Search Results - (((((((ant OR manthe) OR king) OR semantic) OR cantor) OR anne) OR halted) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 38
- Data processing 25
- artificial intelligence 19
- Mathematics 17
- Mathematical optimization 15
- Data mining 14
- Machine learning 14
- Artificial Intelligence 11
- Technological innovations 11
- Computer science 10
- Mathematical models 10
- Information technology 9
- Neural networks (Computer science) 8
- Algorithms 7
- Computational linguistics 7
- Big data 6
- Computer security 6
- Data Mining 6
- Research 6
- Social aspects 6
- algorithms 6
- Computer networks 5
- Design and construction 5
- Intelligent agents (Computer software) 5
- Machine Learning 5
- Pattern recognition systems 5
- Python (Computer program language) 5
- Semantic Web 5
- Soft computing 5
- Swarm intelligence 5
Search alternatives:
- ant »
- manthe »
- semantic »
- cantor »
- granting »
- halted »
-
81
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
82
Advances in Computational Intelligence : Theory & Applications
Published 2006Table of Contents: “…Lin and F.-Y. Wang -- 8. Ant colony algorithms: the state-of-the-art / J. …”
Full text (MFA users only)
Electronic eBook -
83
Optimization of Logistics.
Published 2012Table of Contents: “…2.4.1. Genetic algorithms2.4.2. Ant colonies; 2.4.3. Tabu search; 2.4.4. …”
Full text (MFA users only)
Electronic eBook -
84
Modeling Reality : How Computers Mirror Life.
Published 2004Table of Contents: “…Contents; 1 From building blocks to computers: Models and modeling; 2 The game of life: A legendary cellular automaton; 3 Heads or tails: Probability of an event; 4 Galton's board: Probability and statistics; 5 Twenty questions: Probability and information; 6 Snowflakes: The evolution of dynamical systems; 7 The Lorenz butterfly: Deterministic chaos; 8 From Cantor to Mandelbrot: Self-similarity and fractals; 9 Typing monkeys: Statistical linguistics; 10 The bridges of Königsberg: Graph theory; 11 Prisoner's dilemma: Game theory; 12 Let the best man win: Genetic algorithms.…”
Full text (MFA users only)
Electronic eBook -
85
Advances in intelligent IT : active media technology 2006
Published 2006Table of Contents: “…Title page; Preface; Organization; Contents; Keynotes; Active Media Technologies (AMT) from the Standpoint of the Wisdom Web; Anytime Learning and Classification for Online Applications; Domain-Driven Data Mining: Methodologies and Applications; Regular Papers; Web Service Request Transformatter; A Head-Tracker Based on the Lucas-Kanade Optical Flow Algorithm; A Fair Peer Selection Algorithm for an Ecommerce-Oriented Distributed Recommender System; Intelligent Decision Making with the Semantic Web; Relevence Assessment of Topic Ontology; Information Extraction from a Whole Web Site.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
86
Information technology applications in industry III : selected, peer reviewed papers from the 2014 3rd International Conference on Information Technology and Management Innovation...
Published 2014Table of Contents: “…A Hybrid Simulate Annealing Algorithm Based on Aircraft Emergency Dispatching SystemA Variable Step-Size BLMS Adaptive Jamming Cancellation Algorithm Based on FFT; Adaptive Extended Kalman Filter for Nonlinear System with Noise Compensating Technology; An Improvement of Apriori Algorithm in Medical Data Mining; An Integrated Algorithm for Low-Carbon City Evaluation Based on Neural Network and Analytic Hierarchy Process; Reliability Optimization for Multi-State Series-Parallel System Design Using Ant Colony Algorithm…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
87
Integration of swarm intelligence and artificial neural network
Published 2011Table of Contents: “…Dehuri -- Coherent biclusters of microarray data by imitating the ecosystem : an ant colony algorithmic approach / D. Mishra, A.K. …”
Full text (MFA users only)
Electronic eBook -
88
Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence.
Published 2002Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
Full text (MFA users only)
Electronic eBook -
89
Bio-inspired computation in telecommunications
Published 2015Table of Contents: “…Bio-inspired optimization algorithms; 1.4.1. SI-Based Algorithms; 1.4.1.1. Ant and bee algorithms; 1.4.1.2. …”
Full text (MFA users only)
Electronic eBook -
90
Artificial intelligence : approaches, tools, and applications
Published 2011Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
Full text (MFA users only)
Electronic eBook -
91
Cybernetic intelligent systems
Published 2014Table of Contents: “…Cover ; Editorial advisory board ; Editorial ; Guest editorial ; HDR imaging for feature tracking in challenging visibility scenes ; A new classification strategy for human activity recognition using cost sensitive support vector machines for imbalanced data ; Coarticulation and speech synchronization in MPEG-4 based facial animation ; Semantic Category theory and Semantic Intertwine: the anathema of mathematics ; Tracking progress of African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method.…”
Full text (MFA users only)
Electronic eBook -
92
DataFlow supercomputing essentials : research, development and education
Published 2017Full text (MFA users only)
Electronic eBook -
93
Text mining : applications and theory
Published 2010Table of Contents: “…Automatic Keyword Extraction from Individual Documents / Stuart Rose, Dave Engel, Nick Cramer, Wendy Cowley -- Algebraic Techniques for Multilingual Document Clustering / Brett W Bader, Peter A Chew -- Content-Based Spam Email Classification using Machine-Learning Algorithms / Eric P Jiang -- Utilizing Nonnegative Matrix Factorization for Email Classification Problems / Andreas G K Janecek, Wilfried N Gansterer -- Constrained Clustering with -means Type Algorithms / Ziqiu Su, Jacob Kogan, Charles Nicholas -- Anomaly and Trend Detection. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
94
Three Views of Logic : Mathematics, Philosophy, and Computer Science.
Published 2014Table of Contents: “…Computability Theory; 4 Overview of Computability; 4.1 Decision Problems and Algorithms; 4.2 Three Informal Concepts; 5 A Machine Model of Computability; 5.1 Register Machines and RM-Computable Functions; 5.2 Operations with RM-Computable Functions; Church-Turing Thesis; LRM-Computable Functions; 5.3 RM-Decidable and RM-Semi-Decidable Relations; the Halting Problem; 5.4 Unsolvability of Hilbert's Decision Problem and Thue's Word Problem; 6 A Mathematical Model of Computability.…”
Full text (MFA users only)
Electronic eBook -
95
Advances in scalable web information integration and service : proceedings of DASFAA2007, Bangkok, Thailand, 9-12 April 2007
Published 2007Table of Contents: “…Invited session. Using semantics in XML data management / Tok Wang Ling and Gillian Dobbie. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
96
Information modelling and knowledge bases XXX
Published 2019Table of Contents: “…Intro; Title Page; Preface; Committees; Contents; Goal-Oriented Adaptive and Extensible Study-Process Creation with Optimal Cyclic-Learning in Graph-Structured Knowledge; A Process Calculus for Design and Modeling of Retro-Synthesis; The Discrete-Event Approach to Simulate Stochastic Multi-Product (r, Q) Inventory Control Systems; A Semantic Orthogonal Mapping Method Through Deep-Learning for Semantic Computing; Cultures in Information Systems Development; Clutter Reduction in Parallel Coordinates Using Aesthetic Criteria; Toward Manageable Data Sources…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
97
Metaheuristics for intelligent electrical networks
Published 2017Table of Contents: “…2.2.1. Genetic algorithms2.2.2. Evolution strategies; 2.2.3. Coevolutionary algorithms; 2.2.4. …”
Full text (MFA users only)
Electronic eBook -
98
Computational models of argument : proceedings of COMMA 2014
Published 2014Table of Contents: “…Properties of Random VAFs and Implications for Efficient AlgorithmsResolution-Based Grounded Semantics Revisited -- Decomposing Abstract Dialectical Frameworks -- A Principled Approach to the Implementation of Argumentation Models -- Combining Paraconsistent Logic with Argumentation -- Probabilistic Argument Graphs for Argumentation Lotteries -- Enthymeme Construction in Dialogues Using Shared Knowledge -- Strategies in Dialogues: A Game-Theoretic Approach -- Argumentation Logic -- Splitting Abstract Dialectical Frameworks…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
99
-
100
Papers from the first European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights '06)
Published 2007Table of Contents: “…Cover; CONTENTS; EDITORIAL ADVISORY BOARD; The digital information war; Complementing DRM with digital watermarking: mark, search, retrieve; A class of non-linear asymptotic fingerprinting codes with 1-error; Verification algorithms for governed use of multimedia content; Toward semantics-aware management of intellectual property rights; DRM, law and technology: an American perspective; Clustering search results. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook