Search alternatives:
code policy » care policy, side policy, wide policy
open code » open core, openmp code, opencv code

201
Published 2009
Springer New York
Table of Contents: ... of correcting codes using extremal graph problems -- New perspectives on optimal transforms of random vectors...

202
Published 2016
Springer International Publishing
Table of Contents: ... -- Information leakage analysis of complex C code and its application to OpenSSL -- Integrated Modeling Workflow...

203
by Vries, Henkjan de, Stjernlöf, Lovisa Stenbäcken
Published 2023
Packt Publishing Ltd.
Table of Contents: ... Wizard -- Using SAML and OpenID Connect applications -- Managing inbound SSO -- IdP discovery -- Summary...

204
by Salecha, Rohit
Published 2023
Apress
Table of Contents: ... Delete Resources -- Appendix B: Destroy on Terraform Cloud -- Appendix C: Code Compatability...

205
Published 2013
Springer Berlin Heidelberg
Table of Contents: .... Hackett --  3. Systemic Valuation of Banks — Interbank Equilibrium and Contagion: G. Hałaj -- 4. An Open...

206
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Policy Awareness for Distributed Mobile Code -- Volume and Entropy of Regular Timed Languages...

207
Published 2023
Springer Nature Switzerland
Table of Contents: ...Non-linear Activation Functions -- Open and Closed-Loop Neural Network Verification using...

208
by Lanham, Micheal
Published 2019
Packt Publishing
Table of Contents: ... PPO ; Coding changes required for control projects; Multiple agent policy; Exercises ; Summary...

209
Published 2021
Springer International Publishing
Table of Contents: ... cloud resources with use of the Proximal Policy Optimization -- An Open-Source Virtualization Layer...

210
by Hassell, Jonathan
Published 2002
O'Reilly
Table of Contents: ...; Basic Operation; More on Proxying; The Accounting Packet Format; Code; Identifier; Length; Authenticator...

211
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Extraction from Large Web Sites -- Efficiently Coding and Querying XML Document -- An Interface for Web Based...

212
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Assessment of Probabilistic Fingerprinting Codes over AWGN Channel -- Validating Security Policy Conformance...

213
Published 2016
Springer International Publishing
Table of Contents: ...Coercion-Resistant Proxy Voting -- A Posteriori Openable Public Key Encryption.-Multicast Delayed...

214
Published 2023
Springer Nature Switzerland
Table of Contents: ...AI for Security -- Classification-Based Anomaly Prediction in XACML Policies -- An Evolutionary...

215
by Bergstra, J. A.
Published 2007
Elsevier
Table of Contents: .... Scheerder) -- 4. XML-Based Network Management (J.W. Hong and M-J. Choi) -- 5. Open Technology (J. Scheerder...

216
by Waters, Billye Sankofa
Published 2016
SensePublishers
Table of Contents: ... Who You Are But…”: Epistemology -- Qualitative Methods -- Ethical Research -- Interviews -- Coding...

217
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment -- Managing...

218
Published 2020
Springer International Publishing
Table of Contents: ... -- High Assurance Systems -- Neural Simplex Architecture -- Strengthening Deterministic Policies...

219
Published 2024
Springer Nature Switzerland
Table of Contents: ... Using OpenCV and Smartphone -- Usefulness of Design Thinking in Polish cultural institutions -- Digital...

220
by Friedman, Avner
Published 1988
Springer New York
Table of Contents: ...-Seidel -- 11.3 The Heat Equation -- 11.4 Open Questions -- 11.5 References -- 12 A Conservation Law Model...