Search Results - (((((((ant OR mantis) OR ken) OR cwanton) OR cantor) OR anne) OR carter) OR partis) algorithms.

Refine Results
  1. 1

    Ant Colony Optimization and Constraint Programming. by Solnon, Christine

    Published 2013
    Table of Contents: “…Constraint programming; 1.1.2. Ant colony optimization; 1.1.3. Constraint programming with ant colony optimization; Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  2. 2

    Theory of randomized search heuristics : foundations and recent developments

    Published 2011
    Table of Contents: “…Runtime Analysis of Evolutionary Algorithms for Discrete Optimization Peter S. Oliveto and Xin Yao; 3. …”
    Full text (MFA users only)
    Electronic eBook
  3. 3
  4. 4

    Algorithmic composition : a guide to composing music with Nyquist by Simoni, Mary Hope

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  5. 5

    Nature-inspired optimization algorithms by Yang, Xin-She

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  6. 6

    Swarm intelligence and bio-inspired computation : theory and applications

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  7. 7

    Ant colony optimization by Dorigo, Marco

    Published 2004
    Table of Contents: “…Preface; Acknowledgments; 1 -- From Real to Artificial Ants; 2 -- The Ant Colony Optimization Metaheuristic; 3 -- Ant Colony Optimization Algorithms for the Traveling Salesman Problem; 4 -- Ant Colony Optimization Theory; 5 -- Ant Colony Optimization for NP-Hard Problems; 6 -- AntNet: An ACO Algorithm for Data Network Routing; 7 -- Conclusions and Prospects for the Future; Appendix: Sources of Information about the ACO Field; References; Index.…”
    Full text (MFA users only)
    Electronic eBook
  8. 8

    Introduction to cryptography by Padhye, Sahadeo, Sahu, Rajeev A., Saraswat, Vishal

    Published 2018
    Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
    Full text (MFA users only)
    Electronic eBook
  9. 9

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  10. 10

    Swarm Intelligence Algorithms : Modifications and Applications. by Slowik, Adam

    Published 2020
    Table of Contents: “…-- 1.2.3 Pseudo-code of standard ACO algorithm -- 1.3 Modified variants of ant colony optimization -- 1.3.1 Elitist ant systems -- 1.3.2 Ant colony system -- 1.3.3 Max-min ant system -- 1.3.4 Rank based ant systems -- 1.3.5 Continuous orthogonal ant systems…”
    Full text (MFA users only)
    Electronic eBook
  11. 11
  12. 12

    Graph algorithms and applications 3

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  13. 13

    Metaheuristic optimization for the design of automatic control laws by Sandou, Guillaume

    Published 2013
    Table of Contents: “…Ant colony optimization…”
    Full text (MFA users only)
    Electronic eBook
  14. 14
  15. 15

    Meta-heuristic and evolutionary algorithms for engineering optimization by Bozorg-Haddad, Omid, 1974-, Solgi, Mohammad, 1989-, Loaiciga, Hugo A.

    Published 2017
    Table of Contents: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search (PS) -- Genetic algorithm (GA) -- Simulated annealing (SA) -- Tabu search (TS) -- Ant colony optimization (ACO) -- Particle swarm optimization (PSO) -- Differential evolution (DE) -- Harmony search (HS) -- Shuffled frog-leaping algorithm (SFLA) -- Honey-bee mating optimization (HBMO) -- Invasive weed optimization (IWO) -- Central force optimization (CFO) -- Biogeography-based optimization (BBO) -- Firefly algorithm (FA) -- Gravity search algorithm (GSA) -- Bat algorithm (BA) -- Plant propagation algorithm (PPA) -- Water cycle algorithm (WCA) -- Symbiotic organisms search (SOS) -- Comprehensive evolutionary algorithm (CEA).…”
    Full text (MFA users only)
    Electronic eBook
  16. 16

    New directions in statistical signal processing : from systems to brain

    Published 2007
    Table of Contents: “…The machine cocktail party problem /…”
    Full text (MFA users only)
    Electronic eBook
  17. 17

    All Source Positioning, Navigation and Timing by Li, Rongsheng, Ph. D.

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  18. 18

    Monnaies cryptées et blockchain : La confiance est-elle un algorithme? = Encrypted currencies and blockchain: is trust an algorithm?. by Ordonneau, Pascal

    Published 2018
    Table of Contents: “…9.2 Le big data contre les banques?9.3 Algorithme et tiers de confiance; 9.4 Le débat est ouvert; Deuxième partie : La blockchain est-elle l'alpha et l'oméga des relations sociales du futur?…”
    Full text (MFA users only)
    Electronic eBook
  19. 19

    Turing's vision : the birth of computer science by Bernhardt, Chris

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  20. 20

    Adventures in Raspberry Pi by Philbin, Carrie Anne

    Published 2017
    Full text (MFA users only)
    Electronic eBook