Search
Search Results
-
Controlling Flow
In Chapter 4 , you began building ADF pipelines containing more than one activity, controlling their order of... -
Restricted Flow Games
Classical graph problems are defined with respect to plain graphs, namely vertices connected by possibly weighted edges. On the other hand, model... -
Device Flow
In this segment we look at the OAuth2 Device Flow, which is the flow designed for devices with limited input capabilities such as Smart TVs and IoT... -
Implicit Flow
In this segment, we look at the OAuth2 Implicit Flow and the use case it is designed to address, in particular at the needs of JavaScript... -
Business Process Flow
The previous two chapters covered the Cloud Flow and the Desktop Flow, which help with operational process improvement and execution. -
Computational modeling of flow-mediated angiogenesis: Stokes–Darcy flow on a growing vessel network
Tumor angiogenesis, the growth of new blood vessels towards a tumor, plays a critical role in cancer progression. Tumors release tumor angiogenic...
-
Non-local modelling of multiphase flow wetting and thermo-capillary flow using peridynamic differential operator
Interfaces in multiphase flows are affected by surface tension, and when temperature gradients occur in the flow domain, tangential surface tensions...
-
Client Credentials Flow
In this video segment we look at the OAuth2 Client Credentials Flow, which is for access resources that are owned by a client not an application. -
Data-Flow Analysis and Optimisation
Most compilers perform some optimisations on the code that is generated by the main phases of the compiler. These optimisations often follow a common... -
Authorization Code Flow
In this segment we walk through the OAuth2 Authorization Code flow. We look at the GET and POST requests that are made and that data that is sent. -
Network Flow Problems with Electric Vehicles
Electric vehicle (EV) adoption in long-distance logistics faces challenges such as range anxiety and uneven distribution of charging stations. Two... -
Period Extraction for Traffic Flow Prediction
Due to the particularity of “Tourist chartered Buses, Liner Buses and Dangerous Goods Transport Vehicles” (“TLD Vehicles”), traffic accidents will... -
User Data Flow
In this chapter, we will discuss the user data flow in solid-state drive (SSD) firmware. We will start by discussing the write path, which is the... -
OIDC Authorization Code Flow
In this video we walk through the OpenID Connect Authorization Code Flow and introduce the concept of ID tokens. -
U-Flow: A U-Shaped Normalizing Flow for Anomaly Detection with Unsupervised Threshold
In this work, we propose a one-class self-supervised method for anomaly segmentation in images that benefits from both a modern machine learning...
-
Unsupervised Domain Adaptation for Optical Flow Estimation
In recent years, we have witnessed significant breakthroughs of optical flow estimation with the thriving of deep learning. The performance of the... -
Authorization Code Flow with PKCE
In this segment we look at the Authorization Code Flow with PKCE and why we should use it in favour of the Implicit Flow for JavaScript clients. -
Detection and Asynchronous Flow Prediction in a MOOC
Flow is a human psychological state positively correlated to self-efficacy, motivation, engagement, and academic achievement. In a MOOC, flow...
-
Control Flow and Advanced Features
In this chapter, we will discuss the different alert boxes available. Then we will learn about the control flow aspects in Streamlit. We will also... -
MCSketch: An Accurate Sketch for Heavy Flow Detection and Heavy Flow Frequency Estimation
Accurately finding heavy flows in data streams is challenging owing to limited memory availability. Prior algorithms have focused on accuracy in...