Search Results - (((((((ant OR kkantor) OR wiant) OR data) OR cantor) OR anne) OR halted) OR antiii) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 250
- Mathematical models 140
- Mathematics 107
- Artificial intelligence 101
- Machine learning 99
- Algorithms 79
- Data mining 78
- algorithms 74
- artificial intelligence 65
- Computer algorithms 54
- Computer networks 53
- methods 45
- Data Mining 42
- Big data 41
- Technological innovations 41
- Digital techniques 40
- Artificial Intelligence 39
- Electronic data processing 39
- Computer simulation 38
- Mathematical optimization 38
- Statistical methods 38
- Research 37
- Bioinformatics 36
- Python (Computer program language) 36
- Security measures 36
- Signal processing 36
- Information technology 35
- Computer science 34
- Management 32
- Computational Biology 31
Search alternatives:
- kkantor »
-
321
Large Scale Network-Centric Distributed Systems
Published 2014Full text (MFA users only)
Electronic eBook -
322
-
323
Scientific computing with multicore and accelerators
Published 2010Full text (MFA users only)
Electronic eBook -
324
Computational fluid and solid mechanics 2003 : proceedings, Second MIT Conference on Computational Fluid and Solid Mechanics, June 17-20, 2003
Published 2003Full text (MFA users only)
Electronic Conference Proceeding eBook -
325
Computer Algebra and Symbolic Computation : Mathematical Methods.
Published 2003Full text (MFA users only)
Electronic eBook -
326
Applied Predictive Analytics : Principles and Techniques for the Professional Data Analyst
Published 2014Full text (MFA users only)
Electronic eBook -
327
Symbolic Computation : Solving Equations in Algebra, Geometry, and Engineering.
Published 2001Full text (MFA users only)
Electronic eBook -
328
Metaheuristic applications in structures and infrastructures
Published 2013Full text (MFA users only)
Electronic eBook -
329
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
330
-
331
Monnaies cryptées et blockchain : La confiance est-elle un algorithme? = Encrypted currencies and blockchain: is trust an algorithm?.
Published 2018Table of Contents: “…9.2 Le big data contre les banques?9.3 Algorithme et tiers de confiance; 9.4 Le débat est ouvert; Deuxième partie : La blockchain est-elle l'alpha et l'oméga des relations sociales du futur?…”
Full text (MFA users only)
Electronic eBook -
332
Machine Learning for Asset Management New Developments and Financial Applications
Published 2020Table of Contents: “…Empirical application -- 1.3.1. Data -- 1.3.2. Forecasts -- 1.3.3. Statistical gains -- 1.3.4. …”
Full text (MFA users only)
Electronic eBook -
333
Convergence : the redesign of design
Published 2017Table of Contents: “…Challenges to Convergence ENDNOTES; IMAGES; CHAPTER 2 DATA AND INTUITION; A Look Back at the Data ; Quantitative vs. …”
Full text (MFA users only)
Electronic eBook -
334
Bandwidth allocation for video under quality of service constraints
Published 2015Full text (MFA users only)
Electronic eBook -
335
-
336
Functional Applications of Text Analytics Systems
Published 2021Table of Contents: “…Non-Native Speakers -- 5.5.8 Virtual Reality and Augmented Reality -- 5.6 Test and Configuration -- 5.7 Summary -- 6: Learning -- 6.1 Introduction -- 6.1.1 Reading Order -- 6.1.2 Repurposing of Text -- 6.1.3 Philosophies of Learning -- 6.2 General Considerations -- 6.2.1 Metadata -- 6.2.2 Pathways of Learning -- 6.3 Machine Learning Aspects -- 6.3.1 Learning About Machine Learning -- 6.3.2 Machine Learning Constraints -- 6.4 Design/System Considerations -- 6.4.1 Do Not Use Machine Learning for the Sake of Using Machine Learning -- 6.4.2 Learning to Learn -- 6.4.3 Prediction Time -- 6.5 Applications/Examples -- 6.5.1 Curriculum Development -- 6.5.2 Customized Education Planning -- 6.5.3 Personalized Rehearsing -- 6.6 Test and Configuration -- 6.7 Summary -- 7: Testing and Configuration -- 7.1 Introduction -- 7.2 General Considerations -- 7.2.1 Data-Ops -- 7.2.2 Text Analytics and Immunological Data -- 7.2.3 Text Analytics and Cybersecurity -- 7.2.4 Data-Ops and Testing -- 7.3 Machine Learning Aspects -- 7.4 Design/System Considerations -- 7.5 Applications/Examples -- 7.6 Test and Configuration -- 7.7 Summary -- Index -- About the Author.…”
Full text (MFA users only)
Electronic eBook -
337
Data fusion support to activity-based intelligence
Published 2016Full text (MFA users only)
Electronic eBook -
338
-
339
Cyber-Risk Informatics : Engineering Evaluation with Data Science.
Published 2016Table of Contents: “…3.4 STOPPING RULE FOR TESTING IN THE TIME DOMAIN -- 3.5 DISCUSSIONS AND CONCLUSION -- 3.6 EXERCISES -- REFERENCES -- 4 SECURITY ASSESSMENT AND MANAGEMENT IN CYBER-RISK -- 4.1 INTRODUCTION -- 4.2 SECURITY METER (SM) MODEL DESIGN -- 4.3 VERIFICATION OF THE PROBABILISTIC SECURITY METER (SM) METHOD BY MONTE CARLO SIMULATION AND MATH-STATISTICAL TRIPLE-PRODUCT RULE -- 4.4 MODIFYING THE SM QUANTITATIVE MODEL FOR CATEGORICAL, HYBRID, AND NONDISJOINT DATA -- 4.5 MAINTENANCE PRIORITY DETERMINATION FOR 3 × 3 × 2 SM -- 4.6 PRIVACY METER (PM): HOW TO QUANTIFY PRIVACY BREACH…”
Full text (MFA users only)
Electronic eBook -
340
Basic data analysis for time series with R
Published 2014Table of Contents: “…Importing Data, --…”
Full text (MFA users only)
Electronic eBook