Search Results - (((((((ant OR skantis) OR wants) OR hands) OR cantor) OR anne) OR file) OR wsanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 99
- Mathematical models 73
- Mathematics 64
- Machine learning 54
- Artificial intelligence 51
- Algorithms 48
- algorithms 41
- artificial intelligence 38
- methods 38
- Data mining 35
- Mathematical optimization 30
- Python (Computer program language) 29
- Artificial Intelligence 26
- Computer networks 26
- Development 24
- Signal processing 24
- Digital techniques 22
- Application software 21
- Computer algorithms 21
- Data Mining 20
- Image processing 19
- Computer science 18
- Technological innovations 18
- Computer security 17
- Computer simulation 17
- Diseases 17
- Neural networks (Computer science) 16
- Computational Biology 15
- Research 15
- Statistical methods 15
Search alternatives:
- ant »
- skantis »
- wants »
- cantor »
- wsanting »
-
1
-
2
Ant Colony Optimization and Constraint Programming.
Published 2013Table of Contents: “…Constraint programming; 1.1.2. Ant colony optimization; 1.1.3. Constraint programming with ant colony optimization; Chapter 2. …”
Full text (MFA users only)
Electronic eBook -
3
Optimization of Computer Networks : Modeling and Algorithms: a Hands-On Approach.
Published 2016Full text (MFA users only)
Electronic eBook -
4
-
5
Data Clustering : Algorithms and Applications.
Published 2013Full text (MFA users only)
Electronic eBook -
6
Theory of randomized search heuristics : foundations and recent developments
Published 2011Table of Contents: “…Runtime Analysis of Evolutionary Algorithms for Discrete Optimization Peter S. Oliveto and Xin Yao; 3. …”
Full text (MFA users only)
Electronic eBook -
7
Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
Published 2018Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
Full text (MFA users only)
Electronic eBook -
8
Algorithmic trading : winning strategies and their rationale
Published 2013Full text (MFA users only)
Electronic eBook -
9
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
10
-
11
-
12
Bioinformatics algorithms : techniques and applications
Published 2008Full text (MFA users only)
Electronic eBook -
13
-
14
The rise of the algorithms : how YouTube and TikTok conquered the world
Published 2024Full text (MFA users only)
Electronic eBook -
15
-
16
-
17
-
18
Jewels of stringology : text algorithms.
Published 2002Table of Contents: “…Stringology. 1.1. Text file facilities. 1.2. Dictionaries. 1.3. Data compression. 1.4. …”
Full text (MFA users only)
Electronic eBook -
19
-
20
Algorithms for worst-case design and applications to risk management
Published 2002Full text (MFA users only)
Electronic eBook