Search Results - (((((((ant OR kkantis) OR mantis) OR hints) OR cantor) OR anne) OR file) OR wwanting) algorithms.

  1. 761
  2. 762

    NGN architectures, protocols, and services by Janevski, Toni

    Published 2014
    Table of Contents: “…2.3.3 Dynamic Host Configuration Protocol2.3.4 Domain Name System; 2.3.5 ENUM; 2.3.6 IPv6 Addressing Architecture; 2.4 Internet Routing; 2.4.1 Routing Algorithms; 2.5 Client-Server Networking; 2.6 Peer-to-Peer Networking; 2.7 Best-Effort Internet Services; 2.7.1 Electronic Mail; 2.7.2 File Transfer Protocol; 2.7.3 World Wide Web; 2.7.4 Peer-to-Peer Services; 2.8 Internet Governance; References; Chapter 3 NGN Standards and Architectures; 3.1 Main Drivers to Next Generation Networks; 3.1.1 Fixed Broadband Internet Access; 3.1.2 Mobile Broadband Internet Access.…”
    Full text (MFA users only)
    Electronic eBook
  3. 763

    Coronary atherosclerosis : current management and treatment

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  4. 764
  5. 765

    Energy efficient distributed computing systems

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  6. 766
  7. 767
  8. 768

    CCNA Security Study Guide : Exam 210-260. by McMillan, Troy

    Published 2018
    Table of Contents: “…In-Band and Out-of-Band Management -- Securing Network Management -- Securing Access through SNMP v3 -- Securing NTP -- Using SCP for File Transfer -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 Understanding 802.1x and AAA -- 802.1x Components -- RADIUS and TACACS+ Technologies -- Configuring Administrative Access with TACACS+ -- Understanding Authentication and Authorization Using ACS and ISE -- Understanding the Integration of Active Directory with AAA -- Summary -- Exam Essentials -- Review Questions -- Chapter 10 Securing a BYOD Initiative -- The BYOD Architecture Framework -- The Function of Mobile Device Management -- Summary -- Exam Essentials -- Review Questions -- Chapter 11 Understanding VPNs -- Understanding IPsec -- Understanding Advanced VPN Concepts -- Summary -- Exam Essentials -- Review Questions -- Chapter 12 Configuring VPNs -- Configuring Remote Access VPNs -- Configuring Site-to-Site VPNs -- Summary -- Exam Essentials -- Review Questions -- Chapter 13 Understanding Firewalls -- Understanding Firewall Technologies -- Stateful vs. …”
    Full text (MFA users only)
    Electronic eBook
  9. 769

    Artificial intelligence and machine learning for business for non-engineers

    Published 2019
    Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgment -- Editors -- Contributors -- 1 Introduction to Artificial Intelligence and Machine Learning -- References -- 2 The Basic Elements of Artificial Intelligence -- Introduction -- Representation -- Representing a Problem -- Representation of Information -- Storing Knowledge -- Representing Knowledge -- Frames -- Trees -- Objects -- Formulating Problems and Solutions -- Storing Knowledge and Information -- File Structures -- Storage Hardware -- Searching for Knowledge and Actions -- Breadth-First Search -- Depth-First Search -- Informed Search -- Sophisticated Search -- Heuristic Search -- Local Search Algorithms -- Adversarial Search and Games -- Problem-Solving, Decision-Making, and Taking Action -- Reasoning -- Agents Employing Reasoning and Making Decisions -- Resolution, Reaching Reasoned Conclusions, and Taking Appropriate Action -- References -- 3 Artificial Intelligence and the Cloud -- References -- 4 Artificial Intelligence Security Threats -- References -- 5 Artificial Intelligence and IT Management -- General Intro -- Chapter Framework -- Service Operations -- General Overview of Where AI Is Making an Impact Today -- Event Management -- Where AI Is Making an Impact in Event Management Today -- Event Consolidation and Correlation -- Elimination of False Positives -- Thresholds -- Autonomous Action -- Trend Analysis -- Future Outlook for AI in Event Management -- Incident Management -- Where AI Is Making an Impact in Incident Management Today -- Notification -- Collaboration -- Auto-Recovery and Restoration -- Escalation -- Future Outlook for AI in Incident Management -- Request Fulfillment -- Future Outlook for AI in Request Fulfillment -- Problem Management -- Escalation -- Correlation/Root Cause Analysis -- Trending/Patterns.…”
    Full text (MFA users only)
    Electronic eBook
  10. 770
  11. 771
  12. 772

    Design optimization of fluid machinery : applying computational fluid dynamics and numerical optimization by Kim, Kwang-Yong, 1956-, Samad, Abdus, Benini, Ernesto

    Published 2019
    Table of Contents: “…2.2.5.3 Periodic/Cyclic Boundary Conditions2.2.5.4 Symmetry Boundary Conditions; 2.2.6 Moving Reference Frame (MRF); 2.2.7 Verification and Validation; 2.2.8 Commercial CFD Software; 2.2.9 Open Source Codes; 2.2.9.1 OpenFOAM; References; Chapter 3 Optimization Methodology; 3.1 Introduction; 3.1.1 Engineering Optimization Definition; 3.1.2 Design Space; 3.1.3 Design Variables and Objectives; 3.1.4 Optimization Procedure; 3.1.5 Search Algorithm; 3.2 Multi-Objective Optimization (MOO); 3.2.1 Weighted Sum Approach; 3.2.2 Pareto-Optimal Front…”
    Full text (MFA users only)
    Electronic eBook
  13. 773

    Danforth's obstetrics and gynecology.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  14. 774
  15. 775
  16. 776

    Lecture notes on the mathematics of acoustics

    Published 2005
    Full text (MFA users only)
    Electronic eBook
  17. 777

    Image processing and jump regression analysis by Qiu, Peihua, 1965-

    Published 2005
    Full text (MFA users only)
    Electronic eBook
  18. 778

    Data mining and warehousing by Prabhu, S.

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  19. 779
  20. 780