Search Results - (((((((ant OR hands) OR wkanting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 40
- Artificial intelligence 36
- Machine learning 31
- Mathematical models 29
- Mathematics 25
- Algorithms 22
- artificial intelligence 22
- Mathematical optimization 19
- algorithms 19
- Data mining 18
- Technological innovations 15
- Computer networks 14
- Artificial Intelligence 13
- Computer algorithms 13
- Information technology 13
- Management 13
- Big data 12
- methods 12
- Digital techniques 11
- Signal processing 11
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Application software 9
- Computer security 9
- Design and construction 9
- Development 9
- Social aspects 9
- Computer programming 8
- Computer science 8
- Data Mining 8
Search alternatives:
- ant »
- wkanting »
- markant »
- cantor »
-
301
Digital journalism, drones, and automation : the language and abstractions behind the news
Published 2020Full text (MFA users only)
Electronic eBook -
302
Clinical tests for the musculoskeletal system : examinations, signs, phenomena
Published 2016Full text (MFA users only)
Electronic eBook -
303
Microbiological sensors for the drinking water industry
Published 2018Full text (MFA users only)
Electronic eBook -
304
Big data analytics : turning big data into big money
Published 2013Table of Contents: “…In-Memory ProcessingChapter 10: Bringing It All Together; The Path to Big Data; The Realities of Thinking Big Data; Hands-on Big Data; The Big Data Pipeline in Depth; Big Data Visualization; Big Data Privacy; Appendix: Supporting Data; The MapR Distribution for Apache Hadoop -- High Availability: No Single Points of Failure -- About the Author; Index.…”
Full text (MFA users only)
Electronic eBook -
305
Multicriteria decision aid and artificial intelligence : links, theory and applications
Published 2013Full text (MFA users only)
Electronic eBook -
306
Combinatorial and Computational Mathematics : Present and Future.
Published 2001Table of Contents: “…2 LIST OF APPLICABLE MATHEMATICS IN SOCIAL SCIENCE3 SOCIAL WELFARE FUNCTIONS (SWF); 4 PROSPECTS; 5 OPEN PROBLEMS; References; Twelve Views of Matroid Theory; INTRODUCTION; 1 LINEAR DEPENDENCE WITHOUT SCALARS; 2 BASIS EXCHANGE PROPERTIES; 3 GEOMETRIC LATTICES; 4 GRAPH THEORY WITHOUT VERTICES; 5 GRAPH THEORY AND LEAN LINEAR ALGEBRA; 6 VARIETIES OF FINITE MATROIDS; 7 SECRET-SHARING MATROIDS; 8 GREEDY ALGORITHMS, MATROID INTERSECTION, AND MATROID PARTITION; 9 MATRIX MULTIPLICATION AND THE CAUCHY-BINET IDENTITY; 10 BASIS GENERATING FUNCTIONS AND THE MATRIX-TREE THEOREM…”
Full text (MFA users only)
Electronic eBook -
307
Entity information life cycle for big data : master data management and information integration
Published 2015Table of Contents: “…CLUSTER-TO-CLUSTER CLASSIFICATIONSELECTING AN APPROPRIATE ALGORITHM; CONCLUDING REMARKS; Chapter 9 -- Blocking; BLOCKING; BLOCKING BY MATCH KEY; DYNAMIC BLOCKING VERSUS PRERESOLUTION BLOCKING; BLOCKING PRECISION AND RECALL; MATCH KEY BLOCKING FOR BOOLEAN RULES; MATCH KEY BLOCKING FOR SCORING RULES; CONCLUDING REMARKS; Chapter 10 -- CSRUD for Big Data; LARGE-SCALE ER FOR MDM; THE TRANSITIVE CLOSURE PROBLEM; DISTRIBUTED, MULTIPLE-INDEX, RECORD-BASED RESOLUTION; AN ITERATIVE, NONRECURSIVE ALGORITHM FOR TRANSITIVE CLOSURE; ITERATION PHASE: SUCCESSIVE CLOSURE BY REFERENCE IDENTIFIER.…”
Full text (MFA users only)
Electronic eBook -
308
Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference.
Published 2006Table of Contents: “…An extended branch-and-bound algorithm for fuzzy linear bilevel programming / G. …”
Full text (MFA users only)
Electronic eBook -
309
Systemic Risk from Global Financial Derivatives.
Published 2012Table of Contents: “…FDIC FIs as Participants in the Five Financial Derivatives Markets; Tables; 1. Value and Market Share of Financial Derivatives for 202 FIs; B. Market Data Based Systemic Risk Measures and Financial Network Perspective; III. …”
Full text (MFA users only)
Electronic eBook -
310
Advanced wireless networks : technology and business models
Published 2016Table of Contents: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
Full text (MFA users only)
Electronic eBook -
311
CompTIA security+ deluxe study guide : exam SY0-301
Published 2011Full text (MFA users only)
Electronic eBook -
312
Oxford Handbook of Respiratory Nursing
Published 2009Table of Contents: “…Symptoms of upper respiratory tract diseaseNon-specific and extra-pulmonary symptoms; Breathlessness 1; Breathlessness 2; Cough; Sputum; Haemoptysis; Chest pain; Respiratory examination; General inspection; Examination of the hands and limbs; Examination of the head and neck; Palpation; Percussion; Auscultation; Abnormal breath sounds; Completing the respiratory assessment; 5 Respiratory investigations; Introduction; Peak expiratory flow rate (PEFR); Performing the PEFR test; Spirometry; Vital capacity; Interpretation of results; Combined obstruction and restriction; Flow volume graphs.…”
Full text (MFA users only)
Electronic eBook -
313
-
314
Securing SQL server : protecting Your database from attackers
Published 2015Table of Contents: “…Chapter 3 -- Key ManagementInformation in this chapter; Service master key; Database master key; Encryption password management; Enterprise key management; High availability and disaster recovery for key management; Conclusions; Chapter 4 -- Database Encryption; Information in this chapter:; Database encryption; Hashing versus Encryption; Triple DES; RC Algorithms; Advanced Encryption Standard; Hashing; SHA2 and SQL Server; Encrypting Objects; Encrypting data within tables; Encrypting within Microsoft SQL Server; Encrypting Within the Application Tier.…”
Full text (MFA users only)
Electronic eBook -
315
-
316
Circuit analysis
Published 2011Table of Contents: “…CIRCUIT ANALYSIS; ELECTRICAL ENGINEERINGDEVELOPMENTS; CONTENTS; PREFACE; ELEMENT STAMP ALGORITHM FOR MATRIXFORMULATION OF SYMBOLIC CIRCUITS; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
317
Reconfigurable computing : the theory and practice of FPGA-based computation
Published 2008Full text (MFA users only)
Electronic eBook -
318
Wireless sensor systems for extreme environments : space, underwater, underground and industrial
Published 2017Table of Contents: “…Chapter 4 On Improving Connectivity-based Localization in Wireless Sensor Networks4.1 Introduction; 4.2 Connectivity-based Localization in One-hop Networks; 4.2.1 The Centroid Algorithm; 4.2.2 Improved Centroid Algorithms; 4.3 Connectivity-based Localization in Multi-hop Networks; 4.3.1 The DV-hop Algorithm; 4.3.2 Mathematics of Hop-count-based Localization; 4.4 On Improving Connectivity-based Localization; 4.4.1 Improvements by Adjusting Correction Factor; 4.4.2 Improvements by Exploiting Neighborhood Information; 4.5 Summary; References.…”
Full text (MFA users only)
Electronic eBook -
319
Selected papers from the 12th international symposium on electromagnetic fields in electrical engineering 2005, Volume 25, Issue 3.
Published 2006Table of Contents: “…Absorbing boundary conditions for compact modeling of on-chip passive structuresWide frequency band analysis of an antenna by finite elements; Application of Spice simulator in the evaluation of crosstalk computational models; Rigorous ADI-FDTD analysis of left-handed metamaterials in optimally-designed EMC applications; Comparison of numerical and measurement methods of SAR of ellipsoidal phantoms with muscle tissue electrical parameters; Numerical modeling of 3D intelligent comb drive accelerometer structure.…”
Full text (MFA users only)
Electronic eBook -
320
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book