Search Results - (((((((ant OR mwantis) OR granting) OR makart) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 28
- Data processing 25
- Mathematics 21
- Algorithms 18
- Mathematical optimization 18
- algorithms 17
- Mathematical models 16
- artificial intelligence 16
- Machine learning 14
- Data mining 13
- Technological innovations 13
- Information technology 12
- Computer algorithms 11
- Computer networks 11
- Management 10
- Artificial Intelligence 9
- Big data 9
- Neural networks (Computer science) 8
- Social aspects 8
- Computer programming 7
- Computer science 7
- Development 7
- Research 7
- Application software 6
- Bioinformatics 6
- Cryptography 6
- Data encryption (Computer science) 6
- Design and construction 6
- Parallel processing (Electronic computers) 6
- Swarm intelligence 6
Search alternatives:
- mwantis »
-
221
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
Full text (MFA users only)
Electronic eBook -
222
Advanced wireless networks : technology and business models
Published 2016Table of Contents: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
Full text (MFA users only)
Electronic eBook -
223
JBoss AS 5 Performance Tuning.
Published 2010Table of Contents: “…; The garbage collector algorithms.…”
Full text (MFA users only)
Electronic eBook -
224
Politics of disinformation : the influence of fake news on the public sphere
Published 2021Full text (MFA users only)
Electronic eBook -
225
Applied mechanics and manufacturing technology : selected, peer reviewed papers of the 2011 International Conference on Applied Mechanics and Manufacturing Technology (AMMT 2011),...
Published 2011Full text (MFA users only)
Electronic Conference Proceeding eBook -
226
-
227
Getting Started with Greenplum for Big Data Analytics.
Published 2013Table of Contents: “…Greenplum Unified Analytics Platform (UAP) -- Big Data analytics -- platform requirements -- Greenplum Unified Analytics Platform (UAP) -- Core components -- Greenplum Database -- Hadoop (HD) -- Chorus -- Command Center -- Modules -- Database modules -- HD modules -- Data Integration Accelerator (DIA) modules -- Core architecture concepts -- Data warehousing -- Column-oriented databases -- Parallel versus distributed computing/processing -- Shared nothing, massive parallel processing (MPP) systems, and elastic scalability -- Shared disk data architecture -- Shared memory data architecture -- Shared nothing data architecture -- Data loading patterns -- Greenplum UAP components -- Greenplum Database -- The Greenplum Database physical architecture -- The Greenplum high-availability architecture -- High-speed data loading using external tables.…”
Full text (MFA users only)
Electronic eBook -
228
Wireless sensor systems for extreme environments : space, underwater, underground and industrial
Published 2017Table of Contents: “…Chapter 4 On Improving Connectivity-based Localization in Wireless Sensor Networks4.1 Introduction; 4.2 Connectivity-based Localization in One-hop Networks; 4.2.1 The Centroid Algorithm; 4.2.2 Improved Centroid Algorithms; 4.3 Connectivity-based Localization in Multi-hop Networks; 4.3.1 The DV-hop Algorithm; 4.3.2 Mathematics of Hop-count-based Localization; 4.4 On Improving Connectivity-based Localization; 4.4.1 Improvements by Adjusting Correction Factor; 4.4.2 Improvements by Exploiting Neighborhood Information; 4.5 Summary; References.…”
Full text (MFA users only)
Electronic eBook -
229
Debates in the digital humanities 2016
Published 2016Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
Full text (MFA users only)
Electronic eBook -
230
Data Science : The Executive Summary - a Technical Book for Non-Technical Professionals.
Published 2020Table of Contents: “…Chapter 3 Working with Modern Data -- 3.1 Unstructured Data and Passive Collection -- 3.2 Data Types and Sources -- 3.3 Data Formats -- 3.3.1 CSV Files -- 3.3.2 JSON Files -- 3.3.3 XML and HTML -- 3.4 Databases -- 3.4.1 Relational Databases and Document Stores -- 3.4.2 Database Operations -- 3.5 Data Analytics Software Architectures -- 3.5.1 Shared Storage -- 3.5.2 Shared Relational Database -- 3.5.3 Document Store + Analytics RDB -- 3.5.4 Storage + Parallel Processing -- Chapter 4 Telling the Story, Summarizing Data -- 4.1 Choosing What to Measure…”
Full text (MFA users only)
Electronic eBook -
231
Deep Learning with TensorFlow : Explore neural networks and build intelligent systems with Python, 2nd Edition.
Published 2018Table of Contents: “…; Artificial neural networks; The biological neurons; The artificial neuron; How does an ANN learn?; ANNs and the backpropagation algorithm; Weight optimization; Stochastic gradient descent; Neural network architectures; Deep Neural Networks (DNNs); Multilayer perceptron; Deep Belief Networks (DBNs).…”
Full text (MFA users only)
Electronic eBook -
232
Parallel Programming with Python.
Published 2014Table of Contents: “…; Exploring common forms of parallelization; Communicating in parallel programming; Understanding shared state; Understanding message passing; Identifying parallel programming problems; Deadlock; Starvation; Race conditions; Discovering Python's parallel programming tools; The Python threading module; The Python multiprocessing module.…”
Full text (MFA users only)
Electronic eBook -
233
Environmental modeling with GIS
Published 2010Table of Contents: “…Mapping of the Dust Emission Sources -- 6.2. Sharing Data between Dispersion Modeling Tools and GIS -- 6.3. …”
Full text (MFA users only)
Electronic eBook -
234
Advanced Artificial Intelligence.
Published 2011Table of Contents: “…3.9 Influence-based Backjumping3.10 Constraint Relation Processing; 3.10.1 Unit Sharing Strategy for Identical Relation; 3.10.2 Interval Propagation; 3.10.3 Inequality Graph; 3.10.4 Inequality Reasoning; 3.11 Constraint Reasoning System COPS; 3.12 ILOG Solver; Exercise; Chapter 4 Qualitative Reasoning; 4.1 Introduction; 4.2 Basic approaches in qualitative reasoning; 4.3 Qualitative Model; 4.4 Qualitative Process; 4.5 Qualitative Simulation Reasoning; 4.5.1 Qualitative state transformation; 4.5.2 QSIM algorithm; 4.6 Algebra Approach; 4.7 Spatial Geometric Qualitative Reasoning.…”
Full text (MFA users only)
Electronic eBook -
235
The silicon jungle : a novel of deception, power, and Internet intrigue
Published 2011Full text (MFA users only)
Electronic eBook -
236
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto.
Published 2019Table of Contents: “…87 -- Is Peter Shor’s Algorithm Real? 88 -- Do We Have Enough Stable Qubits? …”
Full text (MFA users only)
Electronic eBook -
237
-
238
Dermatologic principles and practice in oncology : conditions of the skin, hair, and nails in cancer patients
Published 2013Table of Contents: “…Borovicka, Jennifer R.S. Gordon, Ann Cameron Haley, Nicole E. Larson and Dennis P. …”
Full text (MFA users only)
Electronic eBook -
239
Experiencing architecture in the nineteenth century : buildings and society in the modern age
Published 2019Full text (MFA users only)
Electronic eBook -
240
Computational ecology : artificial neural networks and their applications
Published 2010Full text (MFA users only)
Electronic eBook