Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,986
- Engineering & Applied Sciences 2,183
- Development 1,900
- Application software 1,666
- Crítica e interpretación 1,662
- Filosofía 1,560
- Computer Science 1,523
- Història 1,449
- Colecciones 1,377
- Management 1,232
- History 1,193
- Documentos 1,187
- Biblia 1,076
- Traducción al francés 1,059
- Coleccion 1,050
- Parlamento britanico 1,047
- Data processing 909
- Computer networks 832
- Computer programs 818
- Design 798
- Operating systems (Computers) 777
- Bíblia 755
- Web site development 696
- Web sites 688
- Computer software 640
- Patrística 632
- Derechos humanos 624
- Derecho 607
- Cloud computing 596
- Economic conditions 595
-
155741Publicado 2022“…Rooting his vision in history and psychology, Narula argues that humans' intrinsic need for autonomy, accomplishment, and connection can now best be met in virtual "worlds of ideas," in which users will have the chance to create and exchange meaning and value. …”
Libro -
155742por Dewey, Susan“…These ethical challenges include: · Research methodology · Distinguishing research from activism · Navigating the politically and ideologically charged environments in which researchers must remain constantly attuned to the legal and public policy implications of their work · Possibilities for participatory sex work research processes · Strategies for incorporating participants in a variety of collaborative ways Sex work presents a unique set of challenges that are not always well understood by those working outside of anthropology and disciplines closely related to it. This book serves an important function by honestly and openly reviewing strategies for overcoming these ethical challenges with the end goal of producing path-breaking research that actively incorporates the perspectives of research participants on their own terms. …”
Publicado 2013
Libro electrónico -
155743por R., ElakkiyaTabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Part I: Cognitive Analytics in Continual Learning -- Chapter 1 Cognitive Analytics in Continual Learning: A New Frontier in Machine Learning Research -- 1.1 Introduction -- 1.2 Evolution of Data Analytics -- 1.3 Conceptual View of Cognitive Systems -- 1.4 Elements of Cognitive Systems -- 1.5 Features, Scope, and Characteristics of Cognitive System -- 1.6 Cognitive System Design Principles -- 1.7 Backbone of Cognitive System Learning/Building Process -- 1.8 Cognitive Systems vs. AI -- 1.9 Use Cases -- 1.10 Conclusion -- References -- Chapter 2 Cognitive Computing System-Based Dynamic Decision Control for Smart City Using Reinforcement Learning Model -- 2.1 Introduction -- 2.2 Smart City Applications -- 2.3 Related Work -- 2.4 Proposed Cognitive Computing RL Model -- 2.5 Simulation Results -- 2.6 Conclusion -- References -- Chapter 3 Deep Recommender System for Optimizing Debt Collection Using Reinforcement Learning -- 3.1 Introduction -- 3.2 Terminologies in RL -- 3.3 Different Forms of RL -- 3.4 Related Works -- 3.5 Proposed Methodology -- 3.6 Result Analysis -- 3.7 Conclusion -- References -- Part II: Computational Intelligence of Reinforcement Learning -- Chapter 4 Predicting Optimal Moves in Chess Board Using Artificial Intelligence -- 4.1 Introduction -- 4.2 Literature Survey -- 4.3 Proposed System -- 4.3.1 Human vs. …”
Publicado 2024
Libro electrónico -
155744por Beffa, Federico“…The approach is based on the extension of linear systems theory using the Volterra series. In contrast to the few existing treatments, our approach highlights the algebraic structure underlying such systems and is based on Schwartz’s distributions (rather than functions). …”
Publicado 2024
Libro electrónico -
155745Publicado 2024Tabla de Contenidos: “…Part 3: Math and Cryptography in Malware -- Chapter 9: Exploring Hash Algorithms -- Technical requirements -- Understanding the role of hash algorithms in malware -- Cryptographic hash functions -- Applying hashing in malware analysis -- A deep dive into common hash algorithms -- MD5 -- SHA-1 -- Bcrypt -- Practical use of hash algorithms in malware -- Hashing WINAPI calls -- MurmurHash -- Summary -- Chapter 10: Simple Ciphers -- Technical requirements -- Introduction to simple ciphers -- Caesar cipher -- ROT13 cipher -- ROT47 cipher -- Decrypting malware - a practical implementation of simple ciphers -- Caesar cipher -- ROT13 -- ROT47 -- The power of the Base64 algorithm -- Base64 in practice -- Summary -- Chapter 11: Unveiling Common Cryptography in Malware -- Technical requirements -- Overview of common cryptographic techniques in malware -- Encryption resources such as configuration files -- Practical example -- Cryptography for secure communication -- Practical example -- Payload protection - cryptography for obfuscation -- Practical example -- Summary -- Chapter 12: Advanced Math Algorithms and Custom Encoding -- Technical requirements -- Exploring advanced math algorithms in malware -- Tiny encryption algorithm (TEA) -- A5/1 -- Madryga algorithm -- Practical example -- The use of prime numbers and modular arithmetic in malware -- Practical example -- Implementing custom encoding techniques -- Practical example -- Elliptic curve cryptography (ECC) and malware -- Practical example -- Summary -- Part 4: Real-World Malware Examples -- Chapter 13: Classic Malware Examples -- Historical overview of classic malware -- Early malware -- The 1980s-2000s - the era of worms and mass propagation -- Malware of the 21st century -- Modern banking Trojans -- The evolution of ransomware -- Analysis of the techniques used by classic malware…”
Libro electrónico -
155746por Buchner, Barbara“…Both ‘strawman’ proposals foresee an important oversight role from the UNFCCC to serve as recipient of all data, and to co-ordinate the verification and review and/or international consultation and analysis process. …”
Publicado 2011
Capítulo de libro electrónico -
155747Publicado 2022Tabla de Contenidos: “…Table of Contents Understanding the Laravel Web Application Architecture Configuring the RoadRunner Application Server Configuring the Swoole Application Server Building a Laravel Octane Application Reducing Latency and Managing Data with an Asynchronous Approach Using Queues to Apply the Asynchronous Approach in Your Application Configuring the Laravel Octane Application for the Production Environment…”
Libro electrónico -
155748por Davis, Cortney, 1945-“…A surgical mishap led to a series of life-altering and life-threatening complications, resulting in two prolonged hospital stays and a lengthy recovery. …”
Publicado 2015
Libro -
155749por Pfeiffer, Bruce Brooks“…Author Bruce Brooks Pfeiffer, who served as Wright's apprentice during the 1950s, highlights the latest research and gives fresh insights into the work, providing new dates for many of the plans and houses. …”
Publicado 2009
Libro -
155750Publicado 2021“…At once ambitious and intimate, 1000 Years of Joys and Sorrows offers a deep understanding of the myriad forces that have shaped modern China, and serves as a timely reminder of the urgent need to protect freedom of expression"--…”
Libro -
155751por OECD“…Pensions privées et fonds de réserve publics pour les retraites Couverture des régimes de retraite privés Structure institutionnelle des plans de retraite privés Actifs des fonds de pension et des fonds de réserve publics Répartition des actifs des fonds de pension et des fonds de réserve publics Rendement des fonds de pension et des fonds de réserve publics Coûts d'exploitation et frais relatifs aux fonds de pension Coefficients de capitalisation des régimes à prestations définies Chapitre 11. …”
Publicado 2016
Libro electrónico -
155752Publicado 2012“…These findings were not observed in the control group. Wakitani scale was statistically significant between the two groups. …”
Enlace del recurso
Electrónico -
155753Publicado 2018“…The foremost aim of this research topic is to review and contextualize the main observational scenarios following an empirical approach, to present and discuss the accretion scenario, and then to analyze how a closer connection between theory and observation can be achieved, identifying those aspects of our understanding that are still on a shaky terrain and are therefore uncertain knowledge. …”
Libro electrónico -
155754por Zimmermann, Martina. author“…The Poetics and Politics of Alzheimer’s Disease Life-Writing offers an important intervention at a critical time, and deserves to meet with a wide readership.’ - Jane F. …”
Publicado 2017
Libro electrónico -
155755por Le Goff, Hervé“…Le personnage de Mercœur, chef de la Ligue en Bretagne a longtemps excessivement focalisé l’attention : l’ouvrage d’Hervé Le Goff montre que la crise ligueuse y fait intervenir des acteurs très divers. …”
Publicado 2019
Electrónico -
155756por Brenneis, Sara J.“…Brenneis argues that fiction and nonfiction written by a single author and focused on the same historical moment deserve to be read side-by-side. By proposing a literary model that examines these genres together, Genre Fusion gives equal importance to fiction and historiography in Spain. …”
Publicado 2014
Libro electrónico -
155757por Sadun, Erica“…Shower your app with the quality promotion it deserves! Erica Sadun and Steve Sande help you earn strong app reviews that can transform sales from lackluster to blockbuster. …”
Publicado 2013
Libro electrónico -
155758Publicado 2017“…This is well illustrated by the observation that MS patients treated with an anti-CD4 depleting antibody did not gain any clinical benefits whereas removal of several lymphocyte subsets using an anti-CD52 depleting antibody has been shown to impede disease progression. …”
Libro electrónico -
155759Publicado 2018“…The kingfisher, one of the most "exotic" European birds by its colors, has always aroused the wonder of those who manage to observe it. A predator of small fry, it needs, to complete its life cycle, aquatic environments rich in fish and especially soft banks with a vertical or slightly concave profile where it can dig the burrow in which the eggs are laid. …”
Libro electrónico -
155760Publicado 2016“…Recanalization of the occluded arterial vessel using thrombolysis is the only causal therapy available. …”
Libro electrónico