Search Results - (((((((ant OR alter) OR mantis) OR wind) OR cantor) OR anne) OR plans) OR wantis) algorithms.

  1. 41
  2. 42
  3. 43
  4. 44

    Handbook of Satisfiability : Handbook of Satisfiability. by Biere, A.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  5. 45

    Empathic space : the computation of human-centric architecture

    Published 2014
    Table of Contents: “…Exhaustive Enumeration of Small Rectangular PlansEnumeration of Built Forms: An 'Archetypal Building'; An 'Architectural Morphospace'; The Deep Structure of the Picturesque; Form as Process; The Failure of the Top-Down Approach; Thinking Algorithmically; Crafting Space: Generative Processes of Architectural Configurations; Space Block Hanoi, 36 Old Streets district, Hanoi, Vietnam; Solutions You Cannot Draw; Bottom-Up Urban Design; Evolutionary Building Design; Reverse Engineering from the Shadow; Recent Projects with Adaptive Architecture; INTERACTIONS IN THE FIELD.…”
    Full text (MFA users only)
    Electronic eBook
  6. 46

    Handbook for pandemic and mass-casualty planning and response

    Published 2012
    Table of Contents: “…Section 2: Principles of Response to Catastrophes with Mass CasualtiesBasics of Terror Medicine; Mass-Casualty Planning and Response; Interoperability within Military Medical Forces in Contemporary NATO Operations; The Complete Protection of a Combat Soldier; Experience from Past Conflicts; Triage Protocols for Critical-Care Patients in Disaster Conditions; Development of Standards of Care for Polytrauma in Multiple-Casualty Incidents; Treatment Algorithms and Hospital Triage in Mass-Casualty Incidents; Guidelines for Limb Amputation and Reconstruction in Mass-Casualty Incidents…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 47
  8. 48

    Turing's vision : the birth of computer science by Bernhardt, Chris

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  9. 49

    Adventures in Raspberry Pi by Philbin, Carrie Anne

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  10. 50
  11. 51
  12. 52

    CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260). by Singh, Glen D.

    Published 2018
    Table of Contents: “…Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA).…”
    Full text (MFA users only)
    Electronic eBook
  13. 53

    The marketing performance blueprint : strategies and technologies to build and measure business success by Roetzer, Paul, 1978-

    Published 2014
    Table of Contents: “…; The Role of Online Education; An Internal Academy Model; Notes; Chapter 5: Propel Growth through Agency Partners; The Marketing Agency Ecosystem; Finding Your Match; Managing the Outsourced Team; Notes; Section III: Marketing Technology; Chapter 6: Create a Connected Customer Experience; It Is Their Journey, Not Yours; The Impact of Automation; Algorithms and Artificial Intelligence; Origins of the Intelligence Engine; Let's Get Contextual; Notes.…”
    Full text (MFA users only)
    Electronic eBook
  14. 54
  15. 55

    Linear programming and network flows by Bazaraa, M. S.

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  16. 56
  17. 57

    Advances in intelligent transportation : system and technology : selected, peer reviewed papers from the 1st International Doctoral Annual Symposium on Intelligent Transportation T...

    Published 2012
    Table of Contents: “…Research on Traffic Characteristics and Traffic Conflicts of the One-Way-Closure Work Zone on FreewayA Dynamic Emergency Evacuation Network Optimization Problem with Crossing Elimination Strategy; A Game Theory Approach for the Operators' Behavior Analysis in the Urban Passenger Transportation Market; Price Transmission Mechanism of Transit Service in City; Transit OD Generation Based on Information Technology; Slow Traffic System Planning Should Pay Attention to Several Issues in Central Area of Cold Region -- Take Harbin for Example…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 58

    The LTE-advanced deployment handbook : the planning guidelines for the fourth generation networks

    Published 2016
    Table of Contents: “…8.9 LTE Access Dimensioning8.10 Ethernet Transport; 8.11 Cloud Computing and Transport; 8.12 Microwave Links; References; Chapter 9: Planning of the LTE-Advanced Radio Network; 9.1 Introduction; 9.2 Overview of Dimensioning; 9.3 Coverage Planning; 9.4 Radio Capacity Planning; 9.5 Frequency Planning; 9.6 Effects of HeNodeB; References; Chapter 10: Optimization of LTE-A; 10.1 Introduction; 10.2 Early Phase Optimization; 10.3 Operational Phase Optimization; 10.4 MIMO; 10.5 SON; 10.6 Adaptive Antenna Systems; References; Chapter 11: Measurements; 11.1 Introduction.…”
    Full text (MFA users only)
    Electronic eBook
  19. 59
  20. 60