Search Results - (((((((ant OR anti) OR mkantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 42
- Data processing 40
- Mathematics 32
- Mathematical models 31
- Machine learning 26
- artificial intelligence 26
- Algorithms 25
- algorithms 24
- Mathematical optimization 23
- Technological innovations 23
- Data mining 21
- Computer networks 18
- Artificial Intelligence 17
- Computer algorithms 17
- Information technology 16
- Big data 14
- Diseases 14
- Research 14
- Social aspects 14
- methods 14
- Management 13
- Development 12
- Data Mining 11
- History 11
- Application software 10
- Computer simulation 10
- Design and construction 10
- Electronic data processing 10
- Neural networks (Computer science) 10
- Security measures 10
Search alternatives:
- ant »
- anti »
- mkantis »
- cantor »
-
281
Cryptography 101 : From Theory to Practice.
Published 2021Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
Full text (MFA users only)
Electronic eBook -
282
Hands-On Automated Machine Learning : a beginner's guide to building automated machine learning systems using AutoML and Python.
Published 2018Table of Contents: “…; Why use AutoML and how does it help?; When do you automate ML?; What will you learn?; Core components of AutoML systems; Automated feature preprocessing; Automated algorithm selection; Hyperparameter optimization; Building prototype subsystems for each component; Putting it all together as an end-to-end AutoML system; Overview of AutoML libraries; Featuretools; Auto-sklearn; MLBox; TPOT; Summary.…”
Full text (MFA users only)
Electronic eBook -
283
Innovations in Material Science, Applied Mechanics, Control and Information Technologies
Published 2015Table of Contents: “…Identifying Significant Control Factors of Particle Swarm Optimization Algorithms in Solving Permutation Flowshop Scheduling Problems; Energy Optimal Control of PMSM Drive for Time-Varying Load Torque; Anti-Theft and Temperature Control of Car Wheel; The Measurement of the Fatigue Crack-Tip Displacement and Strain Fields under High Frequency Resonant Loading Applying DIC Method; Comparative Investigation of an Automated Oceanic Wave Surface Glider Robot Influence on Resistance Prediction Using CFD Method; Optimal the Multiple Performances in EDM for SKH57 Using Grey Relational Analysis.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
284
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
285
-
286
Swift 2 design patterns : build robust and scalable iOS and Mac OS X game applications
Published 2015Full text (MFA users only)
Electronic eBook -
287
-
288
Bladder Cancer : diagnosis and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
289
Selected papers of Alan Hoffman with commentary
Published 2003Table of Contents: “…Fulkerson and Rosa Oppenheim -- A generalization of max flow-min cut -- On lattice polyhedra III: blockers and anti-blockers of lattice clutters -- Local unimodularity in the matching polytope / with Rosa Oppenheim -- A fast algorithm that makes matrices optimally sparse / with S. …”
Full text (MFA users only)
Electronic eBook -
290
-
291
The Theory of Critical Phenomena : an Introduction to the Renormalization Group.
Published 1992Table of Contents: “…4.2.2 General structure of numerical algorithms -- 4.3 Monte Carlo methods -- 4.3.1 The Metropolis algorithm -- 4.4 Molecular dynamics -- 4.4.1 Ergodicity and integrability -- 4.4.2 From microcanonical to canonical averages -- 4.5 Langevin equations -- 4.5.1 Comparison of the Langevin and molecular-dynamics methods -- 4.6 Independence of configurations -- 4.6.1 Correlations along the path -- 4.6.2 Critical slowing down -- 4.6.3 The Swendsen-Wang algorithm -- 4.6.4 The Wolff algorithm -- 4.7 Calculation of critical exponents from simulations -- Problems -- 5 Real-space renormalization.…”
Full text (MFA users only)
Electronic eBook -
292
Constraint Solving over Multi-valued Logics : Application to Digital Circuits.
Published 2002Full text (MFA users only)
Electronic eBook -
293
Robotic Control for Industrial and Service Applications
Published 2018Table of Contents: “…Cover; Guest editorial; Robot learning human stiffness regulation for hybrid manufacture; Neurodynamics-based leader-follower formation tracking of multiple nonholonomic vehicles; Visual servoing of dynamic wheeled mobile robots with anti-interference finite-time controllers; Fuzzy model predictive control for 2-DOF robotic arms; Design of the tip state estimator for hybrid-structured flexible manipulator based on SDFT and FLAKF; Nonlinear time-optimal trajectory planning for varying-rope-length overhead cranes…”
Full text (MFA users only)
Electronic eBook -
294
-
295
Social sensing : building reliable systems on unreliable data
Published 2015Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
Full text (MFA users only)
Electronic eBook -
296
Synthetic Impulse and Aperture Radar (SIAR) : a Novel Multi-Frequency MIMO Radar.
Published 2014Table of Contents: “…Cover; Title Page; Copyright; Contents; About the Authors; Preface; Acknowledgments; Chapter 1 Introduction; 1.1 Development of Modern Radar; 1.2 Basic Features of SIAR; 1.3 Four Anti Features of SIAR; 1.3.1 Anti-stealth of SIAR; 1.3.2 Anti-reconnaissance of SIAR; 1.3.3 Anti-ARM of SIAR; 1.3.4 Anti-interference of SIAR; 1.4 Main Types of MIMO Radar; 1.5 SIAR and MIMO Radar; 1.6 Organization of This Book; References; Chapter 2 Radar Common Signal Waveform and Pulse Compression; 2.1 Mathematical Form and its Classification of Radar Signal; 2.1.1 Signal Mathematical Form.…”
Full text (MFA users only)
Electronic eBook -
297
Computing the homology of the lambda algebra
Published 1985Table of Contents: “…Corollaries to the structure formulas""; ""2.6. Tri-grading when p is odd""; ""2.7. The endomorphism Î?""; ""2.8. …”
Full text (MFA users only)
Electronic eBook -
298
Cystic Tumors of the Pancreas : Diagnosis and Treatment
Published 2016Full text (MFA users only)
Electronic eBook -
299
More and different : notes from a thoughtful curmudgeon
Published 2011Full text (MFA users only)
Electronic eBook -
300
Advances in material engineering and mechanical engineering : selected, peer reviewd papers from the International Conference on Material Engineering and Mechanical Engineering, Au...
Published 2011Table of Contents: “…Experimental Studies and Technology Process on Phosphor-Gypsum Decomposition for Producing Sulfuric Acid and LimeCRH VIP Seats Human-Machine Scale Analysis; Air Combat Situation Assessment by Gray Fuzzy Bayesian Network; The Research on Chaotic Signal Tracking Algorithm for SR-UKF-PF; Integrated Guidance, Control and Maneuver for Anti-Vessel Missiles Based on Backstepping Method; Integrate Uncertainty in the Process of Prognostics for Electronics; Keywords Index; Authors Index…”
Full text (MFA users only)
Electronic Conference Proceeding eBook