Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
What is the use of -n and -p options?
asked
Jul 26, 2023
in
Perl
by
rahuljain1
perl-options
0
votes
Is it a good idea to use CNN to classify 1D signal?
asked
Jul 21, 2023
in
Deep Learning
by
rahuljain1
cnn
0
votes
What is the Memcached telnet command's basic syntax?
asked
Jul 28, 2023
in
MemCached
by
sharadyadav1986
memcachedtelnetcommand
0
votes
How are transformers trained, and what is the role of pre-training and fine-tuning?
asked
Jul 21, 2023
in
Deep Learning
by
rahuljain1
transformerstrained
+1
vote
What are the advantages of Java Design Patterns?
asked
Jul 23, 2023
in
Design Patterns
by
Robindeniel
advantages
javadesignpatterns
0
votes
What are design patterns?
asked
Jul 23, 2023
in
Design Patterns
by
Robindeniel
design
patterns
0
votes
Describe the process of generating text using a transformer-based language model.
asked
Jul 21, 2023
in
Deep Learning
by
rahuljain1
text-generation
0
votes
What is self-attention, and how does it work in transformers?
asked
Jul 21, 2023
in
Deep Learning
by
rahuljain1
self-attention
deep-learning
0
votes
What do you mean by context of a subroutine?
asked
Jul 27, 2023
in
Perl
by
SakshiSharma
pel-subroutine
0
votes
What are the advantages of c over Perl?
asked
Jul 27, 2023
in
Perl
by
SakshiSharma
perl-advantages
0
votes
What is an Observer Design Pattern?
asked
Jul 24, 2023
in
Design Patterns
by
SakshiSharma
observerdesignpattern
0
votes
The ____ command in Memcached is used to add data to an existing key.
asked
Jul 28, 2023
in
MemCached
by
sharadyadav1986
memcached-add-data
0
votes
What is transformer architecture, and why is it widely used in natural language processing tasks?
asked
Jul 21, 2023
in
Deep Learning
by
rahuljain1
naturallanguageprocessingtasks
+1
vote
how Neo4j can be helpful in detecting Brute Force Attack?
asked
Jan 25, 2023
in
Neo4j
by
sharadyadav1986
neo4j
brute-force-attack
+1
vote
What is the difference between Neo4J Graph Database and MySQL?
asked
Jan 24, 2023
in
Neo4j
by
sharadyadav1986
neo4j
graph-database
+2
votes
Software that is secure on a given platform, environment, and threat landscape can be considered secure in any other platform, environment or threat landscape.
asked
Feb 15, 2022
in
SSA Audits
by
sharadyadav1986
secue-software
platform
envionment
0
votes
For a situation in programming, how can you determine that Perl is a suitable?
asked
Jul 26, 2023
in
Perl
by
rahuljain1
perl-programming
0
votes
Is Memcached Open-source?
asked
Jul 28, 2023
in
MemCached
by
sharadyadav1986
memcachedopen-source
0
votes
Here are the equations for the GRU and the LSTM: From these, we can see that the Update Gate and Forget Gate in the LSTM play a role similar to _______ and ______ in the GRU. What should go in the the blanks?
asked
Jul 19, 2023
in
Deep Learning
by
SakshiSharma
deeplearning
0
votes
Which statement is a value from the Agile Manifesto?
asked
Mar 3, 2020
in
Agile
by
emanuela.scavizzi
#safe-agile
#agile-vs-scrum
#scaled-agile-framework
Page:
« prev
1
...
373
374
375
376
377
378
379
380
381
382
383
...
1000
next »
...