Computer Science
epub, pdf |eng | | Author:Stephen Smith

Adding with Carry Revisited In Chapter 2, “Loading and Adding,” we gave sample code to add two 64-bit numbers using ADDS and ADC instructions. What was lacking from this example ...
( Category: Hacking October 26,2019 )
epub, azw3, pdf |eng | | Author:Clifford A. Pickover

SEE ALSO Aristotle’s Organon (c. 350 BCE), Tower of Hanoi (1883), Perceptron (1957), Machine Learning (1959), Expert Systems (1965), Fuzzy Logic (1965) Joseph Licklider wrote: “The hope is that . ...
( Category: Robotics & Automation October 25,2019 )
epub |eng | | Author:By Audrey Tam & Matthijs Hollemans & By Matthijs Hollemans & By Chris LaPollo

When you run this code, coremltools goes through the Keras model layer-by-layer and prints its progress. You can also supply metadata, which can be helpful for the users of your ...
( Category: Machine Theory October 24,2019 )
epub |eng | 2019-06-23 | Author:Javier Luraschi

Figure 8-1. Spark processing raw data from a data lakes, databases, and data warehouses To support a broad variety of data sources, Spark needs to be able to read and ...
( Category: Data Mining October 20,2019 )
epub |eng | 0101-01-01 | Author:Jim Highsmith [Highsmith, Jim]

Timeboxed Sizing Agile development has always included the practice of timeboxing—setting a fixed time limit to overall development efforts and letting other characteristics such as scope vary. However, timeboxing can ...
( Category: Agile October 19,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton

In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category: Network Security October 19,2019 )
epub |eng | 2019-04-16 | Author:Joseph M. Reagle Jr. [Jr., Joseph M. Reagle]

6 Hacking Health In September 2008 a small group of enthusiasts met in the San Francisco home of Kevin Kelly, former executive editor of Wired and Cool Tools wrangler. Kelly ...
( Category: Hacking October 17,2019 )
epub, mobi, azw3 |eng | | Author:Melanie Mitchell

“Without Human Examples or Guidance” Unlike supervised learning, reinforcement learning holds the promise of programs that can truly learn on their own, simply by performing actions in their “environment” and ...
( Category: Intelligence & Semantics October 16,2019 )
epub |eng | 2014-02-23 | Author:Martyn Amos

Figure 5.1: Lipton’s graph representation for a three-bit binary string Each node has two edges emanating from it, labelled either 1 or 0 (the edges leading out of node C ...
( Category: Cybernetics October 14,2019 )
epub |eng | 2019-10-01 | Author:Eben Hewitt

Eventing The most basic form of asynchronous processing is publisher/subscriber, or pub/sub. One component, the event producer, publishes an event to a queue or topic. A queue, here, stores that ...
( Category: Software Development October 13,2019 )
epub |eng | 2019-10-07 | Author:Stuart Russell

Reasons for Caution You may find the Partnership on AI’s promises of cooperation on AI safety less than reassuring if you have been following progress in self-driving cars. That field ...
( Category: Intelligence & Semantics October 11,2019 )
epub, pdf |eng | 2019-02-28 | Author:Yuxi (Hayden) Liu; [Неизв.]

( Category: Machine Theory October 11,2019 )
epub, mobi, pdf |eng | 2019-05-14 | Author:Avimanyu Bandyopadhyay

// Setup input values for (i = 0; i < N - 1; ++i) { p[i] = 24.0; q[i] = 12.0; } // Copy inputs to device hipMemcpy(gpu_p, p, size, ...
( Category: Systems Analysis & Design October 11,2019 )
epub |eng | 2019-07-24 | Author:Flynn Coleman

The sooner we confront our situation and realize that there is nothing we can do to save ourselves, the sooner we can get down to the difficult task of adapting, ...
( Category: Intelligence & Semantics October 10,2019 )