Search Results - (((((((ant OR wante) OR mkantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 281

    Computing the homology of the lambda algebra by Tangora, Martin C.

    Published 1985
    Table of Contents: “…Corollaries to the structure formulas""; ""2.6. Tri-grading when p is odd""; ""2.7. The endomorphism Î?""; ""2.8. …”
    Full text (MFA users only)
    Electronic eBook
  2. 282

    Cystic Tumors of the Pancreas : Diagnosis and Treatment

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  3. 283

    Business Hack : the Wealth Dragon Way to Build a Successful Business in the Digital Age. by Lee, John

    Published 2018
    Table of Contents: “…; Disrupting the Market; The Power of Algorithms; Beyond the Digital Age; Chapter 12 Don't Become a Human Bot!…”
    Full text (MFA users only)
    Electronic eBook
  4. 284
  5. 285

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…Acceptances, Behaviours and Infinite Activity in CSPP; HCSP: Imperative State and True Concurrency; Consolidating the Agreement Problem Protocol Verification Environment; On the Complexity of Buffer Allocation in Message Passing Systems; Java PastSet -- A Structured Distributed Shared Memory System; Synchronous Active Objects Introduce CSP's Primitives in Java; Configurable Collective Communication in LAM-MPI; Cache-Affinity Scheduling for Fine Grain Multithreading.…”
    Full text (MFA users only)
    Electronic eBook
  6. 286

    Symbolic computation and education

    Published 2007
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 287

    Solving transport problems : towards green logistics

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  8. 288
  9. 289

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  10. 290

    Artificial intelligent techniques for electric and hybrid electric vehicles

    Published 2020
    Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
    Full text (MFA users only)
    Electronic eBook
  11. 291

    Data analytics and big data by Sedkaoui, Soraya

    Published 2018
    Table of Contents: “…When real time makes the difference; 4.4. What should data analytics address?…”
    Full text (MFA users only)
    Electronic eBook
  12. 292

    Automated database applications testing : specification representation for automated reasoning by Mikhail, Rana Farid

    Published 2010
    Table of Contents: “…Software testing definitions. 1.4. When should testing start in the software lifecycle? …”
    Full text (MFA users only)
    Electronic eBook
  13. 293

    Online engineering

    Published 2009
    Table of Contents: “…THE COVARIANCE INTERSECTION ALGORITHM; 6. LARGEST ELLIPSOID ALGORITHM; 6.1. The Intersection Problem; 6.2. …”
    Full text (MFA users only)
    Electronic eBook
  14. 294

    Database technology for life sciences and medicine

    Published 2010
    Table of Contents: “…Document authoring and searching. 3.5. Sharing distributed biomedical data. 3.6. The architecture of SciPort. 3.7. …”
    Full text (MFA users only)
    Electronic eBook
  15. 295
  16. 296

    Medical data privacy handbook

    Published 2015
    Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
    Full text (MFA users only)
    Electronic eBook
  17. 297

    Neural nets and chaotic carriers by Whittle, Peter, 1927-

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  18. 298

    Scala for Machine Learning - Second Edition. by Nicolas, Patrick R.

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  19. 299
  20. 300