Search Results - (((((((ant OR kwants) OR wantsa) OR makart) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 161
  2. 162
  3. 163

    Getting Started with Greenplum for Big Data Analytics. by Gollapudi, Sunila

    Published 2013
    Table of Contents: “…Greenplum Unified Analytics Platform (UAP) -- Big Data analytics -- platform requirements -- Greenplum Unified Analytics Platform (UAP) -- Core components -- Greenplum Database -- Hadoop (HD) -- Chorus -- Command Center -- Modules -- Database modules -- HD modules -- Data Integration Accelerator (DIA) modules -- Core architecture concepts -- Data warehousing -- Column-oriented databases -- Parallel versus distributed computing/processing -- Shared nothing, massive parallel processing (MPP) systems, and elastic scalability -- Shared disk data architecture -- Shared memory data architecture -- Shared nothing data architecture -- Data loading patterns -- Greenplum UAP components -- Greenplum Database -- The Greenplum Database physical architecture -- The Greenplum high-availability architecture -- High-speed data loading using external tables.…”
    Full text (MFA users only)
    Electronic eBook
  4. 164

    High Performance Computing Systems and Applications & OSCAR Symposium. by International Symposium on High Performance Computing Systems and Applications (17th : 2003 : Sherbrooke, Quebec)

    Published 2003
    Table of Contents: “…""Table of Contents / Table des matières""; ""Preface""; ""Préface""; ""Symposium Organizers / Comité organisateur""; ""Program Committee / Comité scientifique""; ""Part I: Applications / Partie I: applications""; ""Concurrent Computation and Time Complexity Bounds for Algebraic Fractals""; ""Fast Algorithm to Estimate Dense Disparity Fields""; ""Evolutionary Grids of Interacting Stellar Binaries Containing Neutron Star Accretors""; ""HYDRA-MPI: An Adaptive Particle-Particle, Particle-Mesh Code for Conducting Cosmological Simulations on MPP Architectures""…”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow. by Ravichandiran, Sudharsan

    Published 2018
    Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
    Full text (MFA users only)
    Electronic eBook
  6. 166

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Smart buildings, smart communities and demand response

    Published 2021
    Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Computational models of argument : proceedings of COMMA 2014

    Published 2014
    Table of Contents: “…Properties of Random VAFs and Implications for Efficient AlgorithmsResolution-Based Grounded Semantics Revisited -- Decomposing Abstract Dialectical Frameworks -- A Principled Approach to the Implementation of Argumentation Models -- Combining Paraconsistent Logic with Argumentation -- Probabilistic Argument Graphs for Argumentation Lotteries -- Enthymeme Construction in Dialogues Using Shared Knowledge -- Strategies in Dialogues: A Game-Theoretic Approach -- Argumentation Logic -- Splitting Abstract Dialectical Frameworks…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  9. 169

    Social sensing : building reliable systems on unreliable data by Wang, Dong, Abdelzaher, Tarek, Kaplan, Lance

    Published 2015
    Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
    Full text (MFA users only)
    Electronic eBook
  10. 170
  11. 171

    Solving transport problems : towards green logistics

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  12. 172
  13. 173

    Artificial intelligent techniques for electric and hybrid electric vehicles

    Published 2020
    Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
    Full text (MFA users only)
    Electronic eBook
  14. 174

    Advanced manufacturing technology and systems : selected, peer reviewed papers from the 2012 International Conference on Advanced Manufacturing Technology and Systems (AMTS 2012),...

    Published 2012
    Table of Contents: “…A Study on Corrosion Resistance and Weatherability of Fluorocarbon Anti-Corrosion Coatings for External Surface of Ocean PlatformA Study on the Mechanical Properties of Polymer-Ceramic Composite Using Injection Moulding; An Enhanced Resolution Three-Dimensional Transformation Method Based on Discrete Wavelet Transform; An Entropy Based Analytical Model for Thermoelastic Damping in Micromechanical Resonators; An Improved Ant Colony Optimization for Large-Scale Simple Assembly Line Balancing Problem of Type-1…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 175

    Medical data privacy handbook

    Published 2015
    Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Cryptography : protocols, design, and applications

    Published 2012
    Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
    Full text (MFA users only)
    Electronic eBook
  17. 177

    Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics by Ahmadian, Amir Sharif

    Published 2016
    Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
    Full text (MFA users only)
    Electronic eBook
  18. 178

    Automatic Modeling and Fault Diagnosis of Timed Concurrent Discrete Event Systems : Automatische Modellierung und Fehlerdiagnose Zeitlicher Nebenläufiger Ereignisdiskreter Systeme.... by Schneider, Stefan

    Published 2015
    Table of Contents: “…3.3.3 Precision and Completeness Properties3.3.4 Identification Parameters; 3.4 Timed Distributed Modeling; 3.5 Identification of Timed Distributed Models; 3.5.1 Timed Distributed Identification Approach; 3.5.2 Precision and Completeness Properties; 3.5.3 Discussion on Shared I/Os; 3.6 Identification of Timed Distributed BMS Models; 3.6.1 Data Collection; 3.6.2 Timed Distributed Identification; 4 Partitioning of DES Models; 4.1 Preliminaries; 4.2 Causal Partitioning; 4.2.1 Distance and Causality; 4.2.2 Causal Partitioning Algorithm; 4.3 Optimal Partitioning; 4.3.1 Optimization Approach.…”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    Parallel Programming with Python. by Palach, Jan

    Published 2014
    Table of Contents: “…; Exploring common forms of parallelization; Communicating in parallel programming; Understanding shared state; Understanding message passing; Identifying parallel programming problems; Deadlock; Starvation; Race conditions; Discovering Python's parallel programming tools; The Python threading module; The Python multiprocessing module.…”
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Knowledge-based Intelligent System. by Jang, Hyejung

    Published 2014
    Full text (MFA users only)
    Electronic eBook