Search Results - (((((((ant OR want) OR santis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 46
- Artificial intelligence 44
- Machine learning 35
- Mathematics 32
- Mathematical models 29
- artificial intelligence 28
- Algorithms 25
- Data mining 25
- Mathematical optimization 24
- algorithms 24
- Technological innovations 20
- Artificial Intelligence 19
- Computer networks 19
- Computer algorithms 17
- methods 17
- Application software 16
- Development 16
- Information technology 16
- Big data 15
- Python (Computer program language) 15
- Social aspects 15
- Data Mining 14
- Management 13
- Electronic data processing 12
- Neural networks (Computer science) 12
- Research 12
- Computer science 10
- Design and construction 10
- History 10
- Wireless communication systems 10
Search alternatives:
- ant »
- want »
- santis »
- cantor »
- share »
-
41
Uberland : how algorithms are rewriting the rules of work
Published 2018Table of Contents: “…Introduction : using an app to go to work-Uber as a symbol of the new economy -- Workers as digital pawns : how Uber uses the sharing economy to exploit everyone -- Motivations to drive : how Uber creates jobs for many at the expense of a few -- Grandiose promises : how Uber proposes entrepreneurship to the masses -- The shady middleman : how Uber plays broker to line its pockets -- Behind the curtain : how Uber rules drivers with algorithms -- In the big leagues : how Uber plays ball -- Conclusion : the new age of Uber-how technology consumption rewrote the rules of work -- Appendix 1. methodology : how I studied Uber -- Appendix 2. ridehailing beyond Uber : meet Lyft, the younger twin.…”
Full text (MFA users only)
Electronic eBook -
42
Meta-heuristic and evolutionary algorithms for engineering optimization
Published 2017Table of Contents: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search (PS) -- Genetic algorithm (GA) -- Simulated annealing (SA) -- Tabu search (TS) -- Ant colony optimization (ACO) -- Particle swarm optimization (PSO) -- Differential evolution (DE) -- Harmony search (HS) -- Shuffled frog-leaping algorithm (SFLA) -- Honey-bee mating optimization (HBMO) -- Invasive weed optimization (IWO) -- Central force optimization (CFO) -- Biogeography-based optimization (BBO) -- Firefly algorithm (FA) -- Gravity search algorithm (GSA) -- Bat algorithm (BA) -- Plant propagation algorithm (PPA) -- Water cycle algorithm (WCA) -- Symbiotic organisms search (SOS) -- Comprehensive evolutionary algorithm (CEA).…”
Full text (MFA users only)
Electronic eBook -
43
Fundamentals of grid computing : theory, algorithms and technologies
Published 2010Table of Contents: “…Cover; Title; Copyright; Contents; List of Figures; List of Tables; Foreword; Preface; Chapter 1: Grid computing overview; Chapter 2: Synchronization protocols for sharing resources in grid environments; Chapter 3: Data replication in grid environments; Chapter 4: Data management in grids; Chapter 5: Future of grids resources management; Chapter 6: Fault-tolerance and availability awareness in computational grids; Chapter 7: Fault tolerance for distributed scheduling in grids; Chapter 8: Broadcasting for grids; Chapter 9: Load balancing algorithms for dynamic networks.…”
Full text (MFA users only)
Electronic eBook -
44
Building software for simulation : theory and algorithms, with applications in C++
Published 2011Full text (MFA users only)
Electronic eBook -
45
We are data : algorithms and the making of our digital selves
Published 2017Table of Contents: “…-- Privacy: wanted dead or alive -- Conclusion: ghosts in the machine.…”
Full text (MFA users only)
Electronic eBook -
46
Algorithmic problems of group theory, their complexity, and applications to cryptography
Published 2015Table of Contents: “…Formal Definition -- 3. Shamirâ€?s Secret Sharing Scheme -- 4. Secret Sharing Using Non-commutative Groups -- 5. …”
Full text (MFA users only)
Electronic eBook -
47
An Investigation into Authentication Security of GSM algorithm for Mobile Banking.
Published 2014Full text (MFA users only)
Electronic eBook -
48
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
49
Parallel Scientific Computing.
Published 2015Table of Contents: “…Performance analysis -- 3 Parallel Algorithm Concepts -- 3.1. Parallel algorithms for recurrences -- 3.2. …”
Full text (MFA users only)
Electronic eBook -
50
What to Do When Machines Do Everything : Five Ways Your Business Can Thrive in an Economy of Bots, AI, and Data.
Published 2017Table of Contents: “…What to Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data; Contents; Preface; 1: When Machines Do Everything; Like It or Not, This Is Happening; Digital That Matters; Playing the New Game; But Will I Be Automated Away?…”
Full text (MFA users only)
Electronic eBook -
51
A guide to creating a successful algorithmic trading strategy
Published 2016Full text (MFA users only)
Electronic eBook -
52
Computational technologies. Advanced topics
Published 2015Full text (MFA users only)
Electronic eBook -
53
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.…”
Full text (MFA users only)
Electronic eBook -
54
Bayesian phylogenetics : methods, algorithms, and applications
Published 2014Table of Contents: “…Front Cover; Contents; List of Figures; List of Tables; Preface; Editors; Contributors; Chapter 1: Bayesian phylogenetics: methods, computational algorithms, and applications; Chapter 2: Priors in Bayesian phylogenetics; Chapter 3: Inated density ratio (IDR) method for estimating marginal likelihoods in Bayesian phylogenetics; Chapter 4: Bayesian model selection in phylogenetics and genealogy-based population genetics; Chapter 5: Variable tree topology stepping-stone marginal likelihood estimation; Chapter 6: Consistency of marginal likelihood estimation when topology varies.…”
Full text (MFA users only)
Electronic eBook -
55
Mastering machine learning with R : advanced prediction, algorithms, and learning methods with R 3.x
Published 2017Full text (MFA users only)
Electronic eBook -
56
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto.
Published 2019Table of Contents: “…59 -- Cryptography Basics 59 -- Encryption 59 -- Integrity Hashing 72 -- Cryptographic Uses 73 -- How Quantum Computers Can Break Cryptography 74 -- Cutting Time 74 -- Quantum Algorithms 76 -- What Quantum Can and Can’t Break 79 -- Still Theoretical 82 -- Summary 83 -- 4 When Will the Quantum Crypto Break Happen? …”
Full text (MFA users only)
Electronic eBook -
57
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
58
Adventures in Raspberry Pi
Published 2017Table of Contents: “…Creating Health-Point-Stealing Sprites -- Improving the Movement of the Adventurer Sprite Using if Blocks -- Creating a Game Over Screen -- Ideas for Improvements to Your Game -- Adventure 4 Programming Shapes with Turtle Graphics -- Scratch Turtle Graphics -- Using Pen Down and Pen Up -- Drawing Simple Shapes -- Using "clear" and Setting a Start Point -- Using Variables Instead of Values -- Changing the Size and Colour of the Pen -- Creating Spiral Patterns -- Using User Input to Determine the Number of Sides -- Python Turtle Graphics -- Introducing Python Modules -- The Python 3 Environment and the Interpreter Window -- Using the Turtle Module in Python -- The range Function -- Other Python Turtle Module Commands -- Some Super Spirals -- Further Adventures with Python Turtle -- Adventure 5 Programming with Python -- Getting Set Up for Python -- Python Programming Language -- The IDLE Environment -- Programming in Python: Using a Function -- Using a Text Editor to Create a Code File -- Using the Python time and random Modules -- Python Text Adventure Game -- Getting User Input -- Using Conditionals -- Using a while Loop -- Using a Variable for Health Points -- Putting It All Together -- Defining Functions -- Creating a Main Game Loop -- Continuing Your Python Adventure -- Adventure 6 Programming Minecraft Worlds on the Raspberry Pi -- Getting Started with Minecraft Pi -- Your First Minecraft Pi Python Program -- Using Coordinates in Minecraft Pi -- Finding the Player's Location -- Changing the Player's Location -- Placing a Block -- Placing Multiple Blocks -- Types of Blocks -- Creating a TNT Chain Reaction -- Creating a Diamond Transporter -- Sharing and Cloning Minecraft Pi Programs -- Adventure 7 Coding Music with Sonic Pi -- Getting Started with Sonic Pi -- The Sonic Pi Interface -- Creating Your First Sounds with Sonic Pi.…”
Full text (MFA users only)
Electronic eBook -
59
-
60