Search Results - (((((((ant OR hands) OR wkanting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 301
  2. 302
  3. 303

    Microbiological sensors for the drinking water industry

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  4. 304

    Big data analytics : turning big data into big money by Ohlhorst, Frank, 1964-

    Published 2013
    Table of Contents: “…In-Memory ProcessingChapter 10: Bringing It All Together; The Path to Big Data; The Realities of Thinking Big Data; Hands-on Big Data; The Big Data Pipeline in Depth; Big Data Visualization; Big Data Privacy; Appendix: Supporting Data; The MapR Distribution for Apache Hadoop -- High Availability: No Single Points of Failure -- About the Author; Index.…”
    Full text (MFA users only)
    Electronic eBook
  5. 305
  6. 306

    Combinatorial and Computational Mathematics : Present and Future.

    Published 2001
    Table of Contents: “…2 LIST OF APPLICABLE MATHEMATICS IN SOCIAL SCIENCE3 SOCIAL WELFARE FUNCTIONS (SWF); 4 PROSPECTS; 5 OPEN PROBLEMS; References; Twelve Views of Matroid Theory; INTRODUCTION; 1 LINEAR DEPENDENCE WITHOUT SCALARS; 2 BASIS EXCHANGE PROPERTIES; 3 GEOMETRIC LATTICES; 4 GRAPH THEORY WITHOUT VERTICES; 5 GRAPH THEORY AND LEAN LINEAR ALGEBRA; 6 VARIETIES OF FINITE MATROIDS; 7 SECRET-SHARING MATROIDS; 8 GREEDY ALGORITHMS, MATROID INTERSECTION, AND MATROID PARTITION; 9 MATRIX MULTIPLICATION AND THE CAUCHY-BINET IDENTITY; 10 BASIS GENERATING FUNCTIONS AND THE MATRIX-TREE THEOREM…”
    Full text (MFA users only)
    Electronic eBook
  7. 307

    Entity information life cycle for big data : master data management and information integration by Talburt, John R., Zhou, Yinle, 1986-

    Published 2015
    Table of Contents: “…CLUSTER-TO-CLUSTER CLASSIFICATIONSELECTING AN APPROPRIATE ALGORITHM; CONCLUDING REMARKS; Chapter 9 -- Blocking; BLOCKING; BLOCKING BY MATCH KEY; DYNAMIC BLOCKING VERSUS PRERESOLUTION BLOCKING; BLOCKING PRECISION AND RECALL; MATCH KEY BLOCKING FOR BOOLEAN RULES; MATCH KEY BLOCKING FOR SCORING RULES; CONCLUDING REMARKS; Chapter 10 -- CSRUD for Big Data; LARGE-SCALE ER FOR MDM; THE TRANSITIVE CLOSURE PROBLEM; DISTRIBUTED, MULTIPLE-INDEX, RECORD-BASED RESOLUTION; AN ITERATIVE, NONRECURSIVE ALGORITHM FOR TRANSITIVE CLOSURE; ITERATION PHASE: SUCCESSIVE CLOSURE BY REFERENCE IDENTIFIER.…”
    Full text (MFA users only)
    Electronic eBook
  8. 308

    Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference. by Arena, Paolo, Fortuna, Luigi

    Published 2006
    Table of Contents: “…An extended branch-and-bound algorithm for fuzzy linear bilevel programming / G. …”
    Full text (MFA users only)
    Electronic eBook
  9. 309

    Systemic Risk from Global Financial Derivatives. by Markose, Sheri M.

    Published 2012
    Table of Contents: “…FDIC FIs as Participants in the Five Financial Derivatives Markets; Tables; 1. Value and Market Share of Financial Derivatives for 202 FIs; B. Market Data Based Systemic Risk Measures and Financial Network Perspective; III. …”
    Full text (MFA users only)
    Electronic eBook
  10. 310

    Advanced wireless networks : technology and business models by Glisic, Savo G.

    Published 2016
    Table of Contents: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
    Full text (MFA users only)
    Electronic eBook
  11. 311
  12. 312

    Oxford Handbook of Respiratory Nursing

    Published 2009
    Table of Contents: “…Symptoms of upper respiratory tract diseaseNon-specific and extra-pulmonary symptoms; Breathlessness 1; Breathlessness 2; Cough; Sputum; Haemoptysis; Chest pain; Respiratory examination; General inspection; Examination of the hands and limbs; Examination of the head and neck; Palpation; Percussion; Auscultation; Abnormal breath sounds; Completing the respiratory assessment; 5 Respiratory investigations; Introduction; Peak expiratory flow rate (PEFR); Performing the PEFR test; Spirometry; Vital capacity; Interpretation of results; Combined obstruction and restriction; Flow volume graphs.…”
    Full text (MFA users only)
    Electronic eBook
  13. 313

    Beginning software engineering by Stephens, Rod, 1961-

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  14. 314

    Securing SQL server : protecting Your database from attackers by Cherry, Denny

    Published 2015
    Table of Contents: “…Chapter 3 -- Key ManagementInformation in this chapter; Service master key; Database master key; Encryption password management; Enterprise key management; High availability and disaster recovery for key management; Conclusions; Chapter 4 -- Database Encryption; Information in this chapter:; Database encryption; Hashing versus Encryption; Triple DES; RC Algorithms; Advanced Encryption Standard; Hashing; SHA2 and SQL Server; Encrypting Objects; Encrypting data within tables; Encrypting within Microsoft SQL Server; Encrypting Within the Application Tier.…”
    Full text (MFA users only)
    Electronic eBook
  15. 315

    Deep learning for dummies by Mueller, John, 1958-, Massaron, Luca

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  16. 316

    Circuit analysis

    Published 2011
    Table of Contents: “…CIRCUIT ANALYSIS; ELECTRICAL ENGINEERINGDEVELOPMENTS; CONTENTS; PREFACE; ELEMENT STAMP ALGORITHM FOR MATRIXFORMULATION OF SYMBOLIC CIRCUITS; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  17. 317
  18. 318

    Wireless sensor systems for extreme environments : space, underwater, underground and industrial

    Published 2017
    Table of Contents: “…Chapter 4 On Improving Connectivity-based Localization in Wireless Sensor Networks4.1 Introduction; 4.2 Connectivity-based Localization in One-hop Networks; 4.2.1 The Centroid Algorithm; 4.2.2 Improved Centroid Algorithms; 4.3 Connectivity-based Localization in Multi-hop Networks; 4.3.1 The DV-hop Algorithm; 4.3.2 Mathematics of Hop-count-based Localization; 4.4 On Improving Connectivity-based Localization; 4.4.1 Improvements by Adjusting Correction Factor; 4.4.2 Improvements by Exploiting Neighborhood Information; 4.5 Summary; References.…”
    Full text (MFA users only)
    Electronic eBook
  19. 319

    Selected papers from the 12th international symposium on electromagnetic fields in electrical engineering 2005, Volume 25, Issue 3. by Krawczk, Professor Andrzej

    Published 2006
    Table of Contents: “…Absorbing boundary conditions for compact modeling of on-chip passive structuresWide frequency band analysis of an antenna by finite elements; Application of Spice simulator in the evaluation of crosstalk computational models; Rigorous ADI-FDTD analysis of left-handed metamaterials in optimally-designed EMC applications; Comparison of numerical and measurement methods of SAR of ellipsoidal phantoms with muscle tissue electrical parameters; Numerical modeling of 3D intelligent comb drive accelerometer structure.…”
    Full text (MFA users only)
    Electronic eBook
  20. 320

    The Johns Hopkins guide to digital media

    Published 2014
    Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
    Book