Search Results - (((((((ant OR manthe) OR file) OR semantic) OR cantor) OR anne) OR halted) OR wwanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 89
- Mathematical models 64
- Mathematics 61
- Artificial intelligence 55
- Algorithms 43
- Machine learning 40
- algorithms 37
- Data mining 34
- artificial intelligence 33
- methods 31
- Mathematical optimization 28
- Computer networks 24
- Artificial Intelligence 23
- Computer science 22
- Signal processing 21
- Data Mining 20
- Python (Computer program language) 20
- Development 19
- Digital techniques 19
- Technological innovations 19
- Application software 17
- Computer algorithms 17
- Computer simulation 16
- Diseases 16
- Image processing 16
- Computational Biology 15
- Statistical methods 14
- Computer security 13
- Electronic data processing 13
- Information technology 13
Search alternatives:
- ant »
- manthe »
- semantic »
- cantor »
- wwanting »
- halted »
-
81
Biomedical signal analysis : contemporary methods and applications
Published 2010Full text (MFA users only)
Electronic eBook -
82
Coding theory : algorithms, architectures, and applications
Published 2007Full text (MFA users only)
Electronic eBook -
83
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
84
Visual computing for medicine : theory, algorithms, and applications
Published 2014Full text (MFA users only)
Electronic eBook -
85
Naming and reference : the link of word to object
Published 1992Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
Full text (MFA users only)
Electronic eBook -
86
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
Full text (MFA users only)
Electronic eBook -
87
-
88
New directions in statistical signal processing : from systems to brain
Published 2007Full text (MFA users only)
Electronic eBook -
89
Oracle Blockchain Quick Start Guide : a Practical Approach to Implementing Blockchain in Your Enterprise.
Published 2019Full text (MFA users only)
Electronic eBook -
90
Computational technologies. Advanced topics
Published 2015Full text (MFA users only)
Electronic eBook -
91
Discrete Algebraic Methods : Arithmetic, Cryptography, Automata and Groups
Published 2016Full text (MFA users only)
Electronic eBook -
92
Oracle 10g/11g data and database management utilities : master twelve must-use utilities to optimize the efficiency, management, and performance of your daily database task
Published 2009Table of Contents: “…Cover; Table of Contents; Preface; Chapter 1: Data Pump; Data Pump features; Data Pump architecture; Setting up the practical scenarios; Data Pump export; Data Pump export modes; A simple Data Pump export session; Data Pump export filtering operations; Use of parameter file; Retrieve original data; Data Pump export space estimation; Dump file multiplexing; Transporting data among different versions; Data Pump export interactive mode; Data Pump restart capability; Getting information about the export job; Data Pump import; Remap function; Data Pump import network mode…”
Full text (MFA users only)
Electronic eBook -
93
Online stochastic combinatorial optimization
Published 2006Full text (MFA users only)
Electronic eBook -
94
A guide to creating a successful algorithmic trading strategy
Published 2016Full text (MFA users only)
Electronic eBook -
95
Stochastic processes in polymeric fluids : tools and examples for developing simulation algorithms
Published 1996Full text (MFA users only)
Electronic eBook -
96
Reading machines : toward an algorithmic criticism
Published 2011Full text (MFA users only)
Electronic eBook -
97
-
98
ModSecurity 2.5.
Published 2009Table of Contents: “…Blocking uncommon request methodsRestricting access to certain times of day; Detecting credit card leaks; Detecting credit card numbers; The Luhn algorithm and false positives; Tracking the geographical location of your visitors; GEO collection fields; Blocking users from specific countries; Load balancing requests between servers on different continents; Pausing requests for a specified amount of time; Executing shell scripts; Sending alert emails; Sending more detailed alert emails; Counting file downloads; Blocking brute-force password guessing; Injecting data into responses.…”
Full text (MFA users only)
Electronic eBook -
99
JPEG2000 standard for image compression : concepts, algorithms and VLSI architectures
Published 2005Table of Contents: “…Preface; 1 Introduction to Data Compression; 2 Source Coding Algorithms; 3 JPEG: Still Image Compression Standard; 4 Introduction to Discrete Wavelet Transform; 5 VLSI Architectures for Discrete Wavelet Transforms; 6 JPEG2000 Standard; 7 Coding Algorithms in JPEG2000; 8 Code-Stream Organization and File Format; 9 VLSI Architectures for JPEG2000; 10 Beyond Part 1 of JPEG2000 Standard; Index; About the Authors.…”
Full text (MFA users only)
Electronic eBook -
100