator -- 8 Perfect Pass‐Through -- Attributes of a Perfect Pass‐Through -- Why a Perfect Pass‐Through Is Dangerous -- How to Manage a Perfect Pass‐Through -- What to Do If You Are a Perfect Pass‐Through -- 9 Vague Vocalist -- Attributes of the Vague Vocalist -- Why the Vague Vocalist Is Dangerous -- How to Manage a Vague Vocalist -- What to Do If You Are a Vague Vocalist -- 10 Land Mine -- Attributes of a Land Mine -- Why a Land Mine Is Dangerous -- How to Manage a Land Mine -- What to Do If You Are a Land Mine -- 11 Silent but Deadly -- Attributes of a Silent but Deadly -- Why a Silent but Deadly Is Dangerous -- How to Manage a Silent but Deadly -- What to Do If You Are a Silent but Deadly…”
Libro electrónico -
4560Publicado 2016Tabla de Contenidos: “…Chapter 2 With Power Comes Responsibility: Hewlett-Packard, Target, the Cops, and the NSA Deduce Your Secrets (ethics) 37 How do we safely harness a predictive machine that can foresee job resignation, pregnancy, and crime? …”
Libro electrónico