Search Results - (((((((ant OR manthe) OR king) OR semantic) OR cantor) OR anne) OR halted) OR granting) algorithms.

  1. 81

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  2. 82

    Advances in Computational Intelligence : Theory & Applications by Wang, Fei-Yue

    Published 2006
    Table of Contents: “…Lin and F.-Y. Wang -- 8. Ant colony algorithms: the state-of-the-art / J. …”
    Full text (MFA users only)
    Electronic eBook
  3. 83

    Optimization of Logistics. by Yalaoui, Alice

    Published 2012
    Table of Contents: “…2.4.1. Genetic algorithms2.4.2. Ant colonies; 2.4.3. Tabu search; 2.4.4. …”
    Full text (MFA users only)
    Electronic eBook
  4. 84

    Modeling Reality : How Computers Mirror Life. by Białynicki-Birula, Iwo

    Published 2004
    Table of Contents: “…Contents; 1 From building blocks to computers: Models and modeling; 2 The game of life: A legendary cellular automaton; 3 Heads or tails: Probability of an event; 4 Galton's board: Probability and statistics; 5 Twenty questions: Probability and information; 6 Snowflakes: The evolution of dynamical systems; 7 The Lorenz butterfly: Deterministic chaos; 8 From Cantor to Mandelbrot: Self-similarity and fractals; 9 Typing monkeys: Statistical linguistics; 10 The bridges of Königsberg: Graph theory; 11 Prisoner's dilemma: Game theory; 12 Let the best man win: Genetic algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  5. 85

    Advances in intelligent IT : active media technology 2006

    Published 2006
    Table of Contents: “…Title page; Preface; Organization; Contents; Keynotes; Active Media Technologies (AMT) from the Standpoint of the Wisdom Web; Anytime Learning and Classification for Online Applications; Domain-Driven Data Mining: Methodologies and Applications; Regular Papers; Web Service Request Transformatter; A Head-Tracker Based on the Lucas-Kanade Optical Flow Algorithm; A Fair Peer Selection Algorithm for an Ecommerce-Oriented Distributed Recommender System; Intelligent Decision Making with the Semantic Web; Relevence Assessment of Topic Ontology; Information Extraction from a Whole Web Site.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 86

    Information technology applications in industry III : selected, peer reviewed papers from the 2014 3rd International Conference on Information Technology and Management Innovation...

    Published 2014
    Table of Contents: “…A Hybrid Simulate Annealing Algorithm Based on Aircraft Emergency Dispatching SystemA Variable Step-Size BLMS Adaptive Jamming Cancellation Algorithm Based on FFT; Adaptive Extended Kalman Filter for Nonlinear System with Noise Compensating Technology; An Improvement of Apriori Algorithm in Medical Data Mining; An Integrated Algorithm for Low-Carbon City Evaluation Based on Neural Network and Analytic Hierarchy Process; Reliability Optimization for Multi-State Series-Parallel System Design Using Ant Colony Algorithm…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 87

    Integration of swarm intelligence and artificial neural network

    Published 2011
    Table of Contents: “…Dehuri -- Coherent biclusters of microarray data by imitating the ecosystem : an ant colony algorithmic approach / D. Mishra, A.K. …”
    Full text (MFA users only)
    Electronic eBook
  8. 88

    Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence. by Kvasnicka, V.

    Published 2002
    Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
    Full text (MFA users only)
    Electronic eBook
  9. 89

    Bio-inspired computation in telecommunications

    Published 2015
    Table of Contents: “…Bio-inspired optimization algorithms; 1.4.1. SI-Based Algorithms; 1.4.1.1. Ant and bee algorithms; 1.4.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  10. 90

    Artificial intelligence : approaches, tools, and applications

    Published 2011
    Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
    Full text (MFA users only)
    Electronic eBook
  11. 91

    Cybernetic intelligent systems

    Published 2014
    Table of Contents: “…Cover ; Editorial advisory board ; Editorial ; Guest editorial ; HDR imaging for feature tracking in challenging visibility scenes ; A new classification strategy for human activity recognition using cost sensitive support vector machines for imbalanced data ; Coarticulation and speech synchronization in MPEG-4 based facial animation ; Semantic Category theory and Semantic Intertwine: the anathema of mathematics ; Tracking progress of African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method.…”
    Full text (MFA users only)
    Electronic eBook
  12. 92
  13. 93

    Text mining : applications and theory

    Published 2010
    Table of Contents: “…Automatic Keyword Extraction from Individual Documents / Stuart Rose, Dave Engel, Nick Cramer, Wendy Cowley -- Algebraic Techniques for Multilingual Document Clustering / Brett W Bader, Peter A Chew -- Content-Based Spam Email Classification using Machine-Learning Algorithms / Eric P Jiang -- Utilizing Nonnegative Matrix Factorization for Email Classification Problems / Andreas G K Janecek, Wilfried N Gansterer -- Constrained Clustering with -means Type Algorithms / Ziqiu Su, Jacob Kogan, Charles Nicholas -- Anomaly and Trend Detection. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 94

    Three Views of Logic : Mathematics, Philosophy, and Computer Science. by Loveland, Donald W.

    Published 2014
    Table of Contents: “…Computability Theory; 4 Overview of Computability; 4.1 Decision Problems and Algorithms; 4.2 Three Informal Concepts; 5 A Machine Model of Computability; 5.1 Register Machines and RM-Computable Functions; 5.2 Operations with RM-Computable Functions; Church-Turing Thesis; LRM-Computable Functions; 5.3 RM-Decidable and RM-Semi-Decidable Relations; the Halting Problem; 5.4 Unsolvability of Hilbert's Decision Problem and Thue's Word Problem; 6 A Mathematical Model of Computability.…”
    Full text (MFA users only)
    Electronic eBook
  15. 95

    Advances in scalable web information integration and service : proceedings of DASFAA2007, Bangkok, Thailand, 9-12 April 2007

    Published 2007
    Table of Contents: “…Invited session. Using semantics in XML data management / Tok Wang Ling and Gillian Dobbie. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 96

    Information modelling and knowledge bases XXX

    Published 2019
    Table of Contents: “…Intro; Title Page; Preface; Committees; Contents; Goal-Oriented Adaptive and Extensible Study-Process Creation with Optimal Cyclic-Learning in Graph-Structured Knowledge; A Process Calculus for Design and Modeling of Retro-Synthesis; The Discrete-Event Approach to Simulate Stochastic Multi-Product (r, Q) Inventory Control Systems; A Semantic Orthogonal Mapping Method Through Deep-Learning for Semantic Computing; Cultures in Information Systems Development; Clutter Reduction in Parallel Coordinates Using Aesthetic Criteria; Toward Manageable Data Sources…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 97

    Metaheuristics for intelligent electrical networks by Héliodore, Frédéric, Nakib, Amir, Ismail, Boussaad, Ouchraa, Salma, Schmitt, Laurent

    Published 2017
    Table of Contents: “…2.2.1. Genetic algorithms2.2.2. Evolution strategies; 2.2.3. Coevolutionary algorithms; 2.2.4. …”
    Full text (MFA users only)
    Electronic eBook
  18. 98

    Computational models of argument : proceedings of COMMA 2014

    Published 2014
    Table of Contents: “…Properties of Random VAFs and Implications for Efficient AlgorithmsResolution-Based Grounded Semantics Revisited -- Decomposing Abstract Dialectical Frameworks -- A Principled Approach to the Implementation of Argumentation Models -- Combining Paraconsistent Logic with Argumentation -- Probabilistic Argument Graphs for Argumentation Lotteries -- Enthymeme Construction in Dialogues Using Shared Knowledge -- Strategies in Dialogues: A Game-Theoretic Approach -- Argumentation Logic -- Splitting Abstract Dialectical Frameworks…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 99

    Digital fabrication in architecture by Dunn, Nick, 1974-

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  20. 100

    Papers from the first European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights '06)

    Published 2007
    Table of Contents: “…Cover; CONTENTS; EDITORIAL ADVISORY BOARD; The digital information war; Complementing DRM with digital watermarking: mark, search, retrieve; A class of non-linear asymptotic fingerprinting codes with 1-error; Verification algorithms for governed use of multimedia content; Toward semantics-aware management of intellectual property rights; DRM, law and technology: an American perspective; Clustering search results. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook