Computer Science
epub |eng | 2019-06-23 | Author:Javier Luraschi

Figure 8-1. Spark processing raw data from a data lakes, databases, and data warehouses To support a broad variety of data sources, Spark needs to be able to read and ...
( Category: Data Mining October 20,2019 )
epub |eng | 0101-01-01 | Author:Jim Highsmith [Highsmith, Jim]

Timeboxed Sizing Agile development has always included the practice of timeboxing—setting a fixed time limit to overall development efforts and letting other characteristics such as scope vary. However, timeboxing can ...
( Category: Agile October 19,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton

In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category: Network Security October 19,2019 )
epub |eng | 2019-04-16 | Author:Joseph M. Reagle Jr. [Jr., Joseph M. Reagle]

6 Hacking Health In September 2008 a small group of enthusiasts met in the San Francisco home of Kevin Kelly, former executive editor of Wired and Cool Tools wrangler. Kelly ...
( Category: Hacking October 17,2019 )
epub |eng | | Author:Melanie Mitchell

“Without Human Examples or Guidance” Unlike supervised learning, reinforcement learning holds the promise of programs that can truly learn on their own, simply by performing actions in their “environment” and ...
( Category: Intelligence & Semantics October 16,2019 )
epub |eng | 2014-02-23 | Author:Martyn Amos

Figure 5.1: Lipton’s graph representation for a three-bit binary string Each node has two edges emanating from it, labelled either 1 or 0 (the edges leading out of node C ...
( Category: Cybernetics October 14,2019 )
epub |eng | 2019-10-01 | Author:Eben Hewitt

Eventing The most basic form of asynchronous processing is publisher/subscriber, or pub/sub. One component, the event producer, publishes an event to a queue or topic. A queue, here, stores that ...
( Category: Software Development October 13,2019 )
epub |eng | 2019-10-07 | Author:Stuart Russell

Reasons for Caution You may find the Partnership on AI’s promises of cooperation on AI safety less than reassuring if you have been following progress in self-driving cars. That field ...
( Category: Intelligence & Semantics October 11,2019 )
epub |eng | 2019-02-28 | Author:Yuxi (Hayden) Liu; [Неизв.]

( Category: Machine Theory October 11,2019 )
epub |eng | 2019-05-14 | Author:Avimanyu Bandyopadhyay

// Setup input values for (i = 0; i < N - 1; ++i) { p[i] = 24.0; q[i] = 12.0; } // Copy inputs to device hipMemcpy(gpu_p, p, size, ...
( Category: Systems Analysis & Design October 11,2019 )
epub |eng | 2019-07-24 | Author:Flynn Coleman

The sooner we confront our situation and realize that there is nothing we can do to save ourselves, the sooner we can get down to the difficult task of adapting, ...
( Category: Intelligence & Semantics October 10,2019 )
epub |eng | 2018-09-12 | Author:Mather, Bob [Mather, Bob]

That little arrow on top represents this as a vector, but now… which vectors and don’t vectors come in pairs? Let’s address the “pairs” theory because you are technically right ...
( Category: Machine Theory October 9,2019 )
epub |eng | 2018-09-12 | Author:Marlow, Keith [Marlow, Keith]

#4 Zombie PII Definition : Keeping PII in a system or service on the basis that it might prove useful in the future. Where on examination the information is either ...
( Category: Systems Analysis & Design October 9,2019 )
epub |eng | 2015-09-14 | Author:Louis Rosenfeld

Stemming tools Stemming tools allow users to enter a term (e.g., “lodge”) and retrieve documents that contain variant terms with the same stem (e.g., “lodging,” “lodger”). Natural language processing tools ...
( Category: Internet, Groupware, & Telecommunications October 8,2019 )