Search Results - (((((((ant OR manthe) OR file) OR semantic) OR cantor) OR anne) OR halted) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 90
- Mathematical models 64
- Mathematics 62
- Artificial intelligence 57
- Algorithms 44
- Machine learning 40
- algorithms 38
- Data mining 35
- artificial intelligence 34
- methods 31
- Mathematical optimization 28
- Computer networks 24
- Artificial Intelligence 23
- Computer science 22
- Signal processing 21
- Data Mining 20
- Python (Computer program language) 20
- Technological innovations 20
- Development 19
- Digital techniques 19
- Computer algorithms 18
- Application software 17
- Diseases 17
- Computer simulation 16
- Image processing 16
- Computational Biology 15
- Research 15
- therapy 15
- Computer security 14
- Statistical methods 14
Search alternatives:
- ant »
- manthe »
- semantic »
- cantor »
- granting »
- halted »
-
81
-
82
Image reconstruction : applications in medical sciences
Published 2017Full text (MFA users only)
Electronic eBook -
83
Biomedical signal analysis : contemporary methods and applications
Published 2010Full text (MFA users only)
Electronic eBook -
84
Coding theory : algorithms, architectures, and applications
Published 2007Full text (MFA users only)
Electronic eBook -
85
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
86
Visual computing for medicine : theory, algorithms, and applications
Published 2014Full text (MFA users only)
Electronic eBook -
87
Naming and reference : the link of word to object
Published 1992Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
Full text (MFA users only)
Electronic eBook -
88
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
Full text (MFA users only)
Electronic eBook -
89
-
90
New directions in statistical signal processing : from systems to brain
Published 2007Full text (MFA users only)
Electronic eBook -
91
Oracle Blockchain Quick Start Guide : a Practical Approach to Implementing Blockchain in Your Enterprise.
Published 2019Full text (MFA users only)
Electronic eBook -
92
Computational technologies. Advanced topics
Published 2015Full text (MFA users only)
Electronic eBook -
93
Discrete Algebraic Methods : Arithmetic, Cryptography, Automata and Groups
Published 2016Full text (MFA users only)
Electronic eBook -
94
Oracle 10g/11g data and database management utilities : master twelve must-use utilities to optimize the efficiency, management, and performance of your daily database task
Published 2009Table of Contents: “…Cover; Table of Contents; Preface; Chapter 1: Data Pump; Data Pump features; Data Pump architecture; Setting up the practical scenarios; Data Pump export; Data Pump export modes; A simple Data Pump export session; Data Pump export filtering operations; Use of parameter file; Retrieve original data; Data Pump export space estimation; Dump file multiplexing; Transporting data among different versions; Data Pump export interactive mode; Data Pump restart capability; Getting information about the export job; Data Pump import; Remap function; Data Pump import network mode…”
Full text (MFA users only)
Electronic eBook -
95
Online stochastic combinatorial optimization
Published 2006Full text (MFA users only)
Electronic eBook -
96
A guide to creating a successful algorithmic trading strategy
Published 2016Full text (MFA users only)
Electronic eBook -
97
Stochastic processes in polymeric fluids : tools and examples for developing simulation algorithms
Published 1996Full text (MFA users only)
Electronic eBook -
98
Reading machines : toward an algorithmic criticism
Published 2011Full text (MFA users only)
Electronic eBook -
99
-
100
ModSecurity 2.5.
Published 2009Table of Contents: “…Blocking uncommon request methodsRestricting access to certain times of day; Detecting credit card leaks; Detecting credit card numbers; The Luhn algorithm and false positives; Tracking the geographical location of your visitors; GEO collection fields; Blocking users from specific countries; Load balancing requests between servers on different continents; Pausing requests for a specified amount of time; Executing shell scripts; Sending alert emails; Sending more detailed alert emails; Counting file downloads; Blocking brute-force password guessing; Injecting data into responses.…”
Full text (MFA users only)
Electronic eBook