Search Results - (((((((ant OR stantis) OR wantis) OR hands) OR cantor) OR anne) OR file) OR planning) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 110
- Mathematical models 83
- Mathematics 70
- Artificial intelligence 59
- Algorithms 51
- Machine learning 51
- algorithms 44
- artificial intelligence 41
- methods 39
- Data mining 35
- Mathematical optimization 33
- Artificial Intelligence 26
- Computer networks 26
- Python (Computer program language) 26
- Computer algorithms 24
- Signal processing 24
- Technological innovations 24
- Development 23
- Digital techniques 23
- Application software 21
- Data Mining 21
- Image processing 20
- Management 20
- Research 20
- Decision making 19
- Diseases 19
- Computer science 18
- Computer simulation 18
- Computer security 17
- Treatment 17
Search alternatives:
- ant »
- stantis »
- wantis »
- cantor »
-
1
-
2
Ant Colony Optimization and Constraint Programming.
Published 2013Table of Contents: “…Constraint programming; 1.1.2. Ant colony optimization; 1.1.3. Constraint programming with ant colony optimization; Chapter 2. …”
Full text (MFA users only)
Electronic eBook -
3
Network-Based Distributed Planning Using Coevolutionary Algorithms.
Published 2004Table of Contents: “…Combinatorial optimization. 2.3. Evolutionary algorithms. 2.4. Agents. 2.5. Distributed problem solving -- 3. …”
Full text (MFA users only)
Electronic eBook -
4
Optimization of Computer Networks : Modeling and Algorithms: a Hands-On Approach.
Published 2016Full text (MFA users only)
Electronic eBook -
5
-
6
Data Clustering : Algorithms and Applications.
Published 2013Full text (MFA users only)
Electronic eBook -
7
Theory of randomized search heuristics : foundations and recent developments
Published 2011Table of Contents: “…Runtime Analysis of Evolutionary Algorithms for Discrete Optimization Peter S. Oliveto and Xin Yao; 3. …”
Full text (MFA users only)
Electronic eBook -
8
Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
Published 2018Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
Full text (MFA users only)
Electronic eBook -
9
Genetic Algorithms : Concepts and Designs.
Published 1999Table of Contents: “…Genetic Algorithms in Production Planning and Scheduling Problems; 10. …”
Full text (MFA users only)
Electronic eBook -
10
Algorithmic trading : winning strategies and their rationale
Published 2013Full text (MFA users only)
Electronic eBook -
11
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
12
-
13
-
14
Bioinformatics algorithms : techniques and applications
Published 2008Full text (MFA users only)
Electronic eBook -
15
-
16
The rise of the algorithms : how YouTube and TikTok conquered the world
Published 2024Full text (MFA users only)
Electronic eBook -
17
-
18
-
19
-
20
Jewels of stringology : text algorithms.
Published 2002Table of Contents: “…Stringology. 1.1. Text file facilities. 1.2. Dictionaries. 1.3. Data compression. 1.4. …”
Full text (MFA users only)
Electronic eBook