Search Results - (((((((ant OR kkantis) OR wants) OR hints) OR cantor) OR anne) OR file) OR wanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 87
- Mathematical models 64
- Mathematics 58
- Algorithms 47
- Artificial intelligence 44
- Machine learning 44
- algorithms 41
- methods 34
- artificial intelligence 33
- Data mining 32
- Mathematical optimization 30
- Artificial Intelligence 24
- Computer networks 24
- Python (Computer program language) 23
- Signal processing 22
- Development 21
- Digital techniques 21
- Computer algorithms 20
- Data Mining 20
- Application software 19
- Image processing 17
- Computer science 16
- Diseases 16
- Computational Biology 15
- Computer simulation 15
- Neural networks (Computer science) 15
- Technological innovations 15
- Electronic data processing 14
- Statistical methods 14
- Computer security 13
Search alternatives:
- ant »
- kkantis »
- wants »
- cantor »
- wanting »
-
281
Digital design of signal processing systems : a practical approach
Published 2011Full text (MFA users only)
Electronic eBook -
282
Legitimate applications of peer to peer networks
Published 2004Table of Contents: “…-- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir.…”
Full text (MFA users only)
Electronic eBook -
283
Anesthesia student survival guide : a case-based approach
Published 2016Full text (MFA users only)
Electronic eBook -
284
Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...
Published 2014Table of Contents: “…Computers and Information Processing Technologies I; Preface and Conference Organization; Table of Contents; Chapter 1: Advanced Computing Technology and Mathematical Modeling; A Dirichlet-Neumann Alternating Algorithm Using Elliptical Arc Artificial Boundary for Exterior Problems with a Concave Angle; A Large-Scale and Flexible BMS Design; A Quantitative Evaluation Method Based on Hierarchical Architecture Model of Cloud Service Availability; Research on MapReduce Task Dynamic Balancing Strategy Based on File Label; Researches on Data Privacy in Cloud Computing Based on Game Theory.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
285
Numerical linear algebra with applications : using MATLAB
Published 2015Full text (MFA users only)
Electronic eBook -
286
Materials Informatics : Methods, Tools, and Applications
Published 2019Full text (MFA users only)
Electronic eBook -
287
-
288
Introduction to graph theory
Published 2009Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
Full text (MFA users only)
Electronic eBook -
289
Numerical linear algebra : proceedings of the Conference in Numerical Linear Algebra and Scientific Computation, Kent (Ohio), USA, March 13-14, 1992
Published 1993Full text (MFA users only)
Electronic Conference Proceeding eBook -
290
-
291
Modelling for coastal hydraulics and engineering
Published 2010Full text (MFA users only)
Electronic eBook -
292
Combinatorial maps : efficient data structures for computer graphics and image processing
Published 2015Full text (MFA users only)
Electronic eBook -
293
Deep Learning with Pytorch Quick Start Guide : Learn to Train and Deploy Neural Network Models in Python.
Published 2018Full text (MFA users only)
Electronic eBook -
294
Medical and Care Compunetics 2 : Medical and Care Compunetics 2.
Published 2005Full text (MFA users only)
Electronic eBook -
295
Applied mechatronics and android robotics : selected, peer reviewed papers from the International Conference on Applied Mechatronics and Android Robotics (ICAMAR 2013), July 13-14,...
Published 2013Table of Contents: “…Applied Mechatronics and Android Robotics; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Robot Design, Motion Planning and Robot Control; Design of a Master Manipulator with Dynamical Simplification for Master-Slave Robot; Parameter Self-Adjusting Path Tracking Algorithm of Mobile Robots; Global Path Planning for Mobile Robot Based on Improved Ant Colony Algorithms; A Study of Robot Platform Based on WiFi Remote Control; Fire Detection System Based-On Mobile Robots; Phase Plane Analysis of Battery Series Balancing on Robot…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
296
-
297
Slantwise moves : games, literature, and social invention in nineteenth-century America
Published 2018Full text (MFA users only)
Electronic eBook -
298
Optimal resources allocation : with practical statistical applications and theory
Published 2013Full text (MFA users only)
Electronic eBook -
299
Programming MapReduce with Scalding : a practical guide to designing, testing, and implementing complex MapReduce applications in Scala
Published 2014Table of Contents: “…The Late Bound Dependency patternSummary; Testing and TDD; Introduction to testing; MapReduce testing challenges; Development lifecycle with testing strategy; TDD for Scalding developers; Implementing the TDD methodology; Decomposing the algorithm; Defining acceptance tests; Implementing integration tests; Implementing unit tests; Implementing the MapReduce logic; Defining and performing system tests; Black box testing; Summary; Running Scalding in Production; Executing Scalding in a Hadoop cluster; Scheduling execution; Coordinating job execution; Configuring using a property file…”
Full text (MFA users only)
Electronic eBook -
300
Computational biology and genome informatics
Published 2003Full text (MFA users only)
Electronic eBook