Search Results - (((((((ant OR antti) OR semantic) OR mind) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 42
- Data processing 33
- Mathematics 26
- Algorithms 21
- Machine learning 21
- Mathematical models 21
- artificial intelligence 20
- Data mining 18
- Mathematical optimization 18
- Technological innovations 18
- algorithms 18
- Computer science 15
- Computer networks 14
- Information technology 14
- Management 14
- Philosophy 13
- Artificial Intelligence 12
- Big data 11
- Computer algorithms 11
- Neural networks (Computer science) 11
- Social aspects 10
- Science 9
- Computational linguistics 8
- methods 8
- Computer programming 7
- Computer security 7
- Data Mining 7
- Decision making 7
- Logic, Symbolic and mathematical 7
- Natural language processing (Computer science) 7
Search alternatives:
- mind »
-
261
Pulmonary arterial hypertension : diagnosis and evidence-based treatment
Published 2008Table of Contents: “…Combination therapy in pulmonary arterial hypertension / Anne Keogh and Marius Hoeper -- Interventional and surgical modalities of treatment for pulmonary arterial hypertension / Julio Sandoval and Ramona Doyle -- End points and clinical trial design in pulmonary arterial hypertension : clinical and regulatory perspectives / Andrew J. …”
Full text (MFA users only)
Electronic eBook -
262
Code : Collaborative Ownership and the Digital Economy.
Full text (MFA users only)
Electronic eBook -
263
Pattern Recognition in Computational Molecular Biology : Techniques and Approaches
Published 2015Full text (MFA users only)
Electronic eBook -
264
Verification of communication protocols in web services : model-checking service compositions
Published 2013Table of Contents: “…8.2 Overview of the Problem and Solution8.3 Related Work; 8.4 Colored Petri Net Semantics for BPEL; 8.4.1 Component A; 8.4.2 Component B; 8.4.3 Object Model for BPEL Activities; 8.4.4 XML Templates; 8.4.5 Algorithm for Cloning Templates; 8.5 Results; 8.6 Discussion; 8.7 Summary; References; 9 CONCLUSIONS AND OUTLOOK; 9.1 Results; 9.2 Discussion; 9.3 What Could Be Improved?…”
Full text (MFA users only)
Electronic eBook -
265
Mechanisms and games for dynamic spectrum allocation
Published 2013Table of Contents: “…7.3.10 Other equilibrium concepts -- 7.4 Learning equilibria -- 7.4.1 Learning Nash equilibria -- 7.4.2 Learning epsilon-equilibrium -- 7.4.3 Learning coarse correlated equilibrium -- 7.4.4 Learning satisfaction equilibrium -- 7.4.5 Discussion -- 7.5 Conclusion -- References -- II Cognitive radio and sharing of unlicensed spectrum -- 8 Cooperation in cognitiveradio networks: from accessto monitoring -- 8.1 Introduction -- 8.1.1 Cooperation in cognitive radio: mutual benefits and costs -- 8.2 An overview of coalitional game theory -- 8.3 Cooperative spectrum exploration and exploitation -- 8.3.1 Motivation -- 8.3.2 Basic problem -- 8.3.3 Joint sensing and access as a cooperative game -- 8.3.4 Coalition formation algorithm for joint sensing and access -- 8.3.5 Numerical results -- 8.4 Cooperative primary user activity monitoring -- 8.4.1 Motivation -- 8.4.2 Primary user activity monitoring: basic model -- 8.4.3 Cooperative primary user monitoring -- 8.4.4 Numerical results -- 8.5 Summary -- Acknowledgements -- Copyright notice -- References -- 9 Cooperative cognitive radios with diffusion networks -- 9.1 Introduction -- 9.2 Preliminaries -- 9.2.1 Basic tools in convex and matrix analysis -- 9.2.2 Graphs -- 9.3 Distributed spectrum sensing -- 9.4 Iterative consensus-based approaches -- 9.4.1 Average consensus algorithms -- 9.4.2 Acceleration techniques for iterative consensus algorithms -- 9.4.3 Empirical evaluation -- 9.5 Consensus techniques based on CoMAC -- 9.6 Adaptive distributed spectrum sensing based on adaptive subgradient techniques -- 9.6.1 Distributed detection with adaptive filters -- 9.6.2 Set-theoretic adaptive filters for distributed detection -- 9.6.3 Empirical evaluation -- 9.7 Channel probing -- 9.7.1 Introduction -- 9.7.2 Admissibility problem -- 9.7.3 Power and admission control algorithms.…”
Full text (MFA users only)
Electronic eBook -
266
Handbook of power systems. II
Published 2010Table of Contents: “…Cover -- Handbook of Power Systems II13; -- Preface of Volume II13; -- Contents of Volume II13; -- Contents13; of Volume I -- Contributors13; -- Part I Transmission and Distribution Modeling -- Recent Developments in Optimal Power Flow Modeling Techniques -- 1 Introduction -- 2 Physical Network Representation -- 3 Operational Constraints -- 4 Tap-Changing and Regulating Transformers -- 5 FACTS Devices -- 6 OPF Objective Functions and Formulations -- 7 OPF Solution Techniques -- 8 Numerical Examples -- 9 Conclusion -- References -- Algorithms for Finding Optimal Flows in Dynamic Networks -- 1 Optimal Dynamic Network Flow Models and Power Industry -- 2 Minimum Cost Dynamic Single: Commodity Flow Problems and Algorithms for Their Solving -- 3 Minimum Cost Dynamic Multicommodity Flow Problems and Algorithms for Their Solving -- References -- Signal Processing for Improving Power Quality -- 1 Wavelet-based Algorithm for Harmonics Analysis -- 2 Wavelet-based Algorithm for Nonstationary Power System Waveform Analysis -- 3 Wavelet-GA-ANN Based Hybrid Model for Accurate Prediction of Short-term Load Forecast -- 4 Conclusions -- References -- Transmission Valuation Analysis based on Real Options with Price Spikes -- 1 Introduction -- 2 Behavior of Commodity Prices -- 3 Valuation of Obligations and Options -- 4 Valuation in the Presence of Spikes -- 5 Conclusions -- References -- Part II Forecasting in Energy -- Short-term Forecasting in Power Systems: A Guided Tour -- 1 Introduction -- 2 Electricity Load Forecasting -- 3 Wind Power Forecasting -- 4 Forecasting Electricity Prices -- 5 Conclusions -- References -- State-of-the-Art of Electricity Price Forecasting in a Grid Environment -- 1 Introduction -- 2 State-of-the-Art Techniques of Electricity Price Forecasting -- 3 Input8211;Output Specifications of Electricity Price Forecasting Techniques -- 4 Comparing Existing Statistical Techniques for Electricity Price Forecasting -- 5 Implementations of Electricity Price Forecasting in a Grid Environment -- 6 Conclusions -- References -- Modelling the Structure of Long-Term Electricity Forward Prices at Nord Pool -- 1 Introduction -- 2 Long-term Forward Price Process -- 3 Model Estimation -- 4 Conclusions -- References -- Hybrid Bottom-Up/Top-Down Modeling of Prices in Deregulated Wholesale Power Markets -- 1 Introduction -- 2 Top-Down Models for Electricity Price Forecasting -- 3 Hybrid Bottom-Up/Top-Down Modeling -- 4 A Hybrid Model for the New Zealand Electricity Market -- 5 A Hybrid Model for the Australian Electricity Market -- 6 Conclusions -- References -- Part III Energy Auctions and Markets -- Agent-based Modeling and Simulation of Competitive Wholesale Electricity Markets -- 1 Introduction -- 2 Agent-based Modeling and Simulation -- 3 Behavioral Modeling -- 4 Market Modeling -- 5 Conclusions -- References -- Futures Market Trading for Electricity Producers and Retailers -- 1 Introduction: Futures Market Trading -- 2 Producer Trading -- 3 Retailer Trading -- 4 Conclusions -- References -- A Decision Support System for Generation Planning and Operation in Electricity Markets -- 1 Introduction -- 2 Long-term Stochastic Market Planning Model -- 3 Medium-term Stochastic Hydrothermal Coordination Model -- 4 Medium-term Stochastic Simulation Model -- T$29828.…”
Full text (MFA users only)
Electronic eBook -
267
There's Something about Gödel : The Complete Guide to the Incompleteness Theorem.
Published 2009Table of Contents: “…. -- 6 ... and the unsatisfied logicists, Frege and Russell -- 7 Bits of set theory -- 8 The Abstraction Principle -- 9 Bytes of set theory -- 10 Properties, relations, functions, that is, sets again -- 11 Calculating, computing, enumerating, that is, the notion of algorithm…”
Full text (MFA users only)
eBook -
268
Advances in parallel computing technologies and applications
Published 2021Table of Contents: “…A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique -- Intelligent Framework for Number Plate Detection and Recognition in Toll Using Image Processing Techniques -- IoT Based Health Monitoring System -- Traffic Monitoring System Using IoT and DL -- Distinct Actions Classification Using Human Action Tracker Technique in Sports Videos -- Smart Wearable System to Assist Asthma Patients -- Covid-19 Sentiment Analysis Using Deep Learning and Machine Learning -- Maize Grain Quality Classification Using Convolutional Neural Network -- Finding State of Mind Through Emotion and Sentiment Analysis of the Twitter Text -- A Novel Dual Encryption Algorithm to Enhance the Security in Image Transmission Using LSB 3-2-2 Technique -- Applications of Object Detection, Brain Tumor Detection and Classification -- Parallel Computing Enabled Cloudd-Based IOT Applications -- A Survey on Securing Medical Data in Cloud Using Blockchain -- Network Lifetime Analysis in IOT Environment in Healthcare Sectors Using Deep Learning Routing Approach -- An Comprehensive Survey on Applications of Precision Agriculture in the Context of Weed Classification, Leave Disease Detection, Yield Prediction and UAV Image Analysis -- IoT Based Shirodhara -- Model for Refactoring a Software Using Feature Oriented Dependency (FOD) -- Automatic Biometric System for Finger Knuckle Using Sparse Encoder Approaches -- Stock Market Prediction Using Machine Learning Techniques -- Smart Surveillance System for Abnormal Activity Detection Using CNN -- Increased Energy Conservation in Internet of Things (IoT) Related Wireless Networking -- Multi-Scale Fish Segmentation Refinement Using Contour Based Segmentation -- Heart Disease Prediction Using Hybrid Random Forest Model Integrated with Linear Model.…”
Full text (MFA users only)
eBook -
269
Applications of digital signal processing to audio and acoustics
Published 2002Full text (MFA users only)
Electronic eBook -
270
Randomness through computation : some answers, more questions
Published 2011Full text (MFA users only)
Electronic eBook -
271
Getting Started with Greenplum for Big Data Analytics.
Published 2013Table of Contents: “…Greenplum Unified Analytics Platform (UAP) -- Big Data analytics -- platform requirements -- Greenplum Unified Analytics Platform (UAP) -- Core components -- Greenplum Database -- Hadoop (HD) -- Chorus -- Command Center -- Modules -- Database modules -- HD modules -- Data Integration Accelerator (DIA) modules -- Core architecture concepts -- Data warehousing -- Column-oriented databases -- Parallel versus distributed computing/processing -- Shared nothing, massive parallel processing (MPP) systems, and elastic scalability -- Shared disk data architecture -- Shared memory data architecture -- Shared nothing data architecture -- Data loading patterns -- Greenplum UAP components -- Greenplum Database -- The Greenplum Database physical architecture -- The Greenplum high-availability architecture -- High-speed data loading using external tables.…”
Full text (MFA users only)
Electronic eBook -
272
High Performance Computing Systems and Applications & OSCAR Symposium.
Published 2003Table of Contents: “…""Table of Contents / Table des matières""; ""Preface""; ""Préface""; ""Symposium Organizers / Comité organisateur""; ""Program Committee / Comité scientifique""; ""Part I: Applications / Partie I: applications""; ""Concurrent Computation and Time Complexity Bounds for Algebraic Fractals""; ""Fast Algorithm to Estimate Dense Disparity Fields""; ""Evolutionary Grids of Interacting Stellar Binaries Containing Neutron Star Accretors""; ""HYDRA-MPI: An Adaptive Particle-Particle, Particle-Mesh Code for Conducting Cosmological Simulations on MPP Architectures""…”
Full text (MFA users only)
Electronic eBook -
273
Three Views of Logic : Mathematics, Philosophy, and Computer Science.
Published 2014Table of Contents: “…Proof Theory; 1 Propositional Logic; 1.1 Propositional Logic Semantics; 1.2 Syntax: Deductive Logics; 1.3 The Resolution Formal Logic; 1.4 Handling Arbitrary Propositional Wffs; 2 Predicate Logic; 2.1 First-Order Semantics; 2.2 Resolution for the Predicate Calculus; 2.2.1 Substitution; 2.2.2 The Formal System for Predicate Logic; 2.2.3 Handling Arbitrary Predicate Wffs; 3 An Application: Linear Resolution and Prolog; 3.1 OSL-Resolution; 3.2 Horn Logic; 3.3 Input Resolution and Prolog; Appendix A: The Induction Principle.…”
Full text (MFA users only)
Electronic eBook -
274
Big data in medical science and healthcare management : diagnosis, therapy, side effects
Published 2016Table of Contents: “…Autopilot and "doctor algorithm"? -- 1. Intro big data for healthcare? / Peter Langkafel -- 2. …”
Full text (MFA users only)
Electronic eBook -
275
Real-time database systems : architecture and techniques
Published 2001Full text (MFA users only)
Electronic eBook -
276
Quantum theory : a philosopher's overview
Published 2009Table of Contents: “…6. Explanatory and Algorithmic Nomologicals: Of Which Kind is Quantum Theory?…”
Full text (MFA users only)
Electronic eBook -
277
Gradience in grammar : generative perspectives
Published 2006Table of Contents: “…Frisch and Adrienne Stearns -- Intermediate syntactic variants in a dialect : standard speech repertoire and relative acceptability / Leonie Cornips -- Gradedness and optionality in mature and developing grammars / Antonella Sorace -- Decomposing gradience : quantitative versus qualitative distinctions / Matthias Schlesewsky, Ina Bornkessel, and Brian McElree -- Gradient perception of intonation / Caroline Féry and Ruben Stoel -- Prototypicality judgements as inverted perception / Paul Boersma -- Modelling productivity with the gradual learning algorithm : the problem of accidentally exceptionless generalizations / Adam Albright and Bruce Hayes -- Gradedness as relative efficiency in the processing of syntax and semantics / John A. …”
Full text (MFA users only)
Electronic eBook -
278
Decision making : a psychophysics application of network science, Center for Nonlinear Science, University of North Texas, USA, 10-13 January 2010
Published 2011Table of Contents: “…Background; 2. On the Extended Mind Hypothesis.…”
Full text (MFA users only)
Electronic eBook -
279
Constraint Solving over Multi-valued Logics : Application to Digital Circuits.
Published 2002Table of Contents: “…-- 3.2 Test Generation -- 3.3 TG Modelling Approaches and Algorithms.…”
Full text (MFA users only)
Electronic eBook -
280
Cryptography 101 : From Theory to Practice.
Published 2021Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
Full text (MFA users only)
Electronic eBook