Search Results - (((((((ant OR pantsi) OR wanting) OR find) OR cantor) OR anne) OR share) OR hints) algorithms.

Refine Results
  1. 1

    Ant Colony Optimization and Constraint Programming. by Solnon, Christine

    Published 2013
    Table of Contents: “…Constraint programming; 1.1.2. Ant colony optimization; 1.1.3. Constraint programming with ant colony optimization; Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  2. 2

    Theory of randomized search heuristics : foundations and recent developments

    Published 2011
    Table of Contents: “…Runtime Analysis of Evolutionary Algorithms for Discrete Optimization Peter S. Oliveto and Xin Yao; 3. …”
    Full text (MFA users only)
    Electronic eBook
  3. 3

    Algorithmic Puzzles. by Levitin, Anany, Levitin, Maria

    Published 2011
    Table of Contents: “…-- General strategies for algorithm design -- Analysis techniques -- Easier puzzles (#1 to #50) -- Puzzles of medium difficulty (#51 to #110) -- Harder puzzles (#111 to #150) -- Hints -- Solutions -- References -- Design stragety and analysis index.…”
    Full text (MFA users only)
    Electronic eBook
  4. 4

    Algorithms for Dummies. by Mueller, John Paul

    Published 2022
    Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Algorithms -- Chapter 1 Introducing Algorithms -- Describing Algorithms -- The right way to make toast: Defining algorithm uses -- Finding algorithms everywhere -- Using Computers to Solve Problems -- Getting the most out of modern CPUs and GPUs -- Working with special-purpose chips -- Networks: Sharing is more than caring -- Leveraging available data…”
    Full text (MFA users only)
    Electronic eBook
  5. 5
  6. 6
  7. 7

    The Human Algorithm by Solis, Brian

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  8. 8
  9. 9

    Nature-inspired optimization algorithms by Yang, Xin-She

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  10. 10

    Permutation Group Algorithms by Seress, kos

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  11. 11

    Algorithms in invariant theory by Sturmfels, Bernd, 1962-

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  12. 12

    Finding Alphas : a Quantitative Approach to Building Trading Strategies. by Tulchinsky, Igor

    Published 2019
    Table of Contents: “…Data Inputs to an AlphaAlpha Universe; Alpha Prediction Frequency; Value of an Alpha; Practical Alpha Evaluation; Future Performance; Conclusion; 5 How to Develop an Alpha: A Case Study; Conclusion; 6 Data and Alpha Design; How we find Data for Alphas; Data Validation; Understand the Data Before Using it; Embrace the Big Data ERA; Conclusion; 7 Turnover; Alpha Horizon; The Cost of a Trade; The Crossing Effect; Controlling Turnover; Examples; Tuning the Turnover; 8 Alpha Correlation; Alpha PnL Correlation; Alpha Value Correlation; Correlation with Alpha Pool; Conclusion…”
    Full text (MFA users only)
    Electronic eBook
  13. 13
  14. 14

    Ant colony optimization by Dorigo, Marco

    Published 2004
    Table of Contents: “…Preface; Acknowledgments; 1 -- From Real to Artificial Ants; 2 -- The Ant Colony Optimization Metaheuristic; 3 -- Ant Colony Optimization Algorithms for the Traveling Salesman Problem; 4 -- Ant Colony Optimization Theory; 5 -- Ant Colony Optimization for NP-Hard Problems; 6 -- AntNet: An ACO Algorithm for Data Network Routing; 7 -- Conclusions and Prospects for the Future; Appendix: Sources of Information about the ACO Field; References; Index.…”
    Full text (MFA users only)
    Electronic eBook
  15. 15
  16. 16

    Introduction to cryptography by Padhye, Sahadeo, Sahu, Rajeev A., Saraswat, Vishal

    Published 2018
    Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
    Full text (MFA users only)
    Electronic eBook
  17. 17
  18. 18

    The Sharing Economy : Implications for the Future of Hospitality and Tourism. by Okumus, Fevzi

    Published 2017
    Table of Contents: “…Chaos and complexity in tourismStudy tenets -- The sharing economy and tourism -- Peer-to-peer accommodation in Greece -- Methods -- Participants -- Sample determination and collection -- Measures -- Implementation of fuzzy-set qualitative comparative analysis algorithms -- Results -- Sufficient complex statements -- Discussion -- Confirmation of tenets -- Fuzzy-set qualitative comparative analysis versus regression and Cramerâ#x80;#x99;s V -- Fit and predictive validity -- Managerial implications -- Limitations and future research -- References…”
    Full text (MFA users only)
    Electronic eBook
  19. 19

    Mastering Machine Learning Algorithms : Expert techniques to implement popular machine learning algorithms and fine-tune your models. by Bonaccorso c/o Quandoo, Giuseppe

    Published 2018
    Table of Contents: “…Conditional probabilities and Bayes' theoremBayesian networks; Sampling from a Bayesian network; Direct sampling; Example of direct sampling; A gentle introduction to Markov chains; Gibbs sampling; Metropolis-Hastings sampling; Example of Metropolis-Hastings sampling; Sampling example using PyMC3; Hidden Markov Models (HMMs); Forward-backward algorithm; Forward phase; Backward phase; HMM parameter estimation; Example of HMM training with hmmlearn; Viterbi algorithm; Finding the most likely hidden state sequence with hmmlearn; Summary; Chapter 5: EM Algorithm and Applications.…”
    Full text (MFA users only)
    Electronic eBook
  20. 20

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook