 Application of C++ in Computational Cancer ModelingApplication of C++ in Cancer Modeling • The speaker (Ruibo) • University of Washington, department of applied mathematics • Cancer Modeling Group: Evolution of cancer initiation • Group leader:0 码力 | 47 页 | 1.14 MB | 6 月前0.03 Application of C++ in Computational Cancer ModelingApplication of C++ in Cancer Modeling • The speaker (Ruibo) • University of Washington, department of applied mathematics • Cancer Modeling Group: Evolution of cancer initiation • Group leader:0 码力 | 47 页 | 1.14 MB | 6 月前0.03
 Behavioral Modeling in HW/SW Co-design Using C++ CoroutinesEvent Name 1 © 2023 Intel Corporation and Jeffrey E. Erickson cppcon 2023 1cppcon 2023 Behavioral Modeling in HW/SW Co-design using C++ coroutines Jeffrey E Erickson, Ph.D. Sebastian Schönberg, Ph.D.© enabling language feature • To date, coroutines have been about execution and workloads • In the modeling context, coroutines… • Provide syntactic sugar for things like state machines • Look more like Jeffrey E. Erickson cppcon 2023 41 What I hope you can walk away with… • Coroutines are a great modeling tool! • Coroutines make complex code easier to write • You can create complex ‘parallel’ models0 码力 | 44 页 | 584.69 KB | 6 月前3 Behavioral Modeling in HW/SW Co-design Using C++ CoroutinesEvent Name 1 © 2023 Intel Corporation and Jeffrey E. Erickson cppcon 2023 1cppcon 2023 Behavioral Modeling in HW/SW Co-design using C++ coroutines Jeffrey E Erickson, Ph.D. Sebastian Schönberg, Ph.D.© enabling language feature • To date, coroutines have been about execution and workloads • In the modeling context, coroutines… • Provide syntactic sugar for things like state machines • Look more like Jeffrey E. Erickson cppcon 2023 41 What I hope you can walk away with… • Coroutines are a great modeling tool! • Coroutines make complex code easier to write • You can create complex ‘parallel’ models0 码力 | 44 页 | 584.69 KB | 6 月前3
 Back to Basics: Design Patternsdesign patterns 87Unified Modeling Language (UML) A compact way to represent software systems 88What is the Unified Modeling Language (UML)? 89 ● A general-purpose modeling language for software engineers engineers to visualize the design of a system. ○ https://en.wikipedia.org/wiki/Unified_Modeling_Langu age ● Developed around 1994 through 1996. ● Useful for reading other folks work, useful as a0 码力 | 96 页 | 2.10 MB | 6 月前3 Back to Basics: Design Patternsdesign patterns 87Unified Modeling Language (UML) A compact way to represent software systems 88What is the Unified Modeling Language (UML)? 89 ● A general-purpose modeling language for software engineers engineers to visualize the design of a system. ○ https://en.wikipedia.org/wiki/Unified_Modeling_Langu age ● Developed around 1994 through 1996. ● Useful for reading other folks work, useful as a0 码力 | 96 页 | 2.10 MB | 6 月前3
 Real-Time Circuit Simulation With Wave Digital Filters in C++Digital And Nonlinear State Space Formulations", Proc. of DAFX 11, 2008 Kurt Werner, "Virtual Analog Modeling of Audio Circuitry Using Wave Digital Filters", PhD. Dissertation, Stanford University, 2016 C++ achieved the best or 2nd-best score. Code Repository Reference Paper References: "A Wave-Digital Modeling Library for the Faust Programming Language", D. Roosenburg et. al, SMC, 2021 "RT-WDF—A Modular Wave0 码力 | 1 页 | 5.09 MB | 6 月前3 Real-Time Circuit Simulation With Wave Digital Filters in C++Digital And Nonlinear State Space Formulations", Proc. of DAFX 11, 2008 Kurt Werner, "Virtual Analog Modeling of Audio Circuitry Using Wave Digital Filters", PhD. Dissertation, Stanford University, 2016 C++ achieved the best or 2nd-best score. Code Repository Reference Paper References: "A Wave-Digital Modeling Library for the Faust Programming Language", D. Roosenburg et. al, SMC, 2021 "RT-WDF—A Modular Wave0 码力 | 1 页 | 5.09 MB | 6 月前3
 Spring Framwork Data Access v5.3.36 SNAPSHOTor REF Cursor from a SimpleJdbcCall. . . . . . . . . . . . . . . . . . . . . . . . . 112 3.7. Modeling JDBC Operations as Java Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . that represent RDBMS queries, updates, and stored procedures as thread-safe, reusable objects. See Modeling JDBC Operations as Java Objects. This approach is modeled by JDO, although objects returned by define a parameter for the SimpleJdbc classes and also for the RDBMS operations classes (covered in Modeling JDBC Operations as Java Objects) you can use SqlParameter or one of its subclasses. To do so, you0 码力 | 197 页 | 2.76 MB | 1 年前3 Spring Framwork Data Access v5.3.36 SNAPSHOTor REF Cursor from a SimpleJdbcCall. . . . . . . . . . . . . . . . . . . . . . . . . 112 3.7. Modeling JDBC Operations as Java Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . that represent RDBMS queries, updates, and stored procedures as thread-safe, reusable objects. See Modeling JDBC Operations as Java Objects. This approach is modeled by JDO, although objects returned by define a parameter for the SimpleJdbc classes and also for the RDBMS operations classes (covered in Modeling JDBC Operations as Java Objects) you can use SqlParameter or one of its subclasses. To do so, you0 码力 | 197 页 | 2.76 MB | 1 年前3
 Embracing an Adversarial Mindset for Cpp SecurityDrivers (IOCTL) Message Queue SystemsAttack Surface Reduction Know your attack surface • Threat modeling • AttackSurfaceAnalyzer - https://github.com/microsoft/Att ackSurfaceAnalyzer Isolate problematic libImportance of a security-focused mindset Considering security from the start of a project Threat modeling at the design stage Know the trust boundaries Focus on attack vectors Build attacker scenarios0 码力 | 92 页 | 3.67 MB | 6 月前3 Embracing an Adversarial Mindset for Cpp SecurityDrivers (IOCTL) Message Queue SystemsAttack Surface Reduction Know your attack surface • Threat modeling • AttackSurfaceAnalyzer - https://github.com/microsoft/Att ackSurfaceAnalyzer Isolate problematic libImportance of a security-focused mindset Considering security from the start of a project Threat modeling at the design stage Know the trust boundaries Focus on attack vectors Build attacker scenarios0 码力 | 92 页 | 3.67 MB | 6 月前3
 2022年美团技术年货 合辑重信息深度建模。更多详情,大家 可参考团队的 CIKM 论文:Trilateral Spatiotemporal Attention Network for User Behavior Modeling in Location-based Search[23]。 算法 < 61 图 19 基于三边时空注意力机制的用户行为序列网络 在实际建模中,相对于比赛涉及到更多线上部分,而比赛主要专注于离线数据集的精 Boosting[J]. 2016. [23] Qi, Yi, et al. “Trilateral Spatiotemporal Attention Network for User Behavior Modeling in Location-based Search”, CIKM 2021. [24] 广告深度预估技术在美团到店场景下的突破与畅想 . [25] Geurts P . Bias vs Variance Schlichtkrull, Michael, Thomas N. Kipf, Peter Bloem, Rianne van den Berg, Ivan Titov, and Max Welling. “Modeling relational data with graph convolutional networks.” In European semantic web conference, pp. 593-6070 码力 | 1356 页 | 45.90 MB | 1 年前3 2022年美团技术年货 合辑重信息深度建模。更多详情,大家 可参考团队的 CIKM 论文:Trilateral Spatiotemporal Attention Network for User Behavior Modeling in Location-based Search[23]。 算法 < 61 图 19 基于三边时空注意力机制的用户行为序列网络 在实际建模中,相对于比赛涉及到更多线上部分,而比赛主要专注于离线数据集的精 Boosting[J]. 2016. [23] Qi, Yi, et al. “Trilateral Spatiotemporal Attention Network for User Behavior Modeling in Location-based Search”, CIKM 2021. [24] 广告深度预估技术在美团到店场景下的突破与畅想 . [25] Geurts P . Bias vs Variance Schlichtkrull, Michael, Thomas N. Kipf, Peter Bloem, Rianne van den Berg, Ivan Titov, and Max Welling. “Modeling relational data with graph convolutional networks.” In European semantic web conference, pp. 593-6070 码力 | 1356 页 | 45.90 MB | 1 年前3
 Spring Framework 1.2.2 Referencenager ............................................................................... 110 10.4. Modeling JDBC operations as Java objects ............................................................... usage ............................................................................... 230 19.4. Modeling CCI access as operation objects ............................................................... required connection lookup pattern. Note that JTA does not support custom isolation levels! 10.4. Modeling JDBC operations as Java objects The org.springframework.jdbc.object package contains the classes0 码力 | 269 页 | 1.41 MB | 1 年前3 Spring Framework 1.2.2 Referencenager ............................................................................... 110 10.4. Modeling JDBC operations as Java objects ............................................................... usage ............................................................................... 230 19.4. Modeling CCI access as operation objects ............................................................... required connection lookup pattern. Note that JTA does not support custom isolation levels! 10.4. Modeling JDBC operations as Java objects The org.springframework.jdbc.object package contains the classes0 码力 | 269 页 | 1.41 MB | 1 年前3
 Spring Framework 1.2.6 Referencenager ............................................................................... 118 11.4. Modeling JDBC operations as Java objects ............................................................... usage ............................................................................... 249 20.4. Modeling CCI access as operation objects ............................................................... required connection lookup pattern. Note that JTA does not support custom isolation levels! 11.4. Modeling JDBC operations as Java objects The org.springframework.jdbc.object package contains the classes0 码力 | 290 页 | 1.49 MB | 1 年前3 Spring Framework 1.2.6 Referencenager ............................................................................... 118 11.4. Modeling JDBC operations as Java objects ............................................................... usage ............................................................................... 249 20.4. Modeling CCI access as operation objects ............................................................... required connection lookup pattern. Note that JTA does not support custom isolation levels! 11.4. Modeling JDBC operations as Java objects The org.springframework.jdbc.object package contains the classes0 码力 | 290 页 | 1.49 MB | 1 年前3
 Spring Framework 1.2.x Referencenager ............................................................................... 129 11.4. Modeling JDBC operations as Java objects ............................................................... usage ............................................................................... 260 20.4. Modeling CCI access as operation objects ............................................................... required connection lookup pattern. Note that JTA does not support custom isolation levels! 11.4. Modeling JDBC operations as Java objects The org.springframework.jdbc.object package contains the classes0 码力 | 289 页 | 1.50 MB | 1 年前3 Spring Framework 1.2.x Referencenager ............................................................................... 129 11.4. Modeling JDBC operations as Java objects ............................................................... usage ............................................................................... 260 20.4. Modeling CCI access as operation objects ............................................................... required connection lookup pattern. Note that JTA does not support custom isolation levels! 11.4. Modeling JDBC operations as Java objects The org.springframework.jdbc.object package contains the classes0 码力 | 289 页 | 1.50 MB | 1 年前3
共 367 条
- 1
- 2
- 3
- 4
- 5
- 6
- 37














 
 