Mostrando 4,541 - 4,560 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.73s Limitar resultados
  1. 4541
    Publicado 2023
    Tabla de Contenidos: “…-- Why Git is popular -- Drawbacks of Git -- Committing code to keep it safe -- Excluding files from a repository -- Tagging commits to identify versions of code -- Branching code for developing in an isolated space -- Git commands for managing branches -- Handling merge conflicts -- Syncing local and remote copies of repositories -- The "golden" repository -- Configuring remote repositories -- Pushing -- Fetching -- Pulling -- Additional resources for learning Git -- Summary -- Chapter 3: Understanding GitLab Components -- Technical requirements -- Emphasizing the "why" over the "how" -- Introducing the GitLab platform -- What is GitLab? …”
    Libro electrónico
  2. 4542
    Publicado 2010
    Tabla de Contenidos: “…-- Working with Browser Items -- Mouseless Browser Navigation -- Chapter 8: Working with Clips in the Viewer -- Anatomy of the Viewer -- Transport controls -- Clip-marking controls -- Pop-up selectors -- View selectors -- Playhead Sync pop-up menu -- Timecode navigation and display -- Working with Clips in the Viewer -- Playing clips -- JKL Keys: The Way to Move -- FCP 7 Update: Multi-Touch Gestures Support -- Other ways to move: jogging, scrubbing, and shuttling -- Navigating with Timecode -- FCP Protocol: Entering Timecode Numbers -- Working with In and Out Points -- Other Ways to Set In and Out Points -- About Subclips -- Marking Shortcuts -- FCP Protocol: Subclips Are Master Clips, Too -- Using Markers -- On the Fly: Working With Markers During Playback -- Adjusting the Viewer Display -- Changing magnification and window size in the Viewer or Canvas -- Wireframes in the Viewer -- Viewing overlays -- Viewing Title Safe and Action Safe boundaries -- Viewing Timecode overlays -- Viewing with different backgrounds -- Chapter 9: Basic Editing -- Basic Editing Overview -- Basic Editing Step-by-Step -- Many Ways to Make an Edit -- FCP Protocol: Three-Point Editing -- Specifying target tracks -- Moving the playhead -- FCP Protocol: Editing Multiple Tracks in Final Cut Pro…”
    Libro electrónico
  3. 4543
    Publicado 2022
    Tabla de Contenidos: “…-- Can I Just Copy and Paste the Code? -- How Safe Is PHP? -- What's New in PHP 8? -- What Software Do I Need to Write PHP? …”
    Libro electrónico
  4. 4544
    por Gurfinkel, Arie
    Publicado 2024
    Tabla de Contenidos: “…4.1 Generating Attractor Caches from Sub-Games -- 4.2 Constructing Sub-games from Abstract Strategy Templates -- 5 Game Solving with Abstract Template-Based Caching -- 6 Experimental Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Learning -- Bisimulation Learning -- 1 Introduction -- 2 Illustrative Example -- 3 Stutter-Insensitive Bisimulations of Deterministic Transition Systems -- 3.1 Model Checking -- 4 Counterexample-Guided Bisimulation Learning -- 4.1 Learner-Verifier Framework for Bisimulation Learning -- 4.2 Binary Decision Tree Partition Templates -- 5 Experimental Evaluation -- 5.1 Discrete-Time Clock Synchronization -- 5.2 Conditional Termination -- 6 Conclusion -- References -- Regular Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Regular Languages -- 3.2 Rational Transductions -- 3.3 Markov Decision Processes -- 4 Regular Markov Decision Processes -- 4.1 Undecidability of Values -- 4.2 Discounted Optimization -- 4.3 Finiteness Conditions -- 4.4 Q-Learning in RMDPs -- 5 Deep Regular Reinforcement Learning -- 5.1 Token Passing -- 5.2 Duplicating Pebbles -- 5.3 Shunting Yard Algorithm -- 5.4 Modified Tangrams -- 6 Conclusion -- References -- LTL Learning on GPUs -- 1 Introduction -- 2 Formal Preliminaries -- 3 High-Level Structure of the Algorithm -- 4 In-Memory Representation of Search Space -- 5 Correctness and Complexity of the Branch-Free Implementation of Temporal Operators -- 6 Relaxed Uniqueness Checks -- 7 Divide &amp -- Conquer -- 8 Evaluation of Algorithm Performance -- 9 Conclusion -- References -- Safe Exploration in Reinforcement Learning by Reachability Analysis over Learned Models -- 1 Introduction -- 2 Problem Setup -- 3 Verified Exploration Through Learned Models -- 3.1 Symbolic Environment Models -- 3.2 Shielding for Verified Safe Exploration…”
    Libro electrónico
  5. 4545
    por O'Sullivan, Bryan
    Publicado 2009
    Tabla de Contenidos: “…-- A Naive Finding Function -- Predicates: From Poverty to Riches, While Remaining Pure -- Sizing a File Safely -- The Acquire-Use-Release Cycle -- A Domain-Specific Language for Predicates…”
    Libro electrónico
  6. 4546
    Publicado 2012
    Tabla de Contenidos: “…Operational Procedures -- Workplace Safety and Safe Equipment Handling -- Cable Management -- Using Appropriate Tools -- Fire Safety -- Lifting and Moving Equipment -- Exercise 1-1: Research Lifting Guidelines -- Hot Components -- Electrical Safety -- Electrostatic Discharge (ESD) -- Exercise 1-2: ESD-Proofing Your Workspace -- Electromagnetic Interference (EMI) -- Working Safely with Power Supplies -- Display Devices -- Printers -- Compressed Air -- Environmental Concerns for IT Professionals -- Working in a Harsh Environment -- Disposing of Computing Waste -- Exercise 1-3: Researching Recycling Centers -- Professionalism and Proper Communication -- Professionalism -- Dealing with Prohibited Content and Prohibited Activities -- Defining Prohibited Content and Behavior -- Policies Concerning Prohibited Content and Behavior -- Responding to the Discovery of Prohibited Content and/or Behavior -- Two-Minute Drill -- Self Test -- Self Test Answers -- 2. …”
    Libro electrónico
  7. 4547
    Publicado 2018
    Tabla de Contenidos: “…Parallel sort algorithm -- 65. Thread-safe logging to the console -- 66. Customer service system -- Solutions -- 61. …”
    Libro electrónico
  8. 4548
    Publicado 2023
    Tabla de Contenidos: “…-- "What is the purpose of the safe area in Auto Layout, and how do you ensure that your views are properly positioned within the safe area?" …”
    Libro electrónico
  9. 4549
    Publicado 2024
    Tabla de Contenidos: “…5.4 Instruction optimization -- 5.4.1 Device intrinsics -- 5.4.1.1 Directed rounding -- 5.4.1.2 C intrinsics -- 5.4.1.3 Fast math intrinsics -- 5.4.1.4 Compiler options -- 5.4.2 Divergent warps -- 6 Porting tips and techniques -- 6.1 CUF kernels -- 6.2 Conditional inclusion of code -- 6.3 Renaming variables -- 6.3.1 Renaming via use statements -- 6.3.2 Renaming via the associate construct -- 6.4 Minimizing memory footprint for work arrays -- 6.5 Array compaction -- 7 Interfacing with CUDA C code and CUDA libraries -- 7.1 Calling user-written CUDA C code -- 7.1.1 The ignore"80"137tkr directive -- 7.2 cuBLAS -- 7.2.1 Legacy cuBLAS API -- 7.2.2 New cuBLAS API -- 7.2.3 Batched cuBLAS routines -- 7.2.4 GEMM with tensor cores -- 7.3 cuSPARSE -- 7.4 cuSOLVER -- 7.5 cuTENSOR -- 7.5.1 Low-level cuTENSOR interfaces -- 7.6 Thrust -- 8 Multi-GPU programming -- 8.1 CUDA multi-GPU features -- 8.1.1 Peer-to-peer communication -- 8.1.1.1 Requirements for peer-to-peer communication -- 8.1.2 Peer-to-peer direct transfers -- 8.1.3 Peer-to-peer transpose -- 8.2 Multi-GPU programming with MPI -- 8.2.1 Assigning devices to MPI ranks -- 8.2.2 MPI transpose -- 8.2.3 GPU-aware MPI transpose -- 2 Case studies -- 9 Monte Carlo method -- 9.1 CURAND -- 9.2 Computing π with CUF kernels -- 9.2.1 IEEE-754 precision -- 9.3 Computing π with reduction kernels -- 9.3.1 Reductions with SHFL instructions -- 9.3.2 Reductions with atomic locks -- 9.3.3 Reductions using the grid"80"137group cooperative group -- 9.4 Accuracy of summation -- 9.5 Option pricing -- 10 Finite difference method -- 10.1 Nine-point 1D finite difference stencil -- 10.1.1 Data reuse and shared memory -- 10.1.2 The x-derivative kernel -- 10.1.2.1 Performance of the x-derivative kernel -- 10.1.3 Derivatives in y and z -- 10.1.4 Nonuniform grids -- 10.2 2D Laplace equation…”
    Libro electrónico
  10. 4550
    Publicado 2022
    Libro electrónico
  11. 4551
    Publicado 2018
    Tabla de Contenidos: “…ANDROID SOFTWARE STACK [18] -- FIGURA 2. ARQUITECTURA DE SAFE CANDY -- FIGURA 3. MARCO DE TRABAJO PARA EL ANÁLISIS ESTÁTICO -- FIGURA 4. …”
    Enlace del recurso
    Libro electrónico
  12. 4552
    Publicado 2021
    Tabla de Contenidos: “…El síndrome general de adaptación de Selye -- 3. Los datos biológicos -- 3.1. La respuesta endocrina y neurovegetativa -- 3.2. …”
    Libro electrónico
  13. 4553
    Publicado 2018
    Tabla de Contenidos: “…The case study of Tor Vergata (Rome, Italy) -- chapter New ornaments’ influence on the character of modern cities -- part, History and arts -- chapter Arabian urban text art: Between cultural identity and artistic identity -- chapter The remaining houses of the two pearl merchants Ahmed Munawar Rifai and Hussein Bin Yahiya Rifai in the Farasan Islands in the 14th century AH/20th century AD: A study of aesthetic and artistic values -- part, City as an organism -- part, Architecture -- chapter Architecture of the 21st century museum as a catalytic phenomenon in the evolving cultural identity of a city -- chapter Conserving historical areas through the roles of main cities: Urban identity in the era of globalisation -- chapter Entrance gateway of Kerala temples: Assessing the form of a Kerala temple gopuram through material and construction -- chapter Expression of cultural identity in the contemporary urban built form of Kathmandu -- chapter Reimagining city identity through safe and sustainable public environments -- chapter Smart grids, smart cities, interior spaces and human behaviour: An interactive development process -- part, History and arts -- chapter Identity in transformation of rural Egyptian villages -- chapter Metaphysics and identity in architecture: Peter Eisenman’s Wexner Center for the Arts as case study -- chapter Immersing the landscape in its music: The case of iso-polyphony in South Albania -- chapter The changing image of Istanbul through its monuments (1923–1973) -- chapter The cumulative effect of an interdisciplinary project -- chapter Unearthing the spatial archetypes of two indigenous South Asian cities: The walled city of Old Delhi and Old Dhaka -- part, Planning and approaching the city…”
    Libro electrónico
  14. 4554
    Publicado 2020
    Tabla de Contenidos: “…Modifications de l'occupation des sols en France, en Irlande, au Mexique et en Nouvelle-Zélande -- 3 Des stratégies et des plans nationaux cohérents pour une utilisation durable des terres -- Influence des accords multilatéraux sur les stratégies nationales -- Autres accords et instances -- Cohérence des stratégies et plans d'action nationaux touchant à l'utilisation des terres -- Objectifs d'atténuation des GES figurant dans les CDN et les SDFE et présence d'éléments de la problématique de l'utilisation des terres -- Présence d'éléments de la problématique de l'utilisation des terres dans les SPANB -- Présence d'éléments de la problématique de l'utilisation des terres dans les plans de développement agricole -- Présence d'éléments de la problématique de l'utilisation des terres dans les plans nationaux de développement (ou les stratégies équivalentes)…”
    Libro electrónico
  15. 4555
    por Loshin, Peter
    Publicado 2013
    Tabla de Contenidos: “…1.6.7 Business People and IT Professionals1.6.8 Others; 1.6.9 The Benefit of Having Diverse Users; 1.7 How Do I Use Tor; 1.7.1 Plan Ahead and Learn Tor Now; 1.7.2 TBB or Tails; 1.7.3 Tor Browser Bundle; 1.7.4 Tails; 1.7.5 What Can Go Wrong; 1.8 Using Tor Safely; 1.8.1 Use the Tor Browser; 1.8.2 Don't Open Documents; 1.8.3 Don't Install or Enable Browser Plugins; 1.8.4 Avoid Websites that Are Not HTTPS-Enabled; 1.8.5 Use Bridges/Find Company; 2 Using the Tor Browser Bundle; 2.1 What Is Bundled in the Tor Browser Bundle; 2.1.1 Vidalia; 2.1.2 Tor; 2.1.3 Mozilla Firefox ESR+Torbutton…”
    Libro electrónico
  16. 4556
    Publicado 2016
    Tabla de Contenidos: “…-- Part 1 The Board -- Chapter 1 Meet the Raspberry Pi -- A Trip Around the Board -- Model A/B -- Model A+/B+ -- Raspberry Pi 2 -- Raspberry Pi 3 -- Raspberry Pi Zero -- A Bit of Background -- ARM Versus x86 -- Windows Versus Linux -- Chapter 2 Getting Started with the Raspberry Pi -- Connecting a Display -- Composite Video -- HDMI Video -- DSI Video -- Connecting Audio -- Connecting a Keyboard and Mouse -- Installing NOOBS on an SD Card -- Connecting External Storage -- Connecting the Network -- Wired Networking -- Wireless Networking -- Connecting Power -- Installing the Operating System -- Installing Using NOOBS -- Installing Manually -- Connecting Bluetooth Devices -- Chapter 3 Linux System Administration -- Linux: An Overview -- Linux Basics -- Introducing Raspbian -- About Raspbian's Parent, Debian -- Alternatives to Raspbian -- Using External Storage Devices -- Creating a New User Account -- File System Layout -- Logical Layout -- Physical Layout -- Installing and Uninstalling Software -- Managing Software Graphically -- Managing Software at the Command Line -- Finding the Software You Want -- Installing Software -- Uninstalling Software -- Upgrading Software -- Shutting the Pi Down Safely -- Chapter 4 Troubleshooting -- Keyboard and Mouse Diagnostics -- Power Diagnostics -- Display Diagnostics -- Boot Diagnostics -- Network Diagnostics -- Chapter 5 Network Configuration -- Wired Networking -- Connecting to a Wired Network via the GUI -- Connecting to a Wired Network via the Console -- Testing Your Connectivity -- Wireless Networking -- Connecting to a Wireless Network via the GUI…”
    Libro electrónico
  17. 4557
    Publicado 2014
    Tabla de Contenidos: “…Systemically Important Financial Institutions (SIFI) The Universal Banking Model Separation Models United Kingdom United States European Union Switzerland The Volcker Rule and Proprietary Trading 15 Too Big To Fail (TBTF): Is Size the Problem? …”
    Libro electrónico
  18. 4558
    Publicado 2023
    Tabla de Contenidos: “…Large classes -- Switches -- Primitive Obsession -- Middle man -- Message chains -- Feature envy methods -- Divergent change -- Shotgun Surgery -- God object -- Summary -- Further reading -- Chapter 4: Testing -- Why you should test (often) -- Identifying and fixing defects -- Ensuring quality and reliability -- Customer satisfaction -- Compliance and standards -- Security -- Integration and compatibility -- Confidence and peace of mind -- Unit testing -- JUnit framework -- Integration testing -- Mockito -- Contract testing -- Be safe - checking and improving your test coverage -- What is test coverage? …”
    Libro electrónico
  19. 4559
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Table of Contents -- Title Page -- Copyright -- Dedication -- Introduction -- Eight Feedback Styles -- Pushing Past Style to Completion -- Collaboration Is Key -- Note -- 1 Why Feedback Hurts -- How the Human Brain Processes Feedback -- Better Feedback Can Be Learned -- Completion with Kindness -- Notes -- 2 The Good, the Bad, and the Ugly of Review -- Defining the Creator‐Reviewer Relationship -- Good Feedback Is about Feeling Safe -- What Is Kind Review? -- Feedback Is Always Personal -- 3 Receiving Feedback: Tough Skin, Tough Love, or Tough -- Face Your Anxieties -- Learn the Levels of Feedback -- Manage Feedback Before You Burn Out -- 4 Giving Feedback -- Polish the Idea to Make It Shine -- Improve through Process -- Editing Is Not Creating -- Take a Hot Minute and Reflect -- 5 Taste Is an Unconscious Bias -- Feedback Is a Personal Opinion of Quality -- Risk Avoidance Can Be an Unconscious Bias -- Use Taste to Be Inclusive -- 6 Feedback Styles -- The Eight Review Styles -- When Styles Meet -- It's Part of Who You Are -- 7 Kind Collaborator -- Attributes of the Kind Collaborator -- How to Manage a Kind Collaborator -- How to Become a Kind Collaborator -- 8 Perfect Pass‐Through -- Attributes of a Perfect Pass‐Through -- Why a Perfect Pass‐Through Is Dangerous -- How to Manage a Perfect Pass‐Through -- What to Do If You Are a Perfect Pass‐Through -- 9 Vague Vocalist -- Attributes of the Vague Vocalist -- Why the Vague Vocalist Is Dangerous -- How to Manage a Vague Vocalist -- What to Do If You Are a Vague Vocalist -- 10 Land Mine -- Attributes of a Land Mine -- Why a Land Mine Is Dangerous -- How to Manage a Land Mine -- What to Do If You Are a Land Mine -- 11 Silent but Deadly -- Attributes of a Silent but Deadly -- Why a Silent but Deadly Is Dangerous -- How to Manage a Silent but Deadly -- What to Do If You Are a Silent but Deadly…”
    Libro electrónico
  20. 4560
    Publicado 2016
    Tabla de Contenidos: “…Chapter 2 With Power Comes Responsibility: Hewlett-Packard, Target, the Cops, and the NSA Deduce Your Secrets (ethics) 37 How do we safely harness a predictive machine that can foresee job resignation, pregnancy, and crime? …”
    Libro electrónico