Search Results - (((((((ant OR want) OR semantic) OR cantee) OR cantor) OR anne) OR carter) OR wants) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 39
- Data processing 30
- Machine learning 24
- Data mining 22
- artificial intelligence 20
- Mathematics 17
- Mathematical optimization 16
- Artificial Intelligence 14
- Mathematical models 13
- Python (Computer program language) 13
- Computer science 11
- Data Mining 11
- Neural networks (Computer science) 10
- Technological innovations 10
- Machine Learning 9
- methods 9
- Algorithms 8
- Application software 8
- Development 8
- Information technology 8
- Big data 7
- Computational linguistics 7
- Computer networks 7
- algorithms 7
- Computer security 6
- Pattern recognition systems 6
- Social aspects 6
- Bioinformatics 5
- Computational Biology 5
- Design and construction 5
Search alternatives:
- ant »
- want »
- semantic »
- cantee »
- cantor »
- wants »
-
241
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
242
Handbook on soft computing for video surveillance
Published 2012Full text (MFA users only)
Electronic eBook -
243
Predictive Analytics For Dummies.
Published 2016Table of Contents: “…Recognizing Your Data TypesStructured and unstructured data; Static and streamed data; Identifying Data Categories; Attitudinal data; Behavioral data; Demographic data; Generating Predictive Analytics; Data-driven analytics; User-driven analytics; Connecting to Related Disciplines; Statistics; Data mining; Machine learning; Chapter 4 Complexities of Data; Finding Value in Your Data; Delving into your data; Data validity; Data variety; Constantly Changing Data; Data velocity; High volume of data; Complexities in Searching Your Data; Keyword-based search; Semantic-based search.…”
Full text (MFA users only)
Electronic eBook -
244
Machine learning for the web
Published 2016Table of Contents: “…Multinomial Naive BayesGaussian Naive Bayes; Decision trees; Support vector machine; Kernel trick; A comparison of methods; Regression problem; Classification problem; Hidden Markov model; A Python example; Summary; Web Mining Techniques; Web structure mining; Web crawlers (or spiders); Indexer; Ranking -- PageRank algorithm; Web content mining; Parsing; Natural language processing; Information retrieval models; TF-IDF; Latent Semantic Analysis (LSA); Doc2Vec (word2vec); Word2vec -- continuous bag of words and skip-gram architectures; Mathematical description of the CBOW model.…”
Full text (MFA users only)
Electronic eBook -
245
Beyond artificial intelligence : from human consciousness to artificial consciousness
Published 2018Table of Contents: “…The morphological and semantic conformation of the psychic system; 1.13. …”
Full text (MFA users only)
Electronic eBook -
246
Computational phraseology
Published 2020Table of Contents: “…Monocollocable words : a type of language combinatory periphery / František Čermák -- Translation asymmetries of multiword expressions in machine translation : an analysis of the TED-MWE corpus / Johanna Monti, Mihael Arcan and Federico Sangati -- German constructional phrasemes and their Russian counterparts : a corpus-based study / Dmitrij Dobrovol'skij -- Computational phraseology and translation studies : from theoretical hypotheses to practical tools / Jean-Pierre Colson -- Computational extraction of formulaic sequences from corpora : two case studies of a new extraction algorithm / Alexander Wahl and Stefan Th. Gries -- Computational phraseology discovery in corpora with the MWETOOLKIT / Carlos Ramisch -- Multiword expressions in comparable corpora / Peter Ďurčo -- Collecting collocations from general and specialised corpora : a comparative analysis / Marie-Claude L'Homme and Daphnée Azoulay -- What matters more : the size of the corpora or their quality? …”
Full text (MFA users only)
Electronic eBook -
247
-
248
Compressed sensing : theory and applications
Published 2012Full text (MFA users only)
Electronic eBook -
249
Screenplay and narrative theory : the screenplectics model of complex narrative systems
Published 2015Full text (MFA users only)
Electronic eBook -
250
Sentient Enterprise The Evolution of Business Decision-making.
Published 2017Full text (MFA users only)
Electronic eBook -
251
QoS and Energy Management in Cognitive Radio Network : Case Study Approach.
Published 2016Table of Contents: “…1.6.1 Channel Selection in CR Based Infrastructure Network1.6.2 Channel Selection in CR Based Ad-hoc Network; 1.7 MAC Protocols for Cognitive Radio Networks; 1.7.1 Random Access Based MAC Scheme; 1.7.2 Time-Slotted Based MAC Scheme; 1.8 Self-coexistence in Cognitive Radio Networks; 1.8.1 Resource Relocation Based Self-coexistence; 1.8.2 Resource Sharing Based Self-coexistence; 1.9 Discussion; References; 2 Cognitive Radio Network- A Review; 2.1 Spectrum Management; 2.1.1 Ant Colony Optimization Based Spectrum Management; 2.1.2 Non-linear Optimization Based Spectrum Management.…”
Full text (MFA users only)
Electronic eBook -
252
Better living through economics
Published 2010Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
Full text (MFA users only)
Electronic eBook -
253
SMS communication : a linguistic approach
Published 2014Full text (MFA users only)
Electronic eBook -
254
Twelfth Scandinavian Conference on Artificial Intelligence : SCAI 2013
Published 2013Table of Contents: “…Traceable Uncertainty for Threat Evaluation in Air to Ground ScenariosKnowledge-Based Industrial Robotics; Probabilistic Inference in BN2T Models by Weighted Model Counting; Doctoral Symposium; On Programming Organization-Aware Agents; Enhancing Recall in Semantic Querying; Industrial Robot Skills; Learning Inverse Kinematics Problem in Changing Task Environment; Neural Network for Prediction of Glucose Concentration in Type 1 Diabetic Patients; Subject Index; Author Index…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
255
Structural-functional studies in English grammar : in honor of Lachlan Mackenzie
Published 2007Table of Contents: “…Conclusion -- References -- Notes towards an incremental implementation of the Role and Reference Grammar semantics-to-syntax linking algorithm for English -- 1. …”
Full text (MFA users only)
Electronic eBook -
256
-
257
Robotics : science and systems III
Published 2008Table of Contents: “…Semantic Modeling of Places using Objects / Ananth Ranganathan and Frank Dellaert -- Design of a Bio-inspired Dynamical Vertical Climbing Robot / Jonathan E. …”
Full text (MFA users only)
Electronic eBook -
258
-
259
Microbiological sensors for the drinking water industry
Published 2018Full text (MFA users only)
Electronic eBook -
260
Modern development in materials, machinery and automation : selected, peer reviewed papers from the 2013 International Conference on Microtechnology and MEMS (ICMM 2013), May 22-23...
Published 2013Table of Contents: “…An Adaptive Intra-Frame Refresh Algorithm Based on Rate Distortion OptimizationA New Method for the Optimal Configuration of Ship-Based Aircraft Based on the Extended Backpack; Application of Bayesian for the Situation Assessment of Sea-Battlefield; The Application of Semantic Similarity in Text Classification; The Research of Clock Traffic Congestion Model and Synchronization Technology; Chapter 4: Product Design; Research on Motion Capture Instruments in Sports; A Study of Innovative Product Design for Drinking Cups; A Study of Customized Innovative Self-Portrait Product Design…”
Full text (MFA users only)
Electronic Conference Proceeding eBook