Search Results - (((((((ant OR manthe) OR file) OR semantic) OR cantor) OR anne) OR halted) OR granting) algorithms.

  1. 81
  2. 82
  3. 83
  4. 84
  5. 85
  6. 86
  7. 87

    Naming and reference : the link of word to object by Nelson, R. J. (Raymond John), 1917-

    Published 1992
    Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
    Full text (MFA users only)
    Electronic eBook
  8. 88

    Automating open source intelligence : algorithms for OSINT

    Published 2016
    Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
    Full text (MFA users only)
    Electronic eBook
  9. 89
  10. 90
  11. 91
  12. 92

    Computational technologies. Advanced topics

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  13. 93
  14. 94

    Oracle 10g/11g data and database management utilities : master twelve must-use utilities to optimize the efficiency, management, and performance of your daily database task by Madrid, Hector R.

    Published 2009
    Table of Contents: “…Cover; Table of Contents; Preface; Chapter 1: Data Pump; Data Pump features; Data Pump architecture; Setting up the practical scenarios; Data Pump export; Data Pump export modes; A simple Data Pump export session; Data Pump export filtering operations; Use of parameter file; Retrieve original data; Data Pump export space estimation; Dump file multiplexing; Transporting data among different versions; Data Pump export interactive mode; Data Pump restart capability; Getting information about the export job; Data Pump import; Remap function; Data Pump import network mode…”
    Full text (MFA users only)
    Electronic eBook
  15. 95
  16. 96
  17. 97
  18. 98

    Reading machines : toward an algorithmic criticism by Ramsay, Stephen

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  19. 99
  20. 100

    ModSecurity 2.5. by Mischel, Magnus

    Published 2009
    Table of Contents: “…Blocking uncommon request methodsRestricting access to certain times of day; Detecting credit card leaks; Detecting credit card numbers; The Luhn algorithm and false positives; Tracking the geographical location of your visitors; GEO collection fields; Blocking users from specific countries; Load balancing requests between servers on different continents; Pausing requests for a specified amount of time; Executing shell scripts; Sending alert emails; Sending more detailed alert emails; Counting file downloads; Blocking brute-force password guessing; Injecting data into responses.…”
    Full text (MFA users only)
    Electronic eBook