Search Results - (((((((ant OR find) OR cantee) OR granting) OR cantor) OR anne) OR maarten) OR tkanto) algorithms.

  1. 181

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  2. 182

    Applied mechatronics and android robotics : selected, peer reviewed papers from the International Conference on Applied Mechatronics and Android Robotics (ICAMAR 2013), July 13-14,...

    Published 2013
    Table of Contents: “…Applied Mechatronics and Android Robotics; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Robot Design, Motion Planning and Robot Control; Design of a Master Manipulator with Dynamical Simplification for Master-Slave Robot; Parameter Self-Adjusting Path Tracking Algorithm of Mobile Robots; Global Path Planning for Mobile Robot Based on Improved Ant Colony Algorithms; A Study of Robot Platform Based on WiFi Remote Control; Fire Detection System Based-On Mobile Robots; Phase Plane Analysis of Battery Series Balancing on Robot…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  3. 183
  4. 184

    The Method of Fundamental Solutions. by LI, Zi-Cai

    Published 2023
    Full text (MFA users only)
    Electronic eBook
  5. 185

    Compressed sensing : theory and applications

    Published 2012
    Table of Contents: “…Graphical models concepts in compressed sensing / Andrea Montanari -- 10. Finding needles in compressed haystacks / Robert Calderbank and Sina Jafarpour -- 11. …”
    Full text (MFA users only)
    Electronic eBook
  6. 186

    MATLAB for Machine Learning. by Ciaburro, Giuseppe

    Published 2017
    Table of Contents: “…Multiple linear regression with categorical predictorPolynomial regression; Regression Learner App; Summary; Chapter 5: Pattern Recognition through Classification Algorithms; Predicting a response by decision trees; Probabilistic classification algorithms -- Naive Bayes; Basic concepts of probability; Classifying with Naive Bayes; Bayesian methodologies in MATLAB; Describing differences by discriminant analysis; Find similarities using nearest neighbor classifiers; Classification Learner app; Summary; Chapter 6: Identifying Groups of Data Using Clustering Methods; Introduction to clustering.…”
    Full text (MFA users only)
    Electronic eBook
  7. 187

    Electronic warfare target location methods by Poisel, Richard

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  8. 188

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  9. 189

    Introduction to direction-of-arrival estimation by Chen, Zhizhang

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  10. 190

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  11. 191

    Handbook of statistical analysis and data mining applications by Nisbet, Robert

    Published 2009
    Table of Contents: “…Basic Algorithms -- Chapter 8: Advanced Algorithms -- Chapter 9. …”
    Full text (MFA users only)
    Electronic eBook
  12. 192
  13. 193

    Principles of Quantum Computation and Information, Volume I : Basic Concepts. by Casati, Giulio, Strini, Giuliano

    Published 2004
    Table of Contents: “…Quantum phase estimation. 3.13. Finding eigenvalues and eigenvectors. 3.14. Period finding and Shor's algorithm. 3.15. …”
    Full text (MFA users only)
    Electronic eBook
  14. 194

    Role mining in business : taming role-based access control administration by Colantonio, Alessandro

    Published 2012
    Table of Contents: “…Problem formalization. 7.3. Finding optimal role-sets. 7.4. Finding sub-optimal role-sets. 7.5. …”
    Full text (MFA users only)
    Electronic eBook
  15. 195

    Social sensing : building reliable systems on unreliable data by Wang, Dong, Abdelzaher, Tarek, Kaplan, Lance

    Published 2015
    Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
    Full text (MFA users only)
    Electronic eBook
  16. 196

    Knowledge discovery for business information systems

    Published 2001
    Table of Contents: “…An Entropy Measure for Continuous and Nominal Data Types -- 4. Algorithm to Find Important Variables -- 5. Experimental Studies -- 6. …”
    Full text (MFA users only)
    Electronic eBook
  17. 197

    Fuzzy neural network theory and application by Liu, Puyin

    Published 2004
    Table of Contents: “…4.2.2 Calculus of V -- / functions4.2.3 Error function; 4.2.4 Partial derivatives of error function; 4.2.5 Learning algorithm and simulation; S4.3 Conjugate gradient algorithm for fuzzy weights; 4.3.1 Fuzzy CG algorithm and convergence; 4.3.2 GA for finding optimal learning constant; 4.3.3 Simulation examples; S4.4 Universal approximation to fuzzy valued functions; 4.4.1 Fuzzy valued Bernstein polynomial; 4.4.2 Four-layer regular feedforward FNN; 4.4.3 An example; S4.5 Approximation analysis of regular FNN; 4.5.1 Closure fuzzy mapping; 4.5.2 Learning algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Communicating process architectures 2009 : WoTUG-32

    Published 2009
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 199
  20. 200

    Discrete Mathematics for Computer Science : An Example-Based Introduction. by Fortney, Jon Pierre

    Published 2021
    Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Algorithms -- 1.1. WHAT ARE ALGORITHMS? -- 1.2. CONTROL STRUCTURES -- 1.3. …”
    Full text (MFA users only)
    Electronic eBook