Search Results - (((((((ant OR kokontis) OR mantis) OR hints) OR cantor) OR anne) OR file) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 81
- Mathematical models 62
- Mathematics 58
- Algorithms 47
- Artificial intelligence 43
- algorithms 41
- Machine learning 38
- artificial intelligence 31
- methods 30
- Data mining 29
- Mathematical optimization 29
- Computer networks 24
- Signal processing 22
- Artificial Intelligence 21
- Computer algorithms 21
- Digital techniques 21
- Development 20
- Python (Computer program language) 19
- Data Mining 18
- Application software 17
- Diseases 17
- Image processing 17
- Research 15
- Technological innovations 15
- therapy 15
- Computational Biology 14
- Computer science 14
- Computer simulation 14
- Statistical methods 14
- Computer security 13
Search alternatives:
-
261
Mobile opportunistic networks : architectures, protocols and applications
Published 2011Full text (MFA users only)
Electronic eBook -
262
Hands-On Data Warehousing with Azure Data Factory : ETL techniques to load and transform data from various sources, both on-premises and on cloud.
Published 2018Table of Contents: “…Ways to directly copy files into the Data LakePrerequisites for the next steps; Creating a Data Lake Analytics resource; Using the data factory to manipulate data in the Data Lake; Task 1 -- copy/import data from SQL Server to a blob storage file using data factory; Task 2 -- run a U-SQL task from the data factory pipeline to summarize data; Service principal authentication; Run U-SQL from a job in the Data Lake Analytics; Summary; Chapter 5: Machine Learning on the Cloud; Machine learning overview; Machine learning algorithms; Supervised learning; Unsupervised learning; Reinforcement learning.…”
Full text (MFA users only)
Electronic eBook -
263
-
264
Metaheuristics for vehicle routing problems.
Published 2015Table of Contents: “…Memetic algorithm; 4.1.3. Memetic algorithm with population management; 4.1.4. …”
Full text (MFA users only)
Electronic eBook -
265
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook -
266
Neural Networks : a Systematic Introduction
Published 1996Full text (MFA users only)
Electronic eBook -
267
Electromagnetic theory and computation : a topological approach
Published 2004Full text (MFA users only)
Electronic eBook -
268
Parallel computing : technology trends
Published 2020Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
269
Automata and Computability.
Published 1997Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
Full text (MFA users only)
Electronic eBook -
270
Practical Machine Learning in R.
Published 2020Table of Contents: “…Chapter 3 Managing Data -- The Tidyverse -- Data Collection -- Key Considerations -- Collecting Ground Truth Data -- Data Relevance -- Quantity of Data -- Ethics -- Importing the Data -- Reading Comma-Delimited Files -- Reading Other Delimited Files -- Data Exploration -- Describing the Data -- Instance -- Feature -- Dimensionality -- Sparsity and Density -- Resolution -- Descriptive Statistics -- Visualizing the Data -- Comparison -- Relationship -- Distribution -- Composition -- Data Preparation -- Cleaning the Data -- Missing Values -- Noise -- Outliers -- Class Imbalance…”
Full text (MFA users only)
Electronic eBook -
271
-
272
Media Backends : Digital Infrastructures and Sociotechnical Relations.
Published 2023Full text (MFA users only)
Electronic eBook -
273
Perspectives on adaptation in natural and artificial systems
Published 2005Full text (MFA users only)
Electronic eBook -
274
Open innovation : new product development essentials from the PDMA
Published 2014Full text (MFA users only)
Electronic eBook -
275
-
276
Java programming interviews exposed
Published 2014Table of Contents: “…Chapter 18: Useful LibrariesRemoving Boilerplate Code with Apache Commons; Developing with Guava Collections; Using Joda Time; Summary; Chapter 19: Developing with Build Tools; Building Applications with Maven; Ant; Summary; Chapter 20: Android; Basics; User Interface; Persistence; Android Hardware; Summary; Appendix: Introducing Scala; Scala Basics; Functions as Values; Immutability; Summary; Index.…”
Full text (MFA users only)
Electronic eBook -
277
Digital design of signal processing systems : a practical approach
Published 2011Full text (MFA users only)
Electronic eBook -
278
Legitimate applications of peer to peer networks
Published 2004Table of Contents: “…-- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir.…”
Full text (MFA users only)
Electronic eBook -
279
-
280
Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...
Published 2014Table of Contents: “…Computers and Information Processing Technologies I; Preface and Conference Organization; Table of Contents; Chapter 1: Advanced Computing Technology and Mathematical Modeling; A Dirichlet-Neumann Alternating Algorithm Using Elliptical Arc Artificial Boundary for Exterior Problems with a Concave Angle; A Large-Scale and Flexible BMS Design; A Quantitative Evaluation Method Based on Hierarchical Architecture Model of Cloud Service Availability; Research on MapReduce Task Dynamic Balancing Strategy Based on File Label; Researches on Data Privacy in Cloud Computing Based on Game Theory.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook