Networking & Cloud Computing
epub |eng | 2014-12-01 | Author:Andrew Hinton

Figure 13-4. The Shazam mobile app’s primary control is a big simulated button that, when touched, scans the environment for musical patterns An on-screen button is just one way semantic ...
( Category: Information Theory January 17,2020 )
epub |eng | | Author:Michael Cassutt

* * * Down the hall they go, Bruno in front, Ruteb behind him, Wilson in the rear, reversing Bruno’s route of four hours earlier. The other rooms seem deserted. ...
( Category: Historical January 17,2020 )
epub |eng | 2009-04-14 | Author:Ryan Russell & Johnny Long & Timothy Mullen [Russell, Ryan & Long, Johnny & Mullen, Timothy]

In the Beginning… CHAPTER 21 497 It did not take long for her to begin the process anew with the top-tier boards, the regional and world headquarters for the groups ...
( Category: Hacking January 16,2020 )
epub |eng | | Author:Liehuang Zhu, Zijian Zhang & Chang Xu

The privacy-preserving key management(PARK) scheme is proposed in [X]. The privacy-preserving key management scheme uses adaptive key management and revocation to secure customer data from outsiders in the smart grid. ...
( Category: Networking & Cloud Computing January 14,2020 )
epub |eng | 2019-12-26 | Author:Delio D'Anna, Andrew Hayes, Sam Hennessy, Jeremy Leasor, Gobin Sougrakpam & Dániel Szabó

Figure 10.2: Measuring the execution time All that needs to be done is to capture the time when the script starts and ends. Then, we can calculate the duration by ...
( Category: Networking & Cloud Computing January 4,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya

( Category: Network Security January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]

( Category: Network Security January 2,2020 )
epub, pdf |eng | | Author:Wolfgang W. Osterhage

Bibliography 1. I. Papadhopulli, N. Frasheri, Today’s challenges of symbolic execution and search based algorithms for automated structural testing. Open J. Commun. Softw. (2015) 2. W. Osterhage, Automatisierte Verfahren für ...
( Category: Software Development January 2,2020 )
epub |eng | | Author:Abhishek Chopra & Mukund Chaudhary

Where labeling is not required Evidence that can be prepared: Information classification policy and information classification guideline. Who prepares it: The information security team is responsible for preparing the information ...
( Category: Storage & Retrieval January 2,2020 )
epub |eng | 2018-10-30 | Author:Stuart Scott & Gabriel Ramirez [Stuart Scott]

( Category: LAN January 2,2020 )
epub |eng | | Author:Harvinder Atwal

Concept Drift Machine learning and deep learning models learn rules from historical input and output data to make predictions from new input data. The relationship between new input and output ...
( Category: Storage & Retrieval January 2,2020 )
epub |eng | | Author:Basel Solaiman & Éloi Bossé

m(An) = Π(Gn) − Π(Gn + 1), n = 1, 2, …, N − 1. 5.4.1 Transforming a b.p.a into a Possibility Distribution Let m(.) be a mass function on ...
( Category: Networking & Cloud Computing January 2,2020 )
epub |eng | 2018-06-21 | Author:Gus Khawaja [Gus Khawaja]

( Category: Privacy & Online Safety December 27,2019 )
epub, mobi, pdf |eng | 2018-08-03 | Author:Glyn Dewis

NOTETo make it easier to understand blend modes, I’ll talk about them in two parts—namely, the BASE (the bottom layer) and the BLEND (the layer to which the blend mode ...
( Category: Adobe Photoshop December 27,2019 )
epub |eng | | Author:Chris McCord, Bruce Tate, José Valim

( Category: Internet, Groupware, & Telecommunications December 25,2019 )