Search Results - (((((((ant OR want) OR semantic) OR cantee) OR cantor) OR anne) OR carter) OR wants) algorithms.

  1. 241

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  2. 242

    Handbook on soft computing for video surveillance

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  3. 243

    Predictive Analytics For Dummies. by Bari, Anasse

    Published 2016
    Table of Contents: “…Recognizing Your Data TypesStructured and unstructured data; Static and streamed data; Identifying Data Categories; Attitudinal data; Behavioral data; Demographic data; Generating Predictive Analytics; Data-driven analytics; User-driven analytics; Connecting to Related Disciplines; Statistics; Data mining; Machine learning; Chapter 4 Complexities of Data; Finding Value in Your Data; Delving into your data; Data validity; Data variety; Constantly Changing Data; Data velocity; High volume of data; Complexities in Searching Your Data; Keyword-based search; Semantic-based search.…”
    Full text (MFA users only)
    Electronic eBook
  4. 244

    Machine learning for the web by Isoni, Andrea

    Published 2016
    Table of Contents: “…Multinomial Naive BayesGaussian Naive Bayes; Decision trees; Support vector machine; Kernel trick; A comparison of methods; Regression problem; Classification problem; Hidden Markov model; A Python example; Summary; Web Mining Techniques; Web structure mining; Web crawlers (or spiders); Indexer; Ranking -- PageRank algorithm; Web content mining; Parsing; Natural language processing; Information retrieval models; TF-IDF; Latent Semantic Analysis (LSA); Doc2Vec (word2vec); Word2vec -- continuous bag of words and skip-gram architectures; Mathematical description of the CBOW model.…”
    Full text (MFA users only)
    Electronic eBook
  5. 245

    Beyond artificial intelligence : from human consciousness to artificial consciousness by Cardon, Alain, 1946-

    Published 2018
    Table of Contents: “…The morphological and semantic conformation of the psychic system; 1.13. …”
    Full text (MFA users only)
    Electronic eBook
  6. 246

    Computational phraseology

    Published 2020
    Table of Contents: “…Monocollocable words : a type of language combinatory periphery / František Čermák -- Translation asymmetries of multiword expressions in machine translation : an analysis of the TED-MWE corpus / Johanna Monti, Mihael Arcan and Federico Sangati -- German constructional phrasemes and their Russian counterparts : a corpus-based study / Dmitrij Dobrovol'skij -- Computational phraseology and translation studies : from theoretical hypotheses to practical tools / Jean-Pierre Colson -- Computational extraction of formulaic sequences from corpora : two case studies of a new extraction algorithm / Alexander Wahl and Stefan Th. Gries -- Computational phraseology discovery in corpora with the MWETOOLKIT / Carlos Ramisch -- Multiword expressions in comparable corpora / Peter Ďurčo -- Collecting collocations from general and specialised corpora : a comparative analysis / Marie-Claude L'Homme and Daphnée Azoulay -- What matters more : the size of the corpora or their quality? …”
    Full text (MFA users only)
    Electronic eBook
  7. 247

    Hack proofing your network

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  8. 248

    Compressed sensing : theory and applications

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  9. 249
  10. 250
  11. 251

    QoS and Energy Management in Cognitive Radio Network : Case Study Approach. by Mishra, Vishram

    Published 2016
    Table of Contents: “…1.6.1 Channel Selection in CR Based Infrastructure Network1.6.2 Channel Selection in CR Based Ad-hoc Network; 1.7 MAC Protocols for Cognitive Radio Networks; 1.7.1 Random Access Based MAC Scheme; 1.7.2 Time-Slotted Based MAC Scheme; 1.8 Self-coexistence in Cognitive Radio Networks; 1.8.1 Resource Relocation Based Self-coexistence; 1.8.2 Resource Sharing Based Self-coexistence; 1.9 Discussion; References; 2 Cognitive Radio Network- A Review; 2.1 Spectrum Management; 2.1.1 Ant Colony Optimization Based Spectrum Management; 2.1.2 Non-linear Optimization Based Spectrum Management.…”
    Full text (MFA users only)
    Electronic eBook
  12. 252

    Better living through economics

    Published 2010
    Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  13. 253

    SMS communication : a linguistic approach

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  14. 254

    Twelfth Scandinavian Conference on Artificial Intelligence : SCAI 2013

    Published 2013
    Table of Contents: “…Traceable Uncertainty for Threat Evaluation in Air to Ground ScenariosKnowledge-Based Industrial Robotics; Probabilistic Inference in BN2T Models by Weighted Model Counting; Doctoral Symposium; On Programming Organization-Aware Agents; Enhancing Recall in Semantic Querying; Industrial Robot Skills; Learning Inverse Kinematics Problem in Changing Task Environment; Neural Network for Prediction of Glucose Concentration in Type 1 Diabetic Patients; Subject Index; Author Index…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 255

    Structural-functional studies in English grammar : in honor of Lachlan Mackenzie

    Published 2007
    Table of Contents: “…Conclusion -- References -- Notes towards an incremental implementation of the Role and Reference Grammar semantics-to-syntax linking algorithm for English -- 1. …”
    Full text (MFA users only)
    Electronic eBook
  16. 256

    QoS in integrated 3G networks by Lloyd-Evans, Robert

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  17. 257

    Robotics : science and systems III

    Published 2008
    Table of Contents: “…Semantic Modeling of Places using Objects / Ananth Ranganathan and Frank Dellaert -- Design of a Bio-inspired Dynamical Vertical Climbing Robot / Jonathan E. …”
    Full text (MFA users only)
    Electronic eBook
  18. 258
  19. 259

    Microbiological sensors for the drinking water industry

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  20. 260

    Modern development in materials, machinery and automation : selected, peer reviewed papers from the 2013 International Conference on Microtechnology and MEMS (ICMM 2013), May 22-23...

    Published 2013
    Table of Contents: “…An Adaptive Intra-Frame Refresh Algorithm Based on Rate Distortion OptimizationA New Method for the Optimal Configuration of Ship-Based Aircraft Based on the Extended Backpack; Application of Bayesian for the Situation Assessment of Sea-Battlefield; The Application of Semantic Similarity in Text Classification; The Research of Clock Traffic Congestion Model and Synchronization Technology; Chapter 4: Product Design; Research on Motion Capture Instruments in Sports; A Study of Innovative Product Design for Drinking Cups; A Study of Customized Innovative Self-Portrait Product Design…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook