Search Results - (((((((ant OR manthe) OR file) OR semantic) OR cantor) OR anne) OR halted) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 90
- Mathematical models 64
- Mathematics 62
- Artificial intelligence 57
- Algorithms 44
- Machine learning 40
- algorithms 38
- Data mining 35
- artificial intelligence 34
- methods 31
- Mathematical optimization 28
- Computer networks 24
- Artificial Intelligence 23
- Computer science 22
- Signal processing 21
- Data Mining 20
- Python (Computer program language) 20
- Technological innovations 20
- Development 19
- Digital techniques 19
- Computer algorithms 18
- Application software 17
- Diseases 17
- Computer simulation 16
- Image processing 16
- Computational Biology 15
- Research 15
- therapy 15
- Computer security 14
- Statistical methods 14
Search alternatives:
- ant »
- manthe »
- semantic »
- cantor »
- granting »
- halted »
-
181
Obstetric and intrapartum emergencies : a practical guide to management
Published 2012Full text (MFA users only)
Electronic eBook -
182
Handbook of performability engineering
Published 2008Table of Contents: “…HALT and HASS Overview: The New Quality and Reliability Paradigm /…”
Full text (MFA users only)
Electronic eBook -
183
Integrated systems engineering : a postprint volume from the IFAC Conference, Baden-Baden, Germany, 27-29 September 1994
Published 1995Table of Contents: “…An Optimisation-Based Algorithm for Designing Free-Form Trajectories Under Various Constraints /…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
184
-
185
-
186
When life is linear : from computer graphics to bracketology
Published 2015Full text (MFA users only)
Electronic eBook -
187
Design for embedded image processing on FPGAs
Published 2011Full text (MFA users only)
Electronic eBook -
188
Interactive displays : natural human interface technologies
Published 2015Table of Contents: “…Gesture Detection Algorithm /…”
Full text (MFA users only)
Electronic eBook -
189
Computer science : reflections on the field, reflections from the field
Published 2004Full text (MFA users only)
Electronic eBook -
190
Direct numerical simulations of gas-liquid multiphase flows
Published 2011Full text (MFA users only)
Electronic eBook -
191
Ivor Horton's beginning Visual C++ 2012
Published 2012Table of Contents: “…Precompiled Header Files --…”
Full text (MFA users only)
Electronic eBook -
192
Satellite networking : principles and protocols
Published 2014Full text (MFA users only)
Electronic eBook -
193
Advanced dynamic-system simulation : model -replication and Monte Carlo Studies
Published 2013Table of Contents: “…Classifier Input from Files --…”
Full text (MFA users only)
Electronic eBook -
194
Advances in Mechatronics and Control Engineering III : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Mechatronics and Control Engineering (ICMCE 2014...
Published 2014Table of Contents: “…Research on Stereo Matching Algorithm in Intelligent Vehicle Application; Researching on the Single Lock Chamber Automatic Layout Algorithm; Rough and Fuzzy Set Based Classification Algorithm on Computer Practice Teaching Evaluation; Scheduling Based on an Ant Colony Algorithm with Crossover Operator; Study of Parameters Configuration in Ant Colony Algorithm; Study on the Soft Time Windows Vehicle Synthesis Algorithm Based on Genetic; A New Forecasting Model of Fuzzy Time Series; An Improved Forecasting Model of Fuzzy Time Series; Key Technology in a Lightweight WPF-Based Electronic Map Engine.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
195
Advances in Knowledge-Based and Intelligent Engineering and Information Systems
Published 2018Table of Contents: “…Covers; Editorial advisory board; Guest editorial; Towards semantically-aided domain specific business process modeling; Topological and topical characterisation of Twitter user communities; Selection methods and diversity preservation in many-objective evolutionary algorithms; Towards a common and semantic representation of e-portfolios; Logical foundations of hierarchical model checking…”
Full text (MFA users only)
Electronic eBook -
196
High performance programming for soft computing
Published 2014Table of Contents: “…Chapter 9: A Compendium of Artificial Immune SystemsChapter 10: Applications of Artificial Immune Algorithms; Chapter 11: A Parallel Implementation ofthe NSGA-II; Chapter 12: High-performance Navigation System for Mobile Robots; Chapter 13: A Method Using a Combination of Ant Colony Optimization Variants with Ant Set Partitioning; Chapter 14: Variants of Ant Colony Optimization: A Metaheuristic for Solving the Traveling Salesman Problem; Chapter 15: Quantum Computing; Color Plate Section; Back Cover.…”
Full text (MFA users only)
Electronic eBook -
197
Optimization in Engineering Sciences : Approximate and Metaheuristic Methods.
Published 2014Table of Contents: “…Update through elitist strategy; 2.4.3.4. Update by ants ranking; 2.4.4. Systemic ant colony algorithm; 2.4.5. …”
Full text (MFA users only)
Electronic eBook -
198
Fundamentals of patenting and licensing for scientists and engineers
Published 2009Table of Contents: “…Making filing decisions. ch. 6. Preparations before filing. 6.1. …”
Full text (MFA users only)
Electronic eBook -
199
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
200
Engineering optimization : an introduction with metaheuristic applications
Published 2010Table of Contents: “…Genetic Algorithms -- Simulated Annealing -- Ant Algorithms -- Bee Algorithms -- Particle Swarm Optimization -- Harmony Search -- Firefly Algorithm -- Applications. …”
Full text (MFA users only)
Electronic eBook