Search Results - (((((((ant OR want) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 221

    Mastering Scala machine learning by Kozlov, Alexander

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  2. 222
  3. 223

    Applied Parallel Computing. by Deng, Yuefan

    Published 2012
    Table of Contents: “…Design of Algorithms; 5.1. Algorithm Models; 5.1.1. Master-slave; 5.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  4. 224

    Numerical Methods for Eigenvalue Problems. by Börm, Steffen

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  5. 225

    Eat, cook, grow : mixing human-computer interactions with human-food interactions

    Published 2014
    Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
    Full text (MFA users only)
    Electronic eBook
  6. 226
  7. 227

    Optimization of Observation and Control Processes. by Malyshev, V. V.

    Published 2000
    Table of Contents: “…Optimization of Informational Noise When Observing a Dynamic Object""; ""4.6. Example of Observing a Maneuvering Object""; ""Chapter 5. …”
    Full text (MFA users only)
    Electronic eBook
  8. 228

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  9. 229
  10. 230

    Data mining techniques : for marketing, sales, and customer relationship management by Berry, Michael J. A.

    Published 2004
    Table of Contents: “…-- The virtuous cycle of data mining -- Data mining methodology and best practices -- Data mining applications in marketing and customer relationship management -- The lure of statistics : data mining using familiar tools -- Decision trees -- Artificial neural networks -- Nearest neighbor approaches : memory-based reasoning and collaborative filtering -- Market basket analysis and association rules -- Link analysis -- Automatic cluster detection -- Knowing when to worry : hazard functions and survival analysis in marketing -- Genetic algorithms -- Data mining throughout the customer life cycle -- Data warehousing, OLAP, and data mining -- Building the data mining environment -- Preparing data for mining -- Putting data mining to work.…”
    Full text (MFA users only)
    Electronic eBook
  11. 231
  12. 232

    Advances in digital technologies : proceedings of the 6th International Conference on Applications of Digital Information and Web Technologies 2015

    Published 2015
    Table of Contents: “…Application of Genetic Algorithms to Context-Sensitive Text MiningA Decision Tree Classification Model for Determining the Location for Solar Power Plant; A Framework for Multi-Label Learning Using Label Ranking and Correlation; A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5; Subject Index; Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 233
  14. 234
  15. 235

    Experiencing architecture in the nineteenth century : buildings and society in the modern age

    Published 2019
    Table of Contents: “…'The pressing public want of the age': The arrival of the grand hotel'Bitter competition in the London hotel world': The problem of publicity; 'A wealthy man's private mansion': The assurance of exclusivity; The 'spirit of the time': Cosmopolitanism and heterosociability; Conclusion; Chapter 10: 'The fullest fountain of advancing civilization': Experiencing Anthony Trollope's House of Commons, 1852-82; Experiences of Parliament; Progressive architecture; A political theatre; Conclusion: Reading experiences.…”
    Full text (MFA users only)
    Electronic eBook
  16. 236

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook
  17. 237
  18. 238

    Optimization advances in electric power systems

    Published 2008
    Table of Contents: “…Unreliability Costs -- 3.5. Proposed Algorithms -- 3.5.1. ES and TS Algorithms -- 3.5.2. …”
    Full text (MFA users only)
    Electronic eBook
  19. 239

    Handbook of operations research in natural resources

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  20. 240

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook