Search Results - (((((((ant OR pasts) OR frantin) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 41
- Artificial intelligence 29
- Mathematical models 25
- Mathematics 25
- Mathematical optimization 21
- Algorithms 19
- Machine learning 19
- algorithms 17
- Data mining 16
- artificial intelligence 16
- Technological innovations 14
- Computer networks 12
- Information technology 12
- Computer algorithms 11
- Social aspects 11
- Artificial Intelligence 10
- Big data 10
- Management 10
- Data Mining 9
- Neural networks (Computer science) 9
- Computer programming 8
- Computer science 8
- Decision making 8
- Research 8
- History 7
- Mechatronics 7
- Science 7
- Swarm intelligence 7
- methods 7
- Bioinformatics 6
Search alternatives:
- ant »
- frantin »
- markant »
- cantor »
- pasts »
-
221
-
222
Parametricism 2.0 : Rethinking Architecture's Agenda for the 21st Century
Published 2016Table of Contents: “…Relational Urban Models: Parameters, Values and Tacit Forms of AlgorithmsBaishizhou RUM, Shenzhen; Santos RUM, São Paulo; Riverbed RUM, Wuhan; Parameters, Values and Tacit Forms of Algorithms; Parametric Regionalism; Digital Design and Fabrication of Traditional Materials; Brick Aggregation; Concrete Fabrication; Timber Tectonics; A New Age of Performative Architecture; 'Super-Natural': Parametricism in Product Design; BEYOND KNOWN INDUSTRIAL GEOMETRIES; NATURE'S ECONOMIC SINCERITY; DIATOMIC BEAUTY AND LOGIC; RENAULT ADVANCED STUDY; 'CALGAT': CAN A LILY GROW A TELEPHONE.…”
Full text (MFA users only)
Electronic eBook -
223
Mechatronic Systems, Mechanics and Materials II : Selected, peer reviewed papers from the Symposium on Mechatronics Systems, Mechanics and Materials 2013, October 9-10, 2013, Jastr...
Published 2013Table of Contents: “…Optimization-Supported Decision-Making in the Marine Game Environment Prediction of the Spatial Orientation of a Ship by Means of Neural Networks; Safe Ship Control Method with the Use of Ant Colony Optimization; Selected Problems of the Asynchronous Drive Control with the Three-Phase Soft-Start System; System Architecture of Mission Planning and Autonomous Surface Vessel Control; The Characteristics of the Matrix Game Sensitivity of the Safe Passing of Ships at Sea; The Comparison of Parameter Identification Methods for Fractional, Partial Differential Equation; III. …”
Full text (MFA users only)
Electronic eBook -
224
Steiner tree problems in computer communication networks
Published 2008Full text (MFA users only)
Electronic eBook -
225
Data Science : The Executive Summary - a Technical Book for Non-Technical Professionals.
Published 2020Table of Contents: “…Chapter 3 Working with Modern Data -- 3.1 Unstructured Data and Passive Collection -- 3.2 Data Types and Sources -- 3.3 Data Formats -- 3.3.1 CSV Files -- 3.3.2 JSON Files -- 3.3.3 XML and HTML -- 3.4 Databases -- 3.4.1 Relational Databases and Document Stores -- 3.4.2 Database Operations -- 3.5 Data Analytics Software Architectures -- 3.5.1 Shared Storage -- 3.5.2 Shared Relational Database -- 3.5.3 Document Store + Analytics RDB -- 3.5.4 Storage + Parallel Processing -- Chapter 4 Telling the Story, Summarizing Data -- 4.1 Choosing What to Measure…”
Full text (MFA users only)
Electronic eBook -
226
Graph classification and clustering based on vector space embedding
Published 2010Full text (MFA users only)
Electronic eBook -
227
Challenges and opportunities of HealthGrids : proceedings of Healthgrid 2006
Published 2006Table of Contents: “…Early Diagnosis of Alzheimer's Disease Using a Grid Implementation of Statistical Parametric Mapping AnalysisUsing the Grid to Analyze the Pharmacokinetic Modelling After Contrast Administration in Dynamic MRI; Medical Image Registration Algorithms Assessment: Bronze Standard Application Enactment on Grids Using the MOTEUR Workflow Engine; Ethical, Legal and Privacy Issues on HealthGrids; The Ban on Processing Medical Data in European Law: Consent and Alternative Solutions to Legitimate Processing of Medical Data in HealthGrid.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
228
Better living through economics
Published 2010Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
Full text (MFA users only)
Electronic eBook -
229
Introduction to Modern Algebra and Its Applications.
Published 2020Full text (MFA users only)
Electronic eBook -
230
Cardiac Fibrillation-Defibrillation : Clinical and Engineering Aspects
Published 2011Table of Contents: “…Introduction. 4.2. Algorithms for the detection of Ventricular Fibrillation (VF). 4.3. …”
Full text (MFA users only)
Electronic eBook -
231
Database technology for life sciences and medicine
Published 2010Table of Contents: “…The DIANOVA framework. 4.4. Algorithms for realizing DIANOVA. 4.5. Extensions of DIANOVA. 4.6. …”
Full text (MFA users only)
Electronic eBook -
232
Digital wealth : an automatic way to invest successfully
Published 2016Full text (MFA users only)
Electronic eBook -
233
Handbook of operations research in natural resources
Published 2007Full text (MFA users only)
Electronic eBook -
234
Twitter and tear gas : the power and fragility of networked protest
Published 2017Full text (MFA users only)
Electronic eBook -
235
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
Full text (MFA users only)
Electronic eBook -
236
Innovation Manufacturing and Engineering Management : Selected, peer reviewed papers from the International Conference on Innovation Manufacturing and Engineering Management (IMEM)...
Published 2011Table of Contents: “…Application of DNA Genetic Algorithm in Manufacturing System Scheduling OptimizationSoft-Sensor for Estimation of Lead Slices Thickness in Continuous Casting Process; Hydrodynamic Mathematical Modeling of the Yangshan Deep-Water Harbor Waters, China; Multidisciplinary Design Method Taking Traditional Manufacturing Factors into Account; Research on the Seed-Fertilizer Box for a Ridge-Till and No-Till Seeder; Research on the Investment Decision-Making on the Application of Advanced Manufacturing Technologies in Enterprises; Zigbee-Based Data Acquisition System for Manufacturing…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
237
Mechanical, Electronic and Information Technology Engineering
Published 2015Table of Contents: “…An Approach for the Implementation of Intelligent PID Controller Based on Fast Genetic Algorithm; Research of Large Erecting Control System Based on Fuzzy PID Control Algorithm; An Investigation of Undulating Shape Adaptation Characteristics of a Hydraulic-Driven Bionic Undulating Robot; Wireless Monitoring and Controlling Marine Navigation Parameters; Research on PCS Real-Time System Based on Integrated Control and Simulation; Rapid Design of DC Motor Speed Control System Based on MATLAB.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
238
Advanced Analytics with R and Tableau.
Published 2016Table of Contents: “…; How to do Clustering in Tableau; Creating Clusters; Clustering example in Tableau; Creating a Tableau group from cluster results; Constraints on saving Clusters; Interpreting your results; How Clustering Works in Tableau; The clustering algorithm; Scaling; Clustering without using k-means; Hierarchical modeling; Statistics for Clustering; Describing Clusters -- Summary tab; Testing your Clustering.…”
Full text (MFA users only)
Electronic eBook -
239
Towards 5G : Applications, Requirements and Candidate Technologies.
Published 2016Table of Contents: “…4.5.4 A System View of€Interference Management: Radio Circuits, PHY€Mechanisms, and€Protocol Designs4.5.5 Dynamic Cloud Services Spectrum Sharing Algorithms and€Mechanisms for€B4G Networks; 4.5.6 Fundamentals of Spectrum Sharing in Device-to-Device and Heterogeneous Communication Networks ; 4.5.7 Structured Sharing of€Network and€Compute Resources in€a€Community of€Devices; 4.5.8 A Unified Framework for Enabling Energy-efficient Mobile Internet Apps and Energy-efficient Cloud Offloading ; References; Part II Candidate Technologies -- Evolutionary ; Chapter 5 Towards Green and Soft.…”
Full text (MFA users only)
Electronic eBook -
240
Wake up : the nine h#tags of digital disruption
Published 2017Full text (MFA users only)
Electronic eBook