Search Results - (((((((ant OR want) OR ante) OR wkant) OR cantor) OR anne) OR share) OR hints) algorithms.

Refine Results
  1. 1

    Ant Colony Optimization and Constraint Programming. by Solnon, Christine

    Published 2013
    Table of Contents: “…Constraint programming; 1.1.2. Ant colony optimization; 1.1.3. Constraint programming with ant colony optimization; Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  2. 2

    Ant colony optimization by Dorigo, Marco

    Published 2004
    Table of Contents: “…Preface; Acknowledgments; 1 -- From Real to Artificial Ants; 2 -- The Ant Colony Optimization Metaheuristic; 3 -- Ant Colony Optimization Algorithms for the Traveling Salesman Problem; 4 -- Ant Colony Optimization Theory; 5 -- Ant Colony Optimization for NP-Hard Problems; 6 -- AntNet: An ACO Algorithm for Data Network Routing; 7 -- Conclusions and Prospects for the Future; Appendix: Sources of Information about the ACO Field; References; Index.…”
    Full text (MFA users only)
    Electronic eBook
  3. 3

    Theory of randomized search heuristics : foundations and recent developments

    Published 2011
    Table of Contents: “…Theory of Particle Swarm Optimization Carsten Witt; 8. Ant Colony Optimization: Recent Developments in Theoretical Analysis Walter J. …”
    Full text (MFA users only)
    Electronic eBook
  4. 4

    Algorithmic Puzzles. by Levitin, Anany, Levitin, Maria

    Published 2011
    Table of Contents: “…-- General strategies for algorithm design -- Analysis techniques -- Easier puzzles (#1 to #50) -- Puzzles of medium difficulty (#51 to #110) -- Harder puzzles (#111 to #150) -- Hints -- Solutions -- References -- Design stragety and analysis index.…”
    Full text (MFA users only)
    Electronic eBook
  5. 5

    Algorithms for Dummies. by Mueller, John Paul

    Published 2022
    Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Algorithms -- Chapter 1 Introducing Algorithms -- Describing Algorithms -- The right way to make toast: Defining algorithm uses -- Finding algorithms everywhere -- Using Computers to Solve Problems -- Getting the most out of modern CPUs and GPUs -- Working with special-purpose chips -- Networks: Sharing is more than caring -- Leveraging available data…”
    Full text (MFA users only)
    Electronic eBook
  6. 6
  7. 7

    Nature-inspired optimization algorithms by Yang, Xin-She

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  8. 8

    Permutation Group Algorithms by Seress, kos

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  9. 9

    Algorithms in invariant theory by Sturmfels, Bernd, 1962-

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  10. 10
  11. 11

    Introduction to cryptography by Padhye, Sahadeo, Sahu, Rajeev A., Saraswat, Vishal

    Published 2018
    Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
    Full text (MFA users only)
    Electronic eBook
  12. 12

    The Sharing Economy : Implications for the Future of Hospitality and Tourism. by Okumus, Fevzi

    Published 2017
    Table of Contents: “…Chaos and complexity in tourismStudy tenets -- The sharing economy and tourism -- Peer-to-peer accommodation in Greece -- Methods -- Participants -- Sample determination and collection -- Measures -- Implementation of fuzzy-set qualitative comparative analysis algorithms -- Results -- Sufficient complex statements -- Discussion -- Confirmation of tenets -- Fuzzy-set qualitative comparative analysis versus regression and Cramerâ#x80;#x99;s V -- Fit and predictive validity -- Managerial implications -- Limitations and future research -- References…”
    Full text (MFA users only)
    Electronic eBook
  13. 13

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  14. 14

    Parallel Computing Using the Prefix Problem. by Lakshmivarahan, S.

    Published 1994
    Table of Contents: “…Preface; Acknowledgments; Part One -- Getting Started; Chapter 1 -- The Prefix Problem And Its Applications; 1.1 The Prefix Problem; 1.2 Why Prefix Problem; 1.3 Exercises; 1.4 Notes and References; Chapter 2 -- Parallel Machines And Models -- An Overview; 2.1 The Need for Parallelism; 2.2 A Classification of Parallel Computers; 2.3 Parallel Models; 2.4 Performance Measures; 2.5 A Parallel Complexity Class; 2.6 Brent's Inequality; 2.7 A Simple Lower Bound; 2.8 Exercises; 2.9 Notes and References; Part Two -- Algorithms For Shared Memory Models.…”
    Full text (MFA users only)
    Electronic eBook
  15. 15

    Concurrency by Malkhi, Dahlia

    Published 2019
    Table of Contents: “…TECHNICAL PERSPECTIVES ON LAMPORT'SWORK -- 1. Shared Memory and the Bakery Algorithm -- 2. The Notions of Time and Global State in a Distributed System -- 3. …”
    Full text (MFA users only)
    Electronic eBook
  16. 16

    Swarm Intelligence Algorithms : Modifications and Applications. by Slowik, Adam

    Published 2020
    Table of Contents: “…-- 1.2.3 Pseudo-code of standard ACO algorithm -- 1.3 Modified variants of ant colony optimization -- 1.3.1 Elitist ant systems -- 1.3.2 Ant colony system -- 1.3.3 Max-min ant system -- 1.3.4 Rank based ant systems -- 1.3.5 Continuous orthogonal ant systems…”
    Full text (MFA users only)
    Electronic eBook
  17. 17

    An Introduction to Algorithmic Trading : Basic to Advanced Strategies. by Leshik, Edward, Cralle, Jane

    Published 2011
    Table of Contents: “…Introduction to trading algorithms. History ; All about trading algorithms you ever wanted to know ... ; Algos defined and explained ; Who uses and provides algos ; Why have they become mainstream so quickly? …”
    Full text (MFA users only)
    Electronic eBook
  18. 18
  19. 19

    Pattern Recognition. by Theodoridis, Sergios

    Published 2008
    Table of Contents: “…Chapter 13 Clustering Algorithms II: Hierarchical AlgorithmsChapter 14 Clustering Algorithms III: Schemes Based on Function Optimization; Chapter 15 Clustering Algorithms IV; Chapter 16 Cluster Validity; Appendix A Hints from Probability and Statistics; Appendix B Linear Algebra Basics; Appendix C Cost Function Optimization; Appendix D Basic Definitions from Linear Systems Theory; Index.…”
    Full text (MFA users only)
    Electronic eBook
  20. 20

    Signal processing for 5G : algorithms and implementations

    Published 2016
    Table of Contents: “…An Introduction to Modulations and Waveforms for 5G Networks / Stefano Buzzi, Alessandro Ugolini, Alessio Zappone, Giulio Colavolpe -- Faster-than-Nyquist Signaling for 5G Communication / John B Anderson -- From OFDM to FBMC: Principles and Comparisons / Wei Jiang, Thomas Kaiser -- Filter Bank Multicarrier for Massive MIMO / Arman Farhang, Nicola Marchetti, Behrouz Farhang-Boroujeny -- Bandwidth-compressed Multicarrier Communication: SEFDM / Izzat Darwazeh, Tongyang Xu, Ryan C Grammenos -- Non-orthogonal Multi-User Superposition and Shared Access / Yifei Yuan -- Non-Orthogonal Multiple Access (NOMA): Concept and Design / Anass Benjebbour, Keisuke Saito, Anxin Li, Yoshihisa Kishiyama, Takehiro Nakamura -- Major 5G Waveform Candidates: Overview and Comparison / Hao Lin, Pierre Siohan -- NEW SPATIAL SIGNAL PROCESSING FOR 5G. …”
    Full text (MFA users only)
    Electronic eBook