Search Results - (((((((ant OR manthe) OR file) OR semantic) OR cantor) OR anne) OR halted) OR granting) algorithms.

  1. 181
  2. 182

    Handbook of performability engineering

    Published 2008
    Table of Contents: “…HALT and HASS Overview: The New Quality and Reliability Paradigm /…”
    Full text (MFA users only)
    Electronic eBook
  3. 183

    Integrated systems engineering : a postprint volume from the IFAC Conference, Baden-Baden, Germany, 27-29 September 1994

    Published 1995
    Table of Contents: “…An Optimisation-Based Algorithm for Designing Free-Form Trajectories Under Various Constraints /…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 184

    Mathematical logic in the 20th century

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  5. 185

    Key concepts & techniques in GIS by Albrecht, Jochen

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  6. 186
  7. 187
  8. 188

    Interactive displays : natural human interface technologies

    Published 2015
    Table of Contents: “…Gesture Detection Algorithm /…”
    Full text (MFA users only)
    Electronic eBook
  9. 189
  10. 190
  11. 191

    Ivor Horton's beginning Visual C++ 2012 by Horton, Ivor

    Published 2012
    Table of Contents: “…Precompiled Header Files --…”
    Full text (MFA users only)
    Electronic eBook
  12. 192

    Satellite networking : principles and protocols by Sun, Zhili

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  13. 193

    Advanced dynamic-system simulation : model -replication and Monte Carlo Studies by Korn, Granino A. (Granino Arthur), 1922-2013

    Published 2013
    Table of Contents: “…Classifier Input from Files --…”
    Full text (MFA users only)
    Electronic eBook
  14. 194

    Advances in Mechatronics and Control Engineering III : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Mechatronics and Control Engineering (ICMCE 2014...

    Published 2014
    Table of Contents: “…Research on Stereo Matching Algorithm in Intelligent Vehicle Application; Researching on the Single Lock Chamber Automatic Layout Algorithm; Rough and Fuzzy Set Based Classification Algorithm on Computer Practice Teaching Evaluation; Scheduling Based on an Ant Colony Algorithm with Crossover Operator; Study of Parameters Configuration in Ant Colony Algorithm; Study on the Soft Time Windows Vehicle Synthesis Algorithm Based on Genetic; A New Forecasting Model of Fuzzy Time Series; An Improved Forecasting Model of Fuzzy Time Series; Key Technology in a Lightweight WPF-Based Electronic Map Engine.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 195

    Advances in Knowledge-Based and Intelligent Engineering and Information Systems by Frydman, Claudia

    Published 2018
    Table of Contents: “…Covers; Editorial advisory board; Guest editorial; Towards semantically-aided domain specific business process modeling; Topological and topical characterisation of Twitter user communities; Selection methods and diversity preservation in many-objective evolutionary algorithms; Towards a common and semantic representation of e-portfolios; Logical foundations of hierarchical model checking…”
    Full text (MFA users only)
    Electronic eBook
  16. 196

    High performance programming for soft computing

    Published 2014
    Table of Contents: “…Chapter 9: A Compendium of Artificial Immune SystemsChapter 10: Applications of Artificial Immune Algorithms; Chapter 11: A Parallel Implementation ofthe NSGA-II; Chapter 12: High-performance Navigation System for Mobile Robots; Chapter 13: A Method Using a Combination of Ant Colony Optimization Variants with Ant Set Partitioning; Chapter 14: Variants of Ant Colony Optimization: A Metaheuristic for Solving the Traveling Salesman Problem; Chapter 15: Quantum Computing; Color Plate Section; Back Cover.…”
    Full text (MFA users only)
    Electronic eBook
  17. 197

    Optimization in Engineering Sciences : Approximate and Metaheuristic Methods. by Stefanoiu, Dan

    Published 2014
    Table of Contents: “…Update through elitist strategy; 2.4.3.4. Update by ants ranking; 2.4.4. Systemic ant colony algorithm; 2.4.5. …”
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Fundamentals of patenting and licensing for scientists and engineers by Ma, Matthew Y.

    Published 2009
    Table of Contents: “…Making filing decisions. ch. 6. Preparations before filing. 6.1. …”
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  20. 200

    Engineering optimization : an introduction with metaheuristic applications by Yang, Xin-She

    Published 2010
    Table of Contents: “…Genetic Algorithms -- Simulated Annealing -- Ant Algorithms -- Bee Algorithms -- Particle Swarm Optimization -- Harmony Search -- Firefly Algorithm -- Applications. …”
    Full text (MFA users only)
    Electronic eBook