Search Results - (((((((ant OR hwants) OR granting) OR makkant) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 141

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  2. 142

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  3. 143
  4. 144

    CUDA programming : a developer's guide to parallel computing with GPUs by Cook, Shane

    Published 2013
    Table of Contents: “…ALGORITHMIC ISSUESFINDING AND AVOIDING ERRORS; DEVELOPING FOR FUTURE GPUS; FURTHER RESOURCES; CONCLUSION; References; Index.…”
    Full text (MFA users only)
    Electronic eBook
  5. 145

    Parallel Computing : Advances and Current Issues, Proceedings of the International Conference Parco2001. by Joubert, G. R.

    Published 2002
    Table of Contents: “…Committees ; Preface ; Invited Papers ; Deploying Parallel Numerical Library Routines to Cluster Computing in a Self Adapting Fashion ; 1 Overview ; 2 Numerical libraries in shared homogeneous distributed environments ; 3 Sample software implementation and results.…”
    Full text (MFA users only)
    Electronic eBook
  6. 146

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 147

    Advances in digital technologies : proceedings of the 6th International Conference on Applications of Digital Information and Web Technologies 2015

    Published 2015
    Table of Contents: “…Application of Genetic Algorithms to Context-Sensitive Text MiningA Decision Tree Classification Model for Determining the Location for Solar Power Plant; A Framework for Multi-Label Learning Using Label Ranking and Correlation; A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5; Subject Index; Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  8. 148

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook
  9. 149

    Optimization advances in electric power systems

    Published 2008
    Table of Contents: “…Unreliability Costs -- 3.5. Proposed Algorithms -- 3.5.1. ES and TS Algorithms -- 3.5.2. …”
    Full text (MFA users only)
    Electronic eBook
  10. 150

    R High Performance Programming. by Lim, Aloysius

    Published 2015
    Table of Contents: “…Data parallelism versus task parallelismImplementing data parallel algorithms; Implementing task parallel algorithms; Running the same task on workers in a cluster; Running different tasks on workers in a cluster; Executing tasks in parallel on a cluster of computers; Shared memory versus distributed memory parallelism; Optimizing parallel performance; Summary; Chapter 9: Offloading Data Processing to Database Systems; Extracting data into R versus processing data in a database; Preprocessing data in a relational database using SQL; Converting R expressions into SQL; Using dplyr…”
    Full text (MFA users only)
    Electronic eBook
  11. 151

    Integrated and collaborative product development environment : technologies and implementations by Li, W. D.

    Published 2006
    Table of Contents: “…Intelligent Optimisation of Process Planning; 5.1 Intelligent Optimisation Strategies for CAPP Systems; 5.2 Knowledge Representation of Process Plans; 5.2.1 Process plan representation; 5.2.2 Machining cost criteria for process plans; 5.2.3 Precedence constraints; 5.3 A Hybrid GA/SA-based Optimisation Method; 5.3.1 Overview of the algorithm; 5.3.2 Genetic algorithm -- phase 1; 5.3.3 Simulated annealing algorithm -- phase 2; 5.3.4 Constraint handling algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  12. 152
  13. 153

    Delphi High Performance : Build fast Delphi applications using concurrency, parallel programming and memory management. by Gabrijelčič, Primož

    Published 2018
    Table of Contents: “…; Different types of speed; Algorithm complexity; Big O and Delphi data structures; Data structures in practice; Mr. …”
    Full text (MFA users only)
    Electronic eBook
  14. 154

    Materials Science and Intelligent Technologies Applications : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Key Engineering Materials and Computer Sc...

    Published 2014
    Table of Contents: “…Automatic Badminton Action Recognition Using RGB-D SensorKinect-Based Badminton Action Analysis System; A Review of Hot Topic Detection and Tracking Technology; Study on the Improvement of TFIDF Algorithm in Data Mining; A New Protocol for Secure Distributed Multiplication of Two Polynomial Shared Values; Human Posture Recognition Based on DAG-SVMS; The Design and Implementation of Astronomical Multi-Catalog Storage and Cross-Match Based on Hadoop; The Multi-Scale Hough Transform Lane Detection Method Based on the Algorithm of Otsu and Canny; Design of Heart Sound Analyzer.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 155

    Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques. by Deshpande, Anand

    Published 2018
    Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
    Full text (MFA users only)
    Electronic eBook
  16. 156

    Handbook for pandemic and mass-casualty planning and response

    Published 2012
    Table of Contents: “…Burn Injuries during Mass-Casualty IncidentsBlast Injuries; Section 3: Communication and Information Sharing; Information Sharing in Practice and for Practice: Mass-Casualty Cases; Communication between Emergency Medical Services and Media during Mass-Casualty Events in Croatia; Just-in-Time Information; Collaboration Topologies for Interdisciplinary and Interlevel Information Exchange; Networks and Their Role in Counteracting Contemporary Global Threats: A New Model; Architecture of R & D Project Management Systems at Medical Institutions; Lessons Learned; Lessons Learned; Subject Index…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 157

    High performance computing on complex environments by Jeannot, Emmanuel

    Published 2014
    Table of Contents: “…Chapter 4: Parallel Algorithms for Parabolic Problems on Graphs in Neuroscience4.1 Introduction; 4.2 Formulation of the Discrete Model; 4.3 Parallel Algorithms; 4.4 Computational Results; 4.5 Conclusions; Acknowledgments; References; Part III: Communication and Storage Considerations in High-Performance Computing; Chapter 5: An Overview of Topology Mapping Algorithms and Techniques in High-Performance Computing; 5.1 Introduction; 5.2 General Overview; 5.3 Formalization of the Problem; 5.4 Algorithmic Strategies for Topology Mapping; 5.5 Mapping Enforcement Techniques; 5.6 Survey of Solutions.…”
    Full text (MFA users only)
    Electronic eBook
  18. 158
  19. 159

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  20. 160

    Advances in time series forecasting. Volume 2

    Published 2017
    Table of Contents: “…INTRODUCTION -- CLASSICAL TIME SERIES FORECASTING MODELS -- ARTIFICIAL NEURAL NETWORKS FOR FORECASTING TIME SERIES -- A NEW ARTIFICIAL NEURAL NETWORK WITH DETERMINISTIC COMPONENTS -- APPLICATIONS -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Fuzzy Time Series Approach Based on Genetic Algorithm with Single Analysis Process -- Ozge Cagcag Yolcu* -- INTRODUCTION -- FUZZY TIME SERIES -- RELATED METHODS -- Genetic Algorithm (GA) -- Single Multiplicative Neuron Model -- PROPOSED METHOD -- APPLICATIONS -- CONCLUSION AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Forecasting Stock Exchanges with Fuzzy Time Series Approach Based on Markov Chain Transition Matrix -- Cagdas Hakan Aladag1,* and Hilal Guney2 -- INTRODUCTION -- FUZZY TIME SERIES -- TSAUR 'S FUZZY TIME SERIES MARKOV CHAIN MODEL -- THE IMPLEMENTATION -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A New High Order Multivariate Fuzzy Time Series Forecasting Model -- Ufuk Yolcu* -- INTRODUCTION -- RELATED METHODOLOGY -- The Fuzzy C-Means (FCM) Clustering Method -- Single Multiplicative Neuron Model Artificial Neural Network (SMN-ANN) -- Fuzzy Time Series -- THE PROPOSED METHOD -- APPLICATIONS -- CONCLUSIONS AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Fuzzy Functions Approach for Time Series Forecasting -- Ali Z. …”
    Full text (MFA users only)
    Electronic eBook