Search Results - (((((((ant OR kkantor) OR wiant) OR data) OR cantor) OR anne) OR halted) OR antiii) algorithms.

Search alternatives:

  1. 321

    Large Scale Network-Centric Distributed Systems

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  2. 322

    Learning Neo4j 3.x - Second Edition. by Baton, Jerome

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  3. 323

    Scientific computing with multicore and accelerators

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  4. 324
  5. 325
  6. 326
  7. 327
  8. 328
  9. 329

    Turing's vision : the birth of computer science by Bernhardt, Chris

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  10. 330
  11. 331

    Monnaies cryptées et blockchain : La confiance est-elle un algorithme? = Encrypted currencies and blockchain: is trust an algorithm?. by Ordonneau, Pascal

    Published 2018
    Table of Contents: “…9.2 Le big data contre les banques?9.3 Algorithme et tiers de confiance; 9.4 Le débat est ouvert; Deuxième partie : La blockchain est-elle l'alpha et l'oméga des relations sociales du futur?…”
    Full text (MFA users only)
    Electronic eBook
  12. 332

    Machine Learning for Asset Management New Developments and Financial Applications

    Published 2020
    Table of Contents: “…Empirical application -- 1.3.1. Data -- 1.3.2. Forecasts -- 1.3.3. Statistical gains -- 1.3.4. …”
    Full text (MFA users only)
    Electronic eBook
  13. 333

    Convergence : the redesign of design by Deutsch, Randy

    Published 2017
    Table of Contents: “…Challenges to Convergence ENDNOTES; IMAGES; CHAPTER 2 DATA AND INTUITION; A Look Back at the Data ; Quantitative vs. …”
    Full text (MFA users only)
    Electronic eBook
  14. 334
  15. 335

    Adventures in Raspberry Pi by Philbin, Carrie Anne

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  16. 336

    Functional Applications of Text Analytics Systems by Simske, Steven

    Published 2021
    Table of Contents: “…Non-Native Speakers -- 5.5.8 Virtual Reality and Augmented Reality -- 5.6 Test and Configuration -- 5.7 Summary -- 6: Learning -- 6.1 Introduction -- 6.1.1 Reading Order -- 6.1.2 Repurposing of Text -- 6.1.3 Philosophies of Learning -- 6.2 General Considerations -- 6.2.1 Metadata -- 6.2.2 Pathways of Learning -- 6.3 Machine Learning Aspects -- 6.3.1 Learning About Machine Learning -- 6.3.2 Machine Learning Constraints -- 6.4 Design/System Considerations -- 6.4.1 Do Not Use Machine Learning for the Sake of Using Machine Learning -- 6.4.2 Learning to Learn -- 6.4.3 Prediction Time -- 6.5 Applications/Examples -- 6.5.1 Curriculum Development -- 6.5.2 Customized Education Planning -- 6.5.3 Personalized Rehearsing -- 6.6 Test and Configuration -- 6.7 Summary -- 7: Testing and Configuration -- 7.1 Introduction -- 7.2 General Considerations -- 7.2.1 Data-Ops -- 7.2.2 Text Analytics and Immunological Data -- 7.2.3 Text Analytics and Cybersecurity -- 7.2.4 Data-Ops and Testing -- 7.3 Machine Learning Aspects -- 7.4 Design/System Considerations -- 7.5 Applications/Examples -- 7.6 Test and Configuration -- 7.7 Summary -- Index -- About the Author.…”
    Full text (MFA users only)
    Electronic eBook
  17. 337
  18. 338

    Foundations of predictive analytics by Wu, James, 1965-

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  19. 339

    Cyber-Risk Informatics : Engineering Evaluation with Data Science. by Sahinoglu, Mehmet

    Published 2016
    Table of Contents: “…3.4 STOPPING RULE FOR TESTING IN THE TIME DOMAIN -- 3.5 DISCUSSIONS AND CONCLUSION -- 3.6 EXERCISES -- REFERENCES -- 4 SECURITY ASSESSMENT AND MANAGEMENT IN CYBER-RISK -- 4.1 INTRODUCTION -- 4.2 SECURITY METER (SM) MODEL DESIGN -- 4.3 VERIFICATION OF THE PROBABILISTIC SECURITY METER (SM) METHOD BY MONTE CARLO SIMULATION AND MATH-STATISTICAL TRIPLE-PRODUCT RULE -- 4.4 MODIFYING THE SM QUANTITATIVE MODEL FOR CATEGORICAL, HYBRID, AND NONDISJOINT DATA -- 4.5 MAINTENANCE PRIORITY DETERMINATION FOR 3 × 3 × 2 SM -- 4.6 PRIVACY METER (PM): HOW TO QUANTIFY PRIVACY BREACH…”
    Full text (MFA users only)
    Electronic eBook
  20. 340

    Basic data analysis for time series with R by Derryberry, DeWayne R.

    Published 2014
    Table of Contents: “…Importing Data, --…”
    Full text (MFA users only)
    Electronic eBook