Mostrando 38,501 - 38,520 Resultados de 40,516 Para Buscar 'v.2. nº1.', tiempo de consulta: 1.32s Limitar resultados
  1. 38501
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Introduction to Shaders in Unity -- Rendering -- Game Data -- The Vertex Shader -- The Fragment Shader -- Unity's Render Pipelines -- Shader Graph -- Summary -- Chapter 2: Math for Shader Development -- Vectors -- Position and Direction Vectors -- Vector Addition and Subtraction -- Scalar Multiplication -- Vector Magnitude -- Vector Normalization -- Basis Vectors and Linear Combinations -- Dot Product -- Cross Product -- Matrices -- Matrix Addition and Subtraction -- Scalar Multiplication -- Square, Diagonal, and Identity Matrices -- Matrix Transpose -- Matrix Determinant -- Matrix Multiplication -- Matrix Inverse -- Matrix Transformations -- Scaling Matrices -- Rotation Matrices -- Translation Matrices -- Homogeneous Coordinates -- Space Transformations -- Object-to-World Space Transformation -- World-to-View Space Transformation -- View-to-Clip Space Transformation -- Perspective Divide -- Summary -- Chapter 3: Your Very First Shader -- Project Setup -- Creating a Project -- Setting Up the Scene -- Writing a Shader in Unity -- Writing ShaderLab Code -- Adding a SubShader -- SubShader Tags -- Adding a Pass -- Pragma Directives and Includes -- Controlling Data Flow with Structs -- The appdata Struct -- The v2f Struct -- Variables in HLSL -- The Vertex Shader -- The Fragment Shader -- The SRP Batcher and Constant Buffers -- Common Shader Syntax -- Scalar Types -- Vector Types -- Matrix Types -- Included Variables -- Transformation Matrices -- Time-Based Variables -- Summary -- Chapter 4: Shader Graph -- Shader Graph Overview -- Creating a Basic Shader in Shader Graph -- Scene Setup -- The Shader Graph Interface -- The Toolbar -- Togglable Windows -- The Graph Environment -- Adding Properties -- Property Naming…”
    Libro electrónico
  2. 38502
  3. 38503
    por Bozio, Tommaso, 1548-1610
    Publicado 1598
    Libro
  4. 38504
  5. 38505
  6. 38506
  7. 38507
  8. 38508
  9. 38509
    por Colón, Hernando
    Publicado 1529
    Manuscrito
  10. 38510
    Publicado 2024
    Tabla de Contenidos: “…Poisoning-assisted inference -- Attack scenarios -- Mitigations -- Example attribute inference attack -- Membership inference attacks -- Statistical thresholds for ML leaks -- Label-only data transferring attack -- Blind membership inference attacks -- White box attacks -- Attack scenarios -- Mitigations -- Example membership inference attack using the ART -- Summary -- Chapter 10: Privacy-Preserving AI -- Privacy-preserving ML and AI -- Simple data anonymization -- Advanced anonymization -- K-anonymity -- Anonymization and geolocation data -- Anonymizing rich media -- Differential privacy (DP) -- Federated learning (FL) -- Split learning -- Advanced encryption options for privacy-preserving ML -- Secure multi-party computation (secure MPC) -- Homomorphic encryption -- Advanced ML encryption techniques in practice -- Applying privacy-preserving ML techniques -- Summary -- Part 4: Generative AI and Adversarial Attacks -- Chapter 11: Generative AI - A New Frontier -- A brief introduction to generative AI -- A brief history of the evolution of generative AI -- Generative AI technologies -- Using GANs -- Developing a GAN from scratch -- WGANs and custom loss functions -- Using pre-trained GANs -- Pix2Pix -- CycleGAN -- Pix2PixHD -- Progressive Growing of GANs (PGGAN) -- BigGAN -- StarGAN v2 -- StyleGAN series -- Summary -- Chapter 12: Weaponizing GANs for Deepfakes and Adversarial Attacks -- Use of GANs for deepfakes and deepfake detection -- Using StyleGAN to generate convincing fake images -- Creating simple deepfakes with GANs using existing images -- Making direct changes to an existing image -- Using Pix2PixHD to synthesize images -- Fake videos and animations -- Other AI deepfake technologies -- Voice deepfakes -- Deepfake detection -- Using GANs in cyberattacks and offensive security -- Evading face verification…”
    Libro electrónico
  11. 38511
    Publicado 1768
    Libro
  12. 38512
  13. 38513
    por Manzano, José (O.P.)
    Publicado 1732
    Libro
  14. 38514
  15. 38515
  16. 38516
  17. 38517
  18. 38518
    Libro
  19. 38519
    Libro
  20. 38520