Search Results - (((((((ant OR kkantis) OR wantsa) OR making) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 21

    Introduction to cryptography by Padhye, Sahadeo, Sahu, Rajeev A., Saraswat, Vishal

    Published 2018
    Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
    Full text (MFA users only)
    Electronic eBook
  2. 22

    The Sharing Economy : Implications for the Future of Hospitality and Tourism. by Okumus, Fevzi

    Published 2017
    Table of Contents: “…Chaos and complexity in tourismStudy tenets -- The sharing economy and tourism -- Peer-to-peer accommodation in Greece -- Methods -- Participants -- Sample determination and collection -- Measures -- Implementation of fuzzy-set qualitative comparative analysis algorithms -- Results -- Sufficient complex statements -- Discussion -- Confirmation of tenets -- Fuzzy-set qualitative comparative analysis versus regression and Cramerâ#x80;#x99;s V -- Fit and predictive validity -- Managerial implications -- Limitations and future research -- References…”
    Full text (MFA users only)
    Electronic eBook
  3. 23

    Parallel Computing Using the Prefix Problem. by Lakshmivarahan, S.

    Published 1994
    Table of Contents: “…Preface; Acknowledgments; Part One -- Getting Started; Chapter 1 -- The Prefix Problem And Its Applications; 1.1 The Prefix Problem; 1.2 Why Prefix Problem; 1.3 Exercises; 1.4 Notes and References; Chapter 2 -- Parallel Machines And Models -- An Overview; 2.1 The Need for Parallelism; 2.2 A Classification of Parallel Computers; 2.3 Parallel Models; 2.4 Performance Measures; 2.5 A Parallel Complexity Class; 2.6 Brent's Inequality; 2.7 A Simple Lower Bound; 2.8 Exercises; 2.9 Notes and References; Part Two -- Algorithms For Shared Memory Models.…”
    Full text (MFA users only)
    Electronic eBook
  4. 24

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  5. 25

    Evolutionary optimization algorithms by Simon, Dan, 1960-

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  6. 26
  7. 27

    Concurrency by Malkhi, Dahlia

    Published 2019
    Table of Contents: “…TECHNICAL PERSPECTIVES ON LAMPORT'SWORK -- 1. Shared Memory and the Bakery Algorithm -- 2. The Notions of Time and Global State in a Distributed System -- 3. …”
    Full text (MFA users only)
    Electronic eBook
  8. 28

    How to guard an art gallery and other discrete mathematical adventures by Michael, T. S., 1960-

    Published 2009
    Table of Contents: “…s Problem -- 1.2 A Recurring Theme -- 1.3 Make a Difference -- 1.4 How Many Toppings? -- 1.5 Proof without Words -- 1.6 Count â€?…”
    Full text (MFA users only)
    Electronic eBook
  9. 29
  10. 30

    Algorithms and architectures of artificial intelligence by Tõugu, Enn, 1935-

    Published 2007
    Table of Contents: “…Language of algorithms -- Knowledge Handling -- Search -- Learning and Decision Making -- Problem Solving and Planning.…”
    Full text (MFA users only)
    Electronic eBook
  11. 31

    Swarm Intelligence Algorithms : Modifications and Applications. by Slowik, Adam

    Published 2020
    Table of Contents: “…-- 1.2.3 Pseudo-code of standard ACO algorithm -- 1.3 Modified variants of ant colony optimization -- 1.3.1 Elitist ant systems -- 1.3.2 Ant colony system -- 1.3.3 Max-min ant system -- 1.3.4 Rank based ant systems -- 1.3.5 Continuous orthogonal ant systems…”
    Full text (MFA users only)
    Electronic eBook
  12. 32

    Genetic algorithm essentials by Kramer, Oliver

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  13. 33

    Computer search algorithms

    Published 2011
    Table of Contents: “…COMPUTER SEARCH ALGORITHMS ; COMPUTER SEARCH ALGORITHMS ; CONTENTS ; PREFACE ; LIVE SOFT-MATTER QUANTUM COMPUTING ; ABSTRACT ; INTRODUCTION ; EVOLUTIONARY TRANSITIONS, CONFLICT MEDIATION, AND QUANTUM MECHANICS; QUANTUM CELL BIOLOGY AND CELLULAR DECISION MAKING ; MICROBIAL INTELLIGENCES AND LIVE, SOFT MATTER QUANTUM COMPUTING; DIRECTIONS FOR FUTURE RESEARCH AND DEVELOPMENT OF BIOTECHNOLOGIES ; CONCLUSION ; ACKNOWLEDGMENTS; REFERENCES ; STUDYING DIFFERENT HEURISTIC SEARCHES TO SOLVE A REAL-WORLD FREQUENCY ASSIGNMENT PROBLEM; ABSTRACT ; INTRODUCTION.…”
    Full text (MFA users only)
    Electronic eBook
  14. 34

    Discrete Algorithms and Complexity : Proceedings of the Japan-US Joint Seminar, June 4-6, 1986, Kyoto, Japan.

    Published 1987
    Table of Contents: “…Front Cover; Discrete Algorithms and Complexity; Copyright Page; Table of Contents; Contributors; Foreword; Chapter 1. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 35

    Algorithmic trading methods : applications using advanced statistics, optimization, and machine learning techniques by Kissell, Robert, 1967-

    Published 2021
    Table of Contents: “…Introduction -- What is Electronic Trading? -- What is Algorithmic Trading? -- Trading Algorithm Classifications -- Trading Algorithm Styles -- Investment Cycle -- Investment Objective -- Information Content -- Investment Styles -- Investment Strategies -- Research Data -- Broker Trading Desks -- Research Function -- Sales Function -- Implementation Types -- Algorithmic Decision-Making Process -- Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  16. 36

    Responsible Data Science : transparency and fairness in algorithms by Fleming, Grant

    Published 2021
    Table of Contents: “…Data-Centric Models 20 -- Holdout Sample and Cross-Validation 20 -- Overfitting 21 -- Unsupervised Learning 22 -- The Ethical Challenge of Black Boxes 23 -- Two Opposing Forces 24 -- Pressure for More Powerful AI 24 -- Public Resistance and Anxiety 24 -- Summary 25 -- Chapter 2 Background: Modeling and the Black-Box Algorithm 27 -- Assessing Model Performance 27 -- Predicting Class Membership 28 -- The Rare Class Problem 28 -- Lift and Gains 28 -- Area Under the Curve 29 -- AUC vs. …”
    Full text (MFA users only)
    Electronic eBook
  17. 37
  18. 38
  19. 39

    Network-Based Distributed Planning Using Coevolutionary Algorithms. by Subbu, Raj

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  20. 40

    Heuristics in analytics : a practical perspective of what influences our analytical world by Reis Pinheiro, Carlos Andre, 1940-, McNeill, Fiona

    Published 2014
    Subjects: “…Decision making Statistical methods.…”
    Full text (MFA users only)
    Electronic eBook