Search Results - (((((((ant OR kkantis) OR wantsa) OR making) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 63
- Artificial intelligence 58
- Mathematical models 56
- Machine learning 52
- Mathematics 47
- Decision making 38
- artificial intelligence 34
- Data mining 33
- Mathematical optimization 32
- Algorithms 31
- algorithms 30
- Technological innovations 26
- Python (Computer program language) 23
- Artificial Intelligence 21
- Social aspects 21
- Computer algorithms 20
- Computer networks 20
- methods 20
- Big data 18
- decision making 18
- Application software 17
- Information technology 17
- Data Mining 16
- Development 16
- Management 16
- Decision Making 14
- Neural networks (Computer science) 14
- Research 13
- Bioinformatics 12
- Computer science 12
Search alternatives:
- ant »
- kkantis »
- wantsa »
- cantor »
-
21
Introduction to cryptography
Published 2018Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
Full text (MFA users only)
Electronic eBook -
22
The Sharing Economy : Implications for the Future of Hospitality and Tourism.
Published 2017Table of Contents: “…Chaos and complexity in tourismStudy tenets -- The sharing economy and tourism -- Peer-to-peer accommodation in Greece -- Methods -- Participants -- Sample determination and collection -- Measures -- Implementation of fuzzy-set qualitative comparative analysis algorithms -- Results -- Sufficient complex statements -- Discussion -- Confirmation of tenets -- Fuzzy-set qualitative comparative analysis versus regression and Cramerâ#x80;#x99;s V -- Fit and predictive validity -- Managerial implications -- Limitations and future research -- References…”
Full text (MFA users only)
Electronic eBook -
23
Parallel Computing Using the Prefix Problem.
Published 1994Table of Contents: “…Preface; Acknowledgments; Part One -- Getting Started; Chapter 1 -- The Prefix Problem And Its Applications; 1.1 The Prefix Problem; 1.2 Why Prefix Problem; 1.3 Exercises; 1.4 Notes and References; Chapter 2 -- Parallel Machines And Models -- An Overview; 2.1 The Need for Parallelism; 2.2 A Classification of Parallel Computers; 2.3 Parallel Models; 2.4 Performance Measures; 2.5 A Parallel Complexity Class; 2.6 Brent's Inequality; 2.7 A Simple Lower Bound; 2.8 Exercises; 2.9 Notes and References; Part Two -- Algorithms For Shared Memory Models.…”
Full text (MFA users only)
Electronic eBook -
24
Pathway modeling and algorithm research
Published 2011Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
25
-
26
-
27
Concurrency
Published 2019Table of Contents: “…TECHNICAL PERSPECTIVES ON LAMPORT'SWORK -- 1. Shared Memory and the Bakery Algorithm -- 2. The Notions of Time and Global State in a Distributed System -- 3. …”
Full text (MFA users only)
Electronic eBook -
28
How to guard an art gallery and other discrete mathematical adventures
Published 2009Table of Contents: “…s Problem -- 1.2 A Recurring Theme -- 1.3 Make a Difference -- 1.4 How Many Toppings? -- 1.5 Proof without Words -- 1.6 Count â€?…”
Full text (MFA users only)
Electronic eBook -
29
Providing Sound Foundations for Cryptography : On the Work of Shafi Goldwasser and Silvio Micali.
Published 2019Full text (MFA users only)
Electronic eBook -
30
Algorithms and architectures of artificial intelligence
Published 2007Table of Contents: “…Language of algorithms -- Knowledge Handling -- Search -- Learning and Decision Making -- Problem Solving and Planning.…”
Full text (MFA users only)
Electronic eBook -
31
Swarm Intelligence Algorithms : Modifications and Applications.
Published 2020Table of Contents: “…-- 1.2.3 Pseudo-code of standard ACO algorithm -- 1.3 Modified variants of ant colony optimization -- 1.3.1 Elitist ant systems -- 1.3.2 Ant colony system -- 1.3.3 Max-min ant system -- 1.3.4 Rank based ant systems -- 1.3.5 Continuous orthogonal ant systems…”
Full text (MFA users only)
Electronic eBook -
32
-
33
Computer search algorithms
Published 2011Table of Contents: “…COMPUTER SEARCH ALGORITHMS ; COMPUTER SEARCH ALGORITHMS ; CONTENTS ; PREFACE ; LIVE SOFT-MATTER QUANTUM COMPUTING ; ABSTRACT ; INTRODUCTION ; EVOLUTIONARY TRANSITIONS, CONFLICT MEDIATION, AND QUANTUM MECHANICS; QUANTUM CELL BIOLOGY AND CELLULAR DECISION MAKING ; MICROBIAL INTELLIGENCES AND LIVE, SOFT MATTER QUANTUM COMPUTING; DIRECTIONS FOR FUTURE RESEARCH AND DEVELOPMENT OF BIOTECHNOLOGIES ; CONCLUSION ; ACKNOWLEDGMENTS; REFERENCES ; STUDYING DIFFERENT HEURISTIC SEARCHES TO SOLVE A REAL-WORLD FREQUENCY ASSIGNMENT PROBLEM; ABSTRACT ; INTRODUCTION.…”
Full text (MFA users only)
Electronic eBook -
34
Discrete Algorithms and Complexity : Proceedings of the Japan-US Joint Seminar, June 4-6, 1986, Kyoto, Japan.
Published 1987Table of Contents: “…Front Cover; Discrete Algorithms and Complexity; Copyright Page; Table of Contents; Contributors; Foreword; Chapter 1. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
35
Algorithmic trading methods : applications using advanced statistics, optimization, and machine learning techniques
Published 2021Table of Contents: “…Introduction -- What is Electronic Trading? -- What is Algorithmic Trading? -- Trading Algorithm Classifications -- Trading Algorithm Styles -- Investment Cycle -- Investment Objective -- Information Content -- Investment Styles -- Investment Strategies -- Research Data -- Broker Trading Desks -- Research Function -- Sales Function -- Implementation Types -- Algorithmic Decision-Making Process -- Chapter 2. …”
Full text (MFA users only)
Electronic eBook -
36
Responsible Data Science : transparency and fairness in algorithms
Published 2021Table of Contents: “…Data-Centric Models 20 -- Holdout Sample and Cross-Validation 20 -- Overfitting 21 -- Unsupervised Learning 22 -- The Ethical Challenge of Black Boxes 23 -- Two Opposing Forces 24 -- Pressure for More Powerful AI 24 -- Public Resistance and Anxiety 24 -- Summary 25 -- Chapter 2 Background: Modeling and the Black-Box Algorithm 27 -- Assessing Model Performance 27 -- Predicting Class Membership 28 -- The Rare Class Problem 28 -- Lift and Gains 28 -- Area Under the Curve 29 -- AUC vs. …”
Full text (MFA users only)
Electronic eBook -
37
An Introduction to Algorithmic Trading : Basic to Advanced Strategies.
Published 2011Full text (MFA users only)
Electronic eBook -
38
Structural geology algorithms : vectors and tensors
Published 2012Full text (MFA users only)
Electronic eBook -
39
Network-Based Distributed Planning Using Coevolutionary Algorithms.
Published 2004Full text (MFA users only)
Electronic eBook -
40
Heuristics in analytics : a practical perspective of what influences our analytical world
Published 2014Subjects: “…Decision making Statistical methods.…”
Full text (MFA users only)
Electronic eBook