Search Results - (((((((ant OR wanning) OR semantic) OR mind) OR cantor) OR anne) OR planet) OR hints) algorithms.

Search alternatives:

  1. 161

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  2. 162

    Metaheuristics for vehicle routing problems. by Labadie, Nacima

    Published 2015
    Table of Contents: “…Memetic algorithm; 4.1.3. Memetic algorithm with population management; 4.1.4. …”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  4. 164

    The Decisionist Imagination : Sovereignty, Social Science and Democracy in the 20th Century. by Guilhot, Nicolas

    Published 2018
    Table of Contents: “…Reading the International Mind; Chapter 2. Militant Democracy as Decisionist Liberalism; Chapter 3. …”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Kernels for structured data by Gärtner, Thomas

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  6. 166

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Parallel computing : technology trends

    Published 2020
    Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  8. 168

    Computational models of argument : Proceedings of COMMA 2012

    Published 2012
    Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  9. 169

    Automata and Computability. by Kozen, Dexter, 1951-

    Published 1997
    Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
    Full text (MFA users only)
    Electronic eBook
  10. 170

    Mathematical morphology and its applications to image and signal processing

    Published 2000
    Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  11. 171

    Learning-based local visual representation and indexing by Rongrong, Ji, Yao, Hongxun, Gao, Yue, Duan, Ling-Yu, Dai, Qionghai

    Published 2014
    Table of Contents: “…3.4.1 Cross-database Case3.4.2 Incremental Transfer; 3.5 Experiments; 3.5.1 Quantitative results; 3.6 Summary; Chapter 4: Supervised Dictionary Learning via Semantic Embedding ; 4.1 Introduction; 4.2 Semantic Labeling Propagation; 4.2.1 Density Diversity Estimation ; 4.3 Supervised Dictionary Learning; 4.3.1 Generative Modeling ; 4.3.2 Supervised Quantization ; 4.4 Experiments; 4.4.1 Database and Evaluations; 4.4.2 Quantitative Results; 4.5 Summary; Chapter 5: Visual Pattern Mining; 5.1 Introduction; 5.2 Discriminative 3D Pattern Mining; 5.2.1 The Proposed Mining Scheme.…”
    Full text (MFA users only)
    Electronic eBook
  12. 172
  13. 173

    Java programming interviews exposed by Markham, Noel

    Published 2014
    Table of Contents: “…Chapter 18: Useful LibrariesRemoving Boilerplate Code with Apache Commons; Developing with Guava Collections; Using Joda Time; Summary; Chapter 19: Developing with Build Tools; Building Applications with Maven; Ant; Summary; Chapter 20: Android; Basics; User Interface; Persistence; Android Hardware; Summary; Appendix: Introducing Scala; Scala Basics; Functions as Values; Immutability; Summary; Index.…”
    Full text (MFA users only)
    Electronic eBook
  14. 174
  15. 175

    Big Data, IoT, and Machine Learning : Tools and Applications. by Agrawal, Rashmi

    Published 2020
    Table of Contents: “…Chapter 3 Reviews Analysis of Apple Store Applications Using Supervised Machine Learning -- 3.1 Introduction -- 3.2 Literature Review -- 3.2.1 Machine Learning Algorithms -- 3.2.2 Feature Extraction Algorithms -- 3.3 Proposed Methodology -- 3.3.1 Data Collection -- 3.3.2 Feature Extraction -- 3.3.3 Data Analysis and Sentiment Analysis -- Text Processing -- 3.3.4 Text Normalisation -- 3.4 Feature Extraction Algorithm -- 3.4.1 CountVectorizer -- 3.4.2 TfidfVectorizer (TF-IDF) -- 3.5 Supervised ML Classification -- 3.6 Experiment Design -- 3.7 Experimental Results and Analysis…”
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Knowledge discovery for business information systems

    Published 2001
    Table of Contents: “…Problem Description -- 3. The FUP Algorithm for the Insertion Only Case -- 4. The FUP Algorithm for the Deletions Only Case -- 5. …”
    Full text (MFA users only)
    Electronic eBook
  17. 177

    Introduction to graph theory by Voloshin, Vitaly I. (Vitaly Ivanovich), 1954-

    Published 2009
    Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
    Full text (MFA users only)
    Electronic eBook
  18. 178

    Advanced Artificial Intelligence.

    Published 2011
    Table of Contents: “…Applications of temporal and spatial logic; 4.7.4. Randell algorithm; Exercises; Chapter 5 Case-Based Reasoning; 5.1 Overview; 5.2 Basic Notations; 5.3 Process Model; 5.4 Case Representation; 5.4.1 Semantic Memory Unit; 5.4.2 Memory Network; 5.5 Case Indexing; 5.6 Case Retrieval; 5.7 Similarity Relations in CBR; 5.7.1 Semantic similarity; 5.7.2 Structural similarity; 5.7.3 Goal's features; 5.7.4 Individual similarity; 5.7.5 Similarity assessment; 5.8 Case Reuse; 5.9 Case Retainion; 5.10 Instance-Based Learning.…”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    Applied mechatronics and android robotics : selected, peer reviewed papers from the International Conference on Applied Mechatronics and Android Robotics (ICAMAR 2013), July 13-14,...

    Published 2013
    Table of Contents: “…Applied Mechatronics and Android Robotics; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Robot Design, Motion Planning and Robot Control; Design of a Master Manipulator with Dynamical Simplification for Master-Slave Robot; Parameter Self-Adjusting Path Tracking Algorithm of Mobile Robots; Global Path Planning for Mobile Robot Based on Improved Ant Colony Algorithms; A Study of Robot Platform Based on WiFi Remote Control; Fire Detection System Based-On Mobile Robots; Phase Plane Analysis of Battery Series Balancing on Robot…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  20. 180

    The attacker's advantage : turning uncertainty into breakthrough opportunities by Charan, Ram

    Published 2015
    Table of Contents: “…-- Bends in the road -- Why structural uncertainty is different -- The mathematical corporation : the algorithmic revolution and the rise of the math house -- Searching for early warning signals -- Identifying the catalysts of structural change -- Seeing what catalysts see -- Tools to build perceptual acuity -- How Tata Communications expands the organization's lens -- Defining the path -- A mind-set for offense -- Kaiser Permanente's path through the turmoil in health care -- The joint practice session : transparency and coordination -- How Keurig Green Mountain adopted the joint practice session -- The what, who, and how of decision making : zeroing in on the organization's critical decision nodes -- Steering on two tracks -- Merck's quick organizational turn to offense.…”
    Full text (MFA users only)
    Electronic eBook