Search Results - (((((((ant OR kokontis) OR mantis) OR hints) OR cantor) OR anne) OR file) OR granting) algorithms.

  1. 261
  2. 262

    Hands-On Data Warehousing with Azure Data Factory : ETL techniques to load and transform data from various sources, both on-premises and on cloud. by Kamrat Gutzait, Michelle

    Published 2018
    Table of Contents: “…Ways to directly copy files into the Data LakePrerequisites for the next steps; Creating a Data Lake Analytics resource; Using the data factory to manipulate data in the Data Lake; Task 1 -- copy/import data from SQL Server to a blob storage file using data factory; Task 2 -- run a U-SQL task from the data factory pipeline to summarize data; Service principal authentication; Run U-SQL from a job in the Data Lake Analytics; Summary; Chapter 5: Machine Learning on the Cloud; Machine learning overview; Machine learning algorithms; Supervised learning; Unsupervised learning; Reinforcement learning.…”
    Full text (MFA users only)
    Electronic eBook
  3. 263

    Financial instrument pricing using C++ by Duffy, Daniel J.

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  4. 264

    Metaheuristics for vehicle routing problems. by Labadie, Nacima

    Published 2015
    Table of Contents: “…Memetic algorithm; 4.1.3. Memetic algorithm with population management; 4.1.4. …”
    Full text (MFA users only)
    Electronic eBook
  5. 265

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  6. 266

    Neural Networks : a Systematic Introduction by Rojas, Raúl

    Published 1996
    Full text (MFA users only)
    Electronic eBook
  7. 267
  8. 268

    Parallel computing : technology trends

    Published 2020
    Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  9. 269

    Automata and Computability. by Kozen, Dexter, 1951-

    Published 1997
    Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
    Full text (MFA users only)
    Electronic eBook
  10. 270

    Practical Machine Learning in R. by Nwanganga, Fred

    Published 2020
    Table of Contents: “…Chapter 3 Managing Data -- The Tidyverse -- Data Collection -- Key Considerations -- Collecting Ground Truth Data -- Data Relevance -- Quantity of Data -- Ethics -- Importing the Data -- Reading Comma-Delimited Files -- Reading Other Delimited Files -- Data Exploration -- Describing the Data -- Instance -- Feature -- Dimensionality -- Sparsity and Density -- Resolution -- Descriptive Statistics -- Visualizing the Data -- Comparison -- Relationship -- Distribution -- Composition -- Data Preparation -- Cleaning the Data -- Missing Values -- Noise -- Outliers -- Class Imbalance…”
    Full text (MFA users only)
    Electronic eBook
  11. 271

    Computational mechanics of discontinua by Munjiza, Antonio A.

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  12. 272
  13. 273
  14. 274
  15. 275

    F♯ for Machine Learning Essentials. by Mukherjee, Sudipta

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  16. 276

    Java programming interviews exposed by Markham, Noel

    Published 2014
    Table of Contents: “…Chapter 18: Useful LibrariesRemoving Boilerplate Code with Apache Commons; Developing with Guava Collections; Using Joda Time; Summary; Chapter 19: Developing with Build Tools; Building Applications with Maven; Ant; Summary; Chapter 20: Android; Basics; User Interface; Persistence; Android Hardware; Summary; Appendix: Introducing Scala; Scala Basics; Functions as Values; Immutability; Summary; Index.…”
    Full text (MFA users only)
    Electronic eBook
  17. 277
  18. 278

    Legitimate applications of peer to peer networks by Verma, Dinesh C.

    Published 2004
    Table of Contents: “…-- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir.…”
    Full text (MFA users only)
    Electronic eBook
  19. 279

    The Method of Fundamental Solutions. by LI, Zi-Cai

    Published 2023
    Full text (MFA users only)
    Electronic eBook
  20. 280

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…Computers and Information Processing Technologies I; Preface and Conference Organization; Table of Contents; Chapter 1: Advanced Computing Technology and Mathematical Modeling; A Dirichlet-Neumann Alternating Algorithm Using Elliptical Arc Artificial Boundary for Exterior Problems with a Concave Angle; A Large-Scale and Flexible BMS Design; A Quantitative Evaluation Method Based on Hierarchical Architecture Model of Cloud Service Availability; Research on MapReduce Task Dynamic Balancing Strategy Based on File Label; Researches on Data Privacy in Cloud Computing Based on Game Theory.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook