Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 8
- Application software 7
- Engineering & Applied Sciences 5
- Computer networks 4
- Computer programming 4
- Management 4
- Computer Science 3
- Economics 3
- Java (Computer program language) 3
- Python (Computer program language) 3
- Vocational guidance 3
- C (Computer program language) 2
- Client/server computing 2
- Cloud computing 2
- Computer graphics 2
- Computer programs 2
- Design 2
- Digital techniques 2
- Energy industries 2
- Government policy 2
- Internet programming 2
- Investment analysis 2
- Jazz 2
- Mac OS 2
- Machine learning 2
- Marketing 2
- Microsoft .NET Framework 2
- Open source software 2
- Penetration testing (Computer security) 2
- Petroleum reserves 2
-
61Publicado 2023Tabla de Contenidos: “…The SOLID software methodology -- SRP -- Open/closed principle (OCP) -- Liskov substitution principle (LSP) -- Interface segregation principle (ISP) -- Dependency inversion principle (DIP) -- Summary -- Questions -- Further reading -- Chapter 4: Writing Clean Functions -- Technical requirements -- Understanding the difference between OOP and FP -- Explanation of the differences -- Understanding why FP can lead to cleaner functions -- Unclean methods and how they affect software -- FP and clean methods -- FP examples -- Keeping methods small -- Indenting code -- Breaking out of loops -- Avoiding duplication -- Avoiding multiple parameters -- Implementing the SRP -- Handling exceptions in FP -- Adding comments for readability -- XML documentation comments -- Inline comments -- Variable declaration and memory management -- Declaring variables close to their usage -- Disposing of resources -- Applying security in methods, especially in APIs -- Input validation -- Authentication and authorization -- Protecting sensitive data -- Summary -- Questions -- Further reading -- Chapter 5: Exception Handling -- Technical requirements -- Overview of exception handling in C# -- try-catch -- try-catch-finally -- Clean code exception-handling principles -- SRP -- OCP -- DIP -- Best practices for handling exceptions -- Handling the TPL AggregateException exception -- Use await with try-catch inside async methods -- Flatten the exception hierarchy -- Handle individual exceptions -- Handle exceptions as they occur -- Creating custom exceptions and when to use them -- Avoiding common mistakes in exception handling -- Testing exception handling -- Unit testing exception handling -- Integration testing exception handling -- End-to-end testing exception handling -- An employee management example of mocking and unit testing with correct exception handling -- Summary…”
Libro electrónico -
62Publicado 2022Tabla de Contenidos: “…Likewise, the LOs for a case should be sequenced beginning with the lowest levels and building toward the more complex lev -- Lack of Alignment of LOs Novice case writers sometimes write LOs that are not tightly linked to the focus of the case or to the discussion questions and subsequent analysis. …”
Libro electrónico -
63Publicado 2017Tabla de Contenidos: “…-- Natural versus On-Camera Inflection -- Setting Your Pace with the Viewer in Mind -- Finishing Your Thoughts -- Using the Power of the Pause -- Pause for You -- Filler Words as Placeholders -- Pause for Them -- The Lowdown on Uptalk -- The Most Common Uptalk Trouble Spot -- Chapter Takeaways -- Note -- Chapter 5 P-Physical Factors: On-Camera Movement with Meaning -- On-Camera Gesturing: An Out-of-Body Experience -- Getting Familiar with Frame Size -- Gestures for a Tight Shot -- Gestures for a Medium Shot…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
64Publicado 2024Tabla de Contenidos: “…6.3 Strong assumptions made by SOTA attacks -- 6.3.1 The state-of-the-art attacks -- 6.3.2 Strong assumptions -- Assumption 1: Knowledge of BatchNorm statistics -- Assumption 2: Knowing or being able to infer private labels -- 6.3.3 Re-evaluation under relaxed assumptions -- Relaxation 1: Not knowing BatchNorm statistics -- Relaxation 2: Not knowing private labels -- 6.4 Defenses against the gradient inversion attack -- 6.4.1 Encrypt gradients -- 6.4.2 Perturbing gradients -- 6.4.3 Weak encryption of inputs (encoding inputs) -- 6.5 Evaluation -- 6.5.1 Experimental setup -- 6.5.2 Performance of defense methods -- 6.5.3 Performance of combined defenses -- 6.5.4 Time estimate for end-to-end recovery of a single image -- 6.6 Conclusion -- 6.7 Future directions -- 6.7.1 Gradient inversion attacks for text data -- 6.7.2 Gradient inversion attacks in variants of federated learning -- 6.7.3 Defenses with provable guarantee -- References -- 2 Emerging topics -- 7 Personalized federated learning: theory and open problems -- 7.1 Introduction -- 7.2 Problem formulation of pFL -- 7.3 Review of personalized FL approaches -- 7.3.1 Mixing models -- 7.3.2 Model-based approaches: meta-learning -- 7.3.3 Multi-task learning -- 7.3.4 Weight sharing -- 7.3.5 Clients clustering -- 7.4 Personalized FL algorithms -- 7.4.1 pFedMe -- 7.4.2 FedU -- 7.5 Experiments -- 7.5.1 Experimental settings -- 7.5.2 Comparison -- 7.6 Open problems -- 7.6.1 Transfer learning -- 7.6.2 Knowledge distillation -- 7.7 Conclusion -- References -- 8 Fairness in federated learning -- 8.1 Introduction -- 8.2 Notions of fairness -- 8.2.1 Equitable fairness -- 8.2.2 Collaborative fairness -- 8.2.3 Algorithmic fairness -- 8.3 Algorithms to achieve fairness in FL -- 8.3.1 Algorithms to achieve equitable fairness -- 8.3.2 Algorithms to achieve collaborative fairness…”
Libro electrónico -
65Publicado 2018“…In addition to this, there will be a strong focus on adopting an Infrastructure as Code (IaC) approach using AWS CloudFormation. By the end of this book, you'll not only understand how to run Docker on AWS, but also be able to build real-world, secure, and scalable container platforms in the cloud. …”
Libro electrónico -
66por Das, Lyla B.Tabla de Contenidos: “…Multiprocessor Configurations -- 13.1 | Multiprocessor Systems -- 13.2 | Multiprocessing Using 8086 -- 13.3 | The 8086 and 8089 in a Tightly Coupled Configuration -- 13.4 | Loosely Coupled Configurations and Bus Arbitration -- 13.5 | Bus Arbitration Using the 8289 Bus Arbiter IC -- 13.6 | The Arithmetic Coprocessor 8087 -- Key Points of this chapter -- Questions -- Exercises -- 14. …”
Publicado 2014
Libro electrónico -
67Publicado 2018Libro electrónico
-
68Publicado 2024“…This comprehensive guide is designed for individuals managing tight deadlines, striving for photorealism, and handling typical client revisions inherent to architectural visualization. …”
Libro electrónico -
69por Jonoska, Nataša, 1961-Tabla de Contenidos: “…-- 16 Molecular Vibrations -- 17 Conclusion -- References -- Structures -- Building with DNA: From Curiosity-Driven Research to Practice -- 1 Introduction -- 2 Engineering Cell-Sized DNA Structures -- 2.1 Challenges -- 2.2 Opportunities -- 3 Building Designer DNA Crystals with Atomic Resolutions -- 3.1 Challenges -- 3.2 Opportunities -- 4 Transferring to RNA Structural Design -- 4.1 Challenges -- 4.2 Opportunities -- 5 At the End -- References…”
Publicado 2023
Libro electrónico -
70por Sullivan, LukeTabla de Contenidos: “…Save the operative part of the headline for the very end -- Never use fake names in a headline. (Or copy. …”
Publicado 2012
Libro electrónico -
71Publicado 2017Libro electrónico
-
72Publicado 2023“…In the quest to develop robust, professional-grade software with Python and meet tight deadlines, it’s crucial to have the best tools at your disposal. …”
Libro electrónico -
73
-
74Publicado 2023Libro electrónico
-
75Publicado 2024Libro electrónico
-
76Publicado 2022“…PyCharm is a dedicated Python Integrated Development Environment (IDE) providing a wide range of essential tools for Python developers, tightly integrated to create a convenient environment for productive web and data science development. …”
Video -
77Publicado 2016“…Their quiescence or activation are tightly regulated by common signalling pathways that often recapitulate those happening during embryonic development, and thus it is important to understand their regulation not only in postnatal life, but also during foetal development. …”
Libro electrónico -
78Publicado 2007“…Access 2007 is tightly integrated with SharePoint. This Short Cut provides readers with everything that they need to know about working with Access 2007 and SharePoint. …”
Libro electrónico -
79Publicado 2022“…You'll also learn about COVID-19 pandemic-specific cyber failures and understand the cyber risks involved with working from home. By the end of this Kali Linux book, you will have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies. …”
Libro electrónico -
80Publicado 2019“…directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, understood pentesting and hacking techniques employed on embedded peripheral devices. …”
Libro electrónico