Computer Science
epub |eng | | Author:Aneesh Sreevallabh Chivukula & Xinghao Yang & Bo Liu & Wei Liu & Wanlei Zhou

5.3 Adversarial Reinforcement Learning Reinforcement machine learning is the study of intelligent agents and their actions in a simulated environment such that a notion of cumulative reward is maximized in ...
( Category: Artificial Intelligence June 16,2023 )
epub |eng | 2023-04-19 | Author:Michal Kvet

Summary In this chapter, you got familiar with the existing functionalities in DBS Oracle, mostly related to day and month granularity. We emphasized the ADD_MONTHS and MONTH_BETWEEN functions for dealing ...
( Category: Database Storage & Design June 14,2023 )
epub |eng | 2023-03-28 | Author:John Mertic

Knows the code base well Organized Understands the technology Good communicator and writer Can debug issues Problem solver Good software development skills Curious thinker Table 7.1 – Technical skills versus ...
( Category: Software Design & Engineering June 14,2023 )
epub |eng | 2022-08-14 | Author:Dylan Shields; [Shields, Dylan]

6.3.2 Stepping up protection with Shield Advanced When would you want to upgrade to Shield Advanced? Generally, this would be when you’re at risk of very large DDoS attacks from ...
( Category: Networking June 13,2023 )
epub |eng | 2021-10-07 | Author:Mark Coeckelbergh [Coeckelbergh, Mark]

While McQuillan’s way of seeing AI sounds too deterministic and risks unnecessarily assuming a strict opposition between humans and technology (humans also play a role), there is a significant danger ...
( Category: Artificial Intelligence June 13,2023 )
epub |eng | 2022-11-29 | Author:Angelika Klidas, Kevin Hanegan

Figure 8.1 – COVID-19-related questions Insights from data can be useful in making sense of the COVID-19 information and answers that we need when we take the time and read ...
( Category: Database Storage & Design June 13,2023 )
pdf |en | | Author: Paolo Ferragina

( Category: Programming Languages June 13,2023 )
epub |eng | 2022-12-02 | Author:Ravindranatha Anthapu

Figure 6.12 – Usage of list comprehensions and the reduce function We can see from the result that we can get a single by filtering the list for even numbers ...
( Category: Database Storage & Design June 13,2023 )
epub |eng | 2022-12-30 | Author:Mani Khanuja | Farooq Sabir | Shreyas Subramanian | Trenton Potgieter

Figure 7.6 – Specifying the container for model training along with training and validation data path in S3 As shown in Figure 7.7, we need to define the estimator, the ...
( Category: Artificial Intelligence June 13,2023 )
epub |eng | 2021-12-14 | Author:Shreyas Subramanian & Stefan Natu [Subramanian, Shreyas & Natu, Stefan]

Although in some cases you may have prior business knowledge about the number of clusters, in many problems, that is not usually the case. So, you need to determine the ...
( Category: Artificial Intelligence June 12,2023 )
epub |eng | 2023-05-06 | Author:Smyth, Neil;

( Category: Object-Oriented Software Design June 11,2023 )
epub |eng | | Author:Marc G. Bellemare;Will Dabney;Mark Rowland;

where as before θ1, …, θm denotes the locations of the m particles whose probabilities are parameterized in ℱC,m. The isometry ℐ maps return functions to elements of ℝ𝒳×m describing ...
( Category: Artificial Intelligence May 29,2023 )

Popular ebooks
Developing Robust Date and Time Oriented Applications in Oracle Cloud by Michal Kvet(7071)
Practical Guide to Azure Cognitive Services by Chris Seferlis & Christopher Nellis & Andy Roberts(6205)
Unity Artificial Intelligence Programming - Fifth Edition by Dr. Davide Aversa(5799)
Serverless ETL and Analytics with AWS Glue by Vishal Pathak Subramanya Vajiraya Noritaka Sekiyama Tomohiro Tanaka Albert Quiroga Ishan Gaur(4835)
Open Source Projects - Beyond Code by John Mertic(3909)
The AI Product Manager's Handbook by Irene Bratsis(3874)
Graph Data Modeling in Python by Gary Hutson and Matt Jackson(3865)
Cloud Auditing Best Practices by Shinesa Cambric & Michael Ratemo(3504)
Aligning Security Operations with the MITRE ATT&CK Framework by Rebecca Blair(3478)
Graph Data Processing with Cypher by Anthapu Ravindranatha;(1674)
Data Literacy in Practice - A complete guide to data literacy and making smarter decisions with data through intelligent actions (2022) by Packt(1651)
Serverless Machine Learning with Amazon Redshift ML: Create, train, and deploy machine learning models using familiar SQL commands by Debu Panda Phil Bates Bhanu Pittampally Sumeet Joshi(1547)
Network Automation with Go by Nicolas Leiva & Michael Kashin(1502)
Applied Machine Learning and High-Performance Computing on AWS by Mani Khanuja | Farooq Sabir | Shreyas Subramanian | Trenton Potgieter(1314)
Data Literacy in Practice by Angelika Klidas Kevin Hanegan(1311)
Unreal Engine 5 Game Development with C++ Scripting by Zhenyu George Li(1305)
Graph Data Processing with Cypher by Ravindranatha Anthapu(1296)
Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA by Marco Fanti(1179)
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU by Antonio Nappa Eduardo Blazquez(1168)
The AI Product Manager's Handbook: Develop a product that takes advantage of machine learning to solve AI problems by Irene Bratsis(1024)