Search Results - (((((((ant OR alte) OR wikant) OR data) OR cantor) OR anne) OR walted) OR anti) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 250
- Mathematical models 143
- Mathematics 109
- Artificial intelligence 102
- Machine learning 99
- Algorithms 79
- Data mining 78
- algorithms 74
- artificial intelligence 65
- Computer algorithms 54
- Computer networks 53
- methods 46
- Technological innovations 43
- Data Mining 42
- Big data 41
- Digital techniques 41
- Artificial Intelligence 39
- Computer simulation 39
- Electronic data processing 39
- Mathematical optimization 38
- Statistical methods 38
- Research 37
- Security measures 37
- Signal processing 37
- Bioinformatics 36
- Python (Computer program language) 36
- Information technology 35
- Computer science 34
- Management 32
- Computational Biology 31
Search alternatives:
- ant »
- wikant »
- cantor »
- anti »
- alte »
- walted »
-
41
Introduction to programming : learn to program in Java with data structures, algorithms, and logic /
Published 2018Subjects: “…Data structures (Computer science)…”
Full text (MFA users only)
Electronic eBook -
42
Fuzzy modeling and genetic algorithms for data mining and exploration /
Published 2005Subjects: “…Data mining.…”
Full text (MFA users only)
Electronic eBook -
43
Selected Papers Of Wang Yuan.
Published 2005Subjects: “…Algebraic fields Data processing.…”
Full text (MFA users only)
Electronic eBook -
44
Hyperspectral Data Processing : Algorithm Design and Analysis.
Published 2013Table of Contents: “…HYPERSPECTRAL DATA PROCESSING: Algorithm Design and Analysis; CONTENTS; PREFACE; 1 OVERVIEWAND INTRODUCTION; 1.1 Overview; 1.2 Issues of Multispectral and Hyperspectral Imageries; 1.3 Divergence of Hyperspectral Imagery from Multispectral Imagery; 1.3.1 Misconception: Hyperspectral Imaging is a Natural Extension of Multispectral Imaging; 1.3.2 Pigeon-Hole Principle: Natural Interpretation of Hyperspectral Imaging; 1.4 Scope of This Book; 1.5 Book's Organization; 1.5.1 Part I: Preliminaries; 1.5.2 Part II: Endmember Extraction; 1.5.3 Part III: Supervised Linear Hyperspectral Mixture Analysis.…”
Full text (MFA users only)
Electronic eBook -
45
Theory of randomized search heuristics : foundations and recent developments
Published 2011Table of Contents: “…Runtime Analysis of Evolutionary Algorithms for Discrete Optimization Peter S. Oliveto and Xin Yao; 3. …”
Full text (MFA users only)
Electronic eBook -
46
Synthesis and optimization of DSP algorithms
Published 2004Full text (MFA users only)
Electronic eBook -
47
Learning JavaScript Data Structures and Algorithms : Write complex and powerful JavaScript code using the latest ECMAScript, 3rd Edition.
Published 2018Table of Contents: “…Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: JavaScript -- A Quick Overview; JavaScript data structure and algorithms; Setting up the environment; The minimum setup to work with JavaScript; Using web servers; Node.js http-server; JavaScript basics; Variables; Scope variable; Operators; Truthy and falsy; Functions of the equals operators (== and ===); Control structures; Conditional statements; Loops; Functions; Object-oriented programming in JavaScript; Debugging and tools; Debugging with VSCode; Summary.…”
Full text (MFA users only)
Electronic eBook -
48
A Course in Computational Algebraic Number Theory
Published 1993Subjects: “…Algebra Data processing.…”
Full text (MFA users only)
Electronic eBook -
49
Security of block ciphers : from algorithm design to hardware implementation
Published 2015Table of Contents: “…Basics of Side-Channel Analysis 152 5.2.1 Side Channels of Digital Circuits 152 5.2.2 Goal of Side-Channel Analysis 154 5.2.3 General Procedures of Side-Channel Analysis 155 5.2.4 Profiling versus Non-profiling Side-Channel Analysis 156 5.2.5 Divide-and-Conquer Algorithm 157 5.3 Side-Channel Analysis on Block Ciphers 159 5.3.1 Power Consumption Measurement in Power Analysis 160 5.3.2 Simple Power Analysis and Differential Power Analysis 163 5.3.3 General Key Recovery Algorithm for DPA 164 5.3.4 Overview of Attack Targets 169 5.3.5 Single-Bit DPA Attack on AES-128 Hardware Implementations 181 5.3.6 Attacks Using HW Model on AES-128 Hardware Implementations 186 5.3.7 Attacks Using HD Model on AES-128 Hardware Implementations 192 5.3.8 Attacks with Collision Model & dagger; 199 5.4 Basics of Fault Analysis 203 5.4.1 Faults Caused by Setup-Time Violations 205 5.4.2 Faults.…”
Full text (MFA users only)
Electronic eBook -
50
Color image watermarking : algorithms and technologies
Published 2017Full text (MFA users only)
Electronic eBook -
51
2-D and 3-D image registration for medical, remote sensing, and industrial applications
Published 2005Subjects: “…Image analysis Data processing.…”
Full text (MFA users only)
Electronic eBook -
52
Mining massive data sets for security : advances in data mining, search, social networks and text mining, and their applications to security
Published 2008Subjects: “…Data mining Congresses.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
53
DataFlow supercomputing essentials : algorithms, applications and implementations /
Published 2017Table of Contents: “…Part I: Algorithms -- Implementing Neural Networks by Using the DataFlow Paradigm -- Part II: Applications -- Solving the Poisson Equation by Using Dataflow Technology -- Binary Search in the DataFlow Paradigm -- Part III: Implementations -- Introductory Overview on Implementation Tools -- DataFlow Systems: From Their Origins to Future Applications in Data Analytics, Deep Learning, and the Internet of Things.…”
Full text (MFA users only)
Electronic eBook -
54
Machine Learning and Big Data Concepts, Algorithms, Tools and Applications /
Published 2020Full text (MFA users only)
Electronic eBook -
55
-
56
Visualization in medicine : theory, algorithms, and applications
Published 2007Full text (MFA users only)
Electronic eBook -
57
Stochastic processes in polymeric fluids : tools and examples for developing simulation algorithms
Published 1996Full text (MFA users only)
Electronic eBook -
58
Algorithms unlocked
Published 2013Table of Contents: “…Preface -- What are algorithms and why should you care? -- How to describe and evaluate computer algorithms -- Algorithms for sorting and searching -- A lower bound for sorting and how to beat it -- Directed acyclic graphs -- Shortest paths -- Algorithms on strings -- Foundations of cryptography -- Data compression -- Hard? …”
Full text (MFA users only)
Electronic eBook -
59
Reading machines : toward an algorithmic criticism
Published 2011Full text (MFA users only)
Electronic eBook -
60
Numerical algorithms for personalized search in self-organizing information networks
Published 2010Subjects: “…Algorithms.…”
Full text (MFA users only)
Electronic eBook