Search Results - (((((((ant OR anti) OR mkantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 281

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
    Full text (MFA users only)
    Electronic eBook
  2. 282

    Hands-On Automated Machine Learning : a beginner's guide to building automated machine learning systems using AutoML and Python. by Das, Sibanjan

    Published 2018
    Table of Contents: “…; Why use AutoML and how does it help?; When do you automate ML?; What will you learn?; Core components of AutoML systems; Automated feature preprocessing; Automated algorithm selection; Hyperparameter optimization; Building prototype subsystems for each component; Putting it all together as an end-to-end AutoML system; Overview of AutoML libraries; Featuretools; Auto-sklearn; MLBox; TPOT; Summary.…”
    Full text (MFA users only)
    Electronic eBook
  3. 283

    Innovations in Material Science, Applied Mechanics, Control and Information Technologies

    Published 2015
    Table of Contents: “…Identifying Significant Control Factors of Particle Swarm Optimization Algorithms in Solving Permutation Flowshop Scheduling Problems; Energy Optimal Control of PMSM Drive for Time-Varying Load Torque; Anti-Theft and Temperature Control of Car Wheel; The Measurement of the Fatigue Crack-Tip Displacement and Strain Fields under High Frequency Resonant Loading Applying DIC Method; Comparative Investigation of an Automated Oceanic Wave Surface Glider Robot Influence on Resistance Prediction Using CFD Method; Optimal the Multiple Performances in EDM for SKH57 Using Grey Relational Analysis.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 284

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  5. 285

    Artificial intelligence in society.

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  6. 286
  7. 287

    Helping Children Learn Mathematics.

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  8. 288

    Bladder Cancer : diagnosis and clinical management

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  9. 289

    Selected papers of Alan Hoffman with commentary by Hoffman, Alan J.

    Published 2003
    Table of Contents: “…Fulkerson and Rosa Oppenheim -- A generalization of max flow-min cut -- On lattice polyhedra III: blockers and anti-blockers of lattice clutters -- Local unimodularity in the matching polytope / with Rosa Oppenheim -- A fast algorithm that makes matrices optimally sparse / with S. …”
    Full text (MFA users only)
    Electronic eBook
  10. 290

    Pharmacology in anesthesia practice

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  11. 291

    The Theory of Critical Phenomena : an Introduction to the Renormalization Group. by Binney, J. J.

    Published 1992
    Table of Contents: “…4.2.2 General structure of numerical algorithms -- 4.3 Monte Carlo methods -- 4.3.1 The Metropolis algorithm -- 4.4 Molecular dynamics -- 4.4.1 Ergodicity and integrability -- 4.4.2 From microcanonical to canonical averages -- 4.5 Langevin equations -- 4.5.1 Comparison of the Langevin and molecular-dynamics methods -- 4.6 Independence of configurations -- 4.6.1 Correlations along the path -- 4.6.2 Critical slowing down -- 4.6.3 The Swendsen-Wang algorithm -- 4.6.4 The Wolff algorithm -- 4.7 Calculation of critical exponents from simulations -- Problems -- 5 Real-space renormalization.…”
    Full text (MFA users only)
    Electronic eBook
  12. 292

    Constraint Solving over Multi-valued Logics : Application to Digital Circuits.

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  13. 293

    Robotic Control for Industrial and Service Applications by Wang, Hesheng

    Published 2018
    Table of Contents: “…Cover; Guest editorial; Robot learning human stiffness regulation for hybrid manufacture; Neurodynamics-based leader-follower formation tracking of multiple nonholonomic vehicles; Visual servoing of dynamic wheeled mobile robots with anti-interference finite-time controllers; Fuzzy model predictive control for 2-DOF robotic arms; Design of the tip state estimator for hybrid-structured flexible manipulator based on SDFT and FLAKF; Nonlinear time-optimal trajectory planning for varying-rope-length overhead cranes…”
    Full text (MFA users only)
    Electronic eBook
  14. 294
  15. 295

    Social sensing : building reliable systems on unreliable data by Wang, Dong, Abdelzaher, Tarek, Kaplan, Lance

    Published 2015
    Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
    Full text (MFA users only)
    Electronic eBook
  16. 296

    Synthetic Impulse and Aperture Radar (SIAR) : a Novel Multi-Frequency MIMO Radar. by Chen, Baixiao

    Published 2014
    Table of Contents: “…Cover; Title Page; Copyright; Contents; About the Authors; Preface; Acknowledgments; Chapter 1 Introduction; 1.1 Development of Modern Radar; 1.2 Basic Features of SIAR; 1.3 Four Anti Features of SIAR; 1.3.1 Anti-stealth of SIAR; 1.3.2 Anti-reconnaissance of SIAR; 1.3.3 Anti-ARM of SIAR; 1.3.4 Anti-interference of SIAR; 1.4 Main Types of MIMO Radar; 1.5 SIAR and MIMO Radar; 1.6 Organization of This Book; References; Chapter 2 Radar Common Signal Waveform and Pulse Compression; 2.1 Mathematical Form and its Classification of Radar Signal; 2.1.1 Signal Mathematical Form.…”
    Full text (MFA users only)
    Electronic eBook
  17. 297

    Computing the homology of the lambda algebra by Tangora, Martin C.

    Published 1985
    Table of Contents: “…Corollaries to the structure formulas""; ""2.6. Tri-grading when p is odd""; ""2.7. The endomorphism Î?""; ""2.8. …”
    Full text (MFA users only)
    Electronic eBook
  18. 298

    Cystic Tumors of the Pancreas : Diagnosis and Treatment

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  19. 299
  20. 300

    Advances in material engineering and mechanical engineering : selected, peer reviewd papers from the International Conference on Material Engineering and Mechanical Engineering, Au...

    Published 2011
    Table of Contents: “…Experimental Studies and Technology Process on Phosphor-Gypsum Decomposition for Producing Sulfuric Acid and LimeCRH VIP Seats Human-Machine Scale Analysis; Air Combat Situation Assessment by Gray Fuzzy Bayesian Network; The Research on Chaotic Signal Tracking Algorithm for SR-UKF-PF; Integrated Guidance, Control and Maneuver for Anti-Vessel Missiles Based on Backstepping Method; Integrate Uncertainty in the Process of Prognostics for Electronics; Keywords Index; Authors Index…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook