Search Results - (((((((ant OR find) OR cantee) OR granting) OR cantor) OR anne) OR maarten) OR tkanto) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 45
- Artificial intelligence 30
- Mathematics 27
- Machine learning 26
- Mathematical models 25
- Data mining 21
- Mathematical optimization 21
- algorithms 20
- artificial intelligence 20
- Algorithms 18
- methods 16
- Computer networks 15
- Research 15
- Computer algorithms 14
- Management 12
- Artificial Intelligence 11
- Diseases 11
- Information technology 11
- Signal processing 11
- Big data 10
- Bioinformatics 10
- Digital techniques 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- R (Computer program language) 10
- Social aspects 10
- Image processing 9
- Security measures 9
- Statistical methods 9
- Technological innovations 9
Search alternatives:
- ant »
- cantee »
- granting »
- cantor »
- tkanto »
- find »
-
181
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
182
Applied mechatronics and android robotics : selected, peer reviewed papers from the International Conference on Applied Mechatronics and Android Robotics (ICAMAR 2013), July 13-14,...
Published 2013Table of Contents: “…Applied Mechatronics and Android Robotics; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Robot Design, Motion Planning and Robot Control; Design of a Master Manipulator with Dynamical Simplification for Master-Slave Robot; Parameter Self-Adjusting Path Tracking Algorithm of Mobile Robots; Global Path Planning for Mobile Robot Based on Improved Ant Colony Algorithms; A Study of Robot Platform Based on WiFi Remote Control; Fire Detection System Based-On Mobile Robots; Phase Plane Analysis of Battery Series Balancing on Robot…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
183
Slantwise moves : games, literature, and social invention in nineteenth-century America
Published 2018Full text (MFA users only)
Electronic eBook -
184
-
185
Compressed sensing : theory and applications
Published 2012Table of Contents: “…Graphical models concepts in compressed sensing / Andrea Montanari -- 10. Finding needles in compressed haystacks / Robert Calderbank and Sina Jafarpour -- 11. …”
Full text (MFA users only)
Electronic eBook -
186
MATLAB for Machine Learning.
Published 2017Table of Contents: “…Multiple linear regression with categorical predictorPolynomial regression; Regression Learner App; Summary; Chapter 5: Pattern Recognition through Classification Algorithms; Predicting a response by decision trees; Probabilistic classification algorithms -- Naive Bayes; Basic concepts of probability; Classifying with Naive Bayes; Bayesian methodologies in MATLAB; Describing differences by discriminant analysis; Find similarities using nearest neighbor classifiers; Classification Learner app; Summary; Chapter 6: Identifying Groups of Data Using Clustering Methods; Introduction to clustering.…”
Full text (MFA users only)
Electronic eBook -
187
Electronic warfare target location methods
Published 2012Full text (MFA users only)
Electronic eBook -
188
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
189
Introduction to direction-of-arrival estimation
Published 2010Full text (MFA users only)
Electronic eBook -
190
-
191
Handbook of statistical analysis and data mining applications
Published 2009Table of Contents: “…Basic Algorithms -- Chapter 8: Advanced Algorithms -- Chapter 9. …”
Full text (MFA users only)
Electronic eBook -
192
Metaheuristic applications in structures and infrastructures
Published 2013Full text (MFA users only)
Electronic eBook -
193
Principles of Quantum Computation and Information, Volume I : Basic Concepts.
Published 2004Table of Contents: “…Quantum phase estimation. 3.13. Finding eigenvalues and eigenvectors. 3.14. Period finding and Shor's algorithm. 3.15. …”
Full text (MFA users only)
Electronic eBook -
194
Role mining in business : taming role-based access control administration
Published 2012Table of Contents: “…Problem formalization. 7.3. Finding optimal role-sets. 7.4. Finding sub-optimal role-sets. 7.5. …”
Full text (MFA users only)
Electronic eBook -
195
Social sensing : building reliable systems on unreliable data
Published 2015Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
Full text (MFA users only)
Electronic eBook -
196
Knowledge discovery for business information systems
Published 2001Table of Contents: “…An Entropy Measure for Continuous and Nominal Data Types -- 4. Algorithm to Find Important Variables -- 5. Experimental Studies -- 6. …”
Full text (MFA users only)
Electronic eBook -
197
Fuzzy neural network theory and application
Published 2004Table of Contents: “…4.2.2 Calculus of V -- / functions4.2.3 Error function; 4.2.4 Partial derivatives of error function; 4.2.5 Learning algorithm and simulation; S4.3 Conjugate gradient algorithm for fuzzy weights; 4.3.1 Fuzzy CG algorithm and convergence; 4.3.2 GA for finding optimal learning constant; 4.3.3 Simulation examples; S4.4 Universal approximation to fuzzy valued functions; 4.4.1 Fuzzy valued Bernstein polynomial; 4.4.2 Four-layer regular feedforward FNN; 4.4.3 An example; S4.5 Approximation analysis of regular FNN; 4.5.1 Closure fuzzy mapping; 4.5.2 Learning algorithm.…”
Full text (MFA users only)
Electronic eBook -
198
Communicating process architectures 2009 : WoTUG-32
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
199
DSP software development techniques for embedded and real-time systems
Published 2006Full text (MFA users only)
Electronic eBook -
200
Discrete Mathematics for Computer Science : An Example-Based Introduction.
Published 2021Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Algorithms -- 1.1. WHAT ARE ALGORITHMS? -- 1.2. CONTROL STRUCTURES -- 1.3. …”
Full text (MFA users only)
Electronic eBook