Search Results - (((((((ant OR want) OR semantic) OR went) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 281

    Real-time database systems : architecture and techniques

    Published 2001
    Full text (MFA users only)
    Electronic eBook
  2. 282

    Gradience in grammar : generative perspectives

    Published 2006
    Table of Contents: “…Frisch and Adrienne Stearns -- Intermediate syntactic variants in a dialect : standard speech repertoire and relative acceptability / Leonie Cornips -- Gradedness and optionality in mature and developing grammars / Antonella Sorace -- Decomposing gradience : quantitative versus qualitative distinctions / Matthias Schlesewsky, Ina Bornkessel, and Brian McElree -- Gradient perception of intonation / Caroline Féry and Ruben Stoel -- Prototypicality judgements as inverted perception / Paul Boersma -- Modelling productivity with the gradual learning algorithm : the problem of accidentally exceptionless generalizations / Adam Albright and Bruce Hayes -- Gradedness as relative efficiency in the processing of syntax and semantics / John A. …”
    Full text (MFA users only)
    Electronic eBook
  3. 283
  4. 284

    Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow. by Ravichandiran, Sudharsan

    Published 2018
    Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
    Full text (MFA users only)
    Electronic eBook
  5. 285

    Constraint Solving over Multi-valued Logics : Application to Digital Circuits.

    Published 2002
    Table of Contents: “…-- 3.2 Test Generation -- 3.3 TG Modelling Approaches and Algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  6. 286

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
    Full text (MFA users only)
    Electronic eBook
  7. 287

    HTML5 Multimedia Development Cookbook. by Cruse, Dale

    Published 2011
    Table of Contents: “…More flexible footer contentApplying the outline algorithm; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Are you sure?…”
    Full text (MFA users only)
    Electronic eBook
  8. 288

    Circuit analysis

    Published 2011
    Table of Contents: “…CIRCUIT ANALYSIS; ELECTRICAL ENGINEERINGDEVELOPMENTS; CONTENTS; PREFACE; ELEMENT STAMP ALGORITHM FOR MATRIXFORMULATION OF SYMBOLIC CIRCUITS; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  9. 289

    From text to political positions : text analysis across disciplines

    Published 2014
    Table of Contents: “…Conditional probabilities and associative framing ; Semantic network analysis.…”
    Full text (MFA users only)
    Electronic eBook
  10. 290

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
    Full text (MFA users only)
    Electronic eBook
  11. 291

    Challenges in information technology management

    Published 2008
    Table of Contents: “…Improved data mining algorithms for frequent patterns with composite items / Ke Wang, James N.K. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  12. 292

    Meeting security challenges through data analytics and decision support

    Published 2016
    Table of Contents: “…Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 293

    Fuzzy systems and data mining II : proceedings of FSDM 2016

    Published 2016
    Table of Contents: “…Adaptive Fuzzy Sliding-Mode Control of Robot and SimulationHesitant Bipolar Fuzzy Set and Its Application in Decision Making; Chance Constrained Twin Support Vector Machine for Uncertain Pattern Classification; Set-Theoretic Kripke-Style Semantics for Monoidal T-Norm (Based) Logics; Data Mining; Dynamic Itemset Mining Under Multiple Support Thresholds; Deep Learning with Large Scale Dataset for Credit Card Data Analysis; Probabilistic Frequent Itemset Mining Algorithm over Uncertain Databases with Sampling; Priority Guaranteed and Energy Efficient Routing in Data Center Networks.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 294

    Smart buildings, smart communities and demand response

    Published 2021
    Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
    Full text (MFA users only)
    Electronic eBook
  15. 295
  16. 296

    OpenCV Android Programming By Example. by Muhammad, Amgad

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  17. 297

    Apache Spark for Data Science Cookbook. by Chitturi, Padma Priya

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  18. 298

    Social sensing : building reliable systems on unreliable data by Wang, Dong, Abdelzaher, Tarek, Kaplan, Lance

    Published 2015
    Table of Contents: “…Kaplan; Foreword; Preface; Chapter 1: A new information age; 1.1 Overview; 1.2 Challenges; 1.3 State of the Art; 1.3.1 Efforts on Discount Fusion; 1.3.2 Efforts on Trust and Reputation Systems; 1.3.3 Efforts on Fact-Finding; 1.4 Organization; Chapter 2: Social Sensing Trends and Applications; 2.1 Information Sharing: The Paradigm Shift; 2.2 An Application Taxonomy; 2.3 Early Research; 2.4 The Present Time.…”
    Full text (MFA users only)
    Electronic eBook
  19. 299
  20. 300

    MATLAB for Machine Learning. by Ciaburro, Giuseppe

    Published 2017
    Full text (MFA users only)
    Electronic eBook