Search Results - (((((((ant OR wanti) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 41
- Data processing 39
- Mathematics 31
- Mathematical models 27
- Machine learning 26
- artificial intelligence 26
- Algorithms 25
- algorithms 24
- Mathematical optimization 23
- Data mining 21
- Technological innovations 20
- Artificial Intelligence 17
- Computer algorithms 17
- Computer networks 17
- Information technology 16
- Big data 14
- Social aspects 14
- Management 13
- methods 13
- Development 12
- Research 12
- Data Mining 11
- Application software 10
- Design and construction 10
- Electronic data processing 10
- History 10
- Neural networks (Computer science) 10
- Diseases 9
- Philosophy 9
- Python (Computer program language) 9
Search alternatives:
- ant »
- wanti »
- mantis »
- cantor »
- share »
-
261
Cryptography 101 : From Theory to Practice.
Published 2021Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
Full text (MFA users only)
Electronic eBook -
262
Hands-On Automated Machine Learning : a beginner's guide to building automated machine learning systems using AutoML and Python.
Published 2018Table of Contents: “…; Why use AutoML and how does it help?; When do you automate ML?; What will you learn?; Core components of AutoML systems; Automated feature preprocessing; Automated algorithm selection; Hyperparameter optimization; Building prototype subsystems for each component; Putting it all together as an end-to-end AutoML system; Overview of AutoML libraries; Featuretools; Auto-sklearn; MLBox; TPOT; Summary.…”
Full text (MFA users only)
Electronic eBook -
263
Swift 2 design patterns : build robust and scalable iOS and Mac OS X game applications
Published 2015Full text (MFA users only)
Electronic eBook -
264
-
265
Bladder Cancer : diagnosis and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
266
Social sensing : building reliable systems on unreliable data
Published 2015Table of Contents: “…Kaplan; Foreword; Preface; Chapter 1: A new information age; 1.1 Overview; 1.2 Challenges; 1.3 State of the Art; 1.3.1 Efforts on Discount Fusion; 1.3.2 Efforts on Trust and Reputation Systems; 1.3.3 Efforts on Fact-Finding; 1.4 Organization; Chapter 2: Social Sensing Trends and Applications; 2.1 Information Sharing: The Paradigm Shift; 2.2 An Application Taxonomy; 2.3 Early Research; 2.4 The Present Time.…”
Full text (MFA users only)
Electronic eBook -
267
Constraint Solving over Multi-valued Logics : Application to Digital Circuits.
Published 2002Full text (MFA users only)
Electronic eBook -
268
-
269
Computing the homology of the lambda algebra
Published 1985Table of Contents: “…Corollaries to the structure formulas""; ""2.6. Tri-grading when p is odd""; ""2.7. The endomorphism Î?""; ""2.8. …”
Full text (MFA users only)
Electronic eBook -
270
Cystic Tumors of the Pancreas : Diagnosis and Treatment
Published 2016Full text (MFA users only)
Electronic eBook -
271
Atlas of AI : power, politics, and the planetary costs of artificial intelligence
Published 2021Full text (MFA users only)
Electronic eBook -
272
Communicating process architectures 2002.
Published 2002Table of Contents: “…Acceptances, Behaviours and Infinite Activity in CSPP; HCSP: Imperative State and True Concurrency; Consolidating the Agreement Problem Protocol Verification Environment; On the Complexity of Buffer Allocation in Message Passing Systems; Java PastSet -- A Structured Distributed Shared Memory System; Synchronous Active Objects Introduce CSP's Primitives in Java; Configurable Collective Communication in LAM-MPI; Cache-Affinity Scheduling for Fine Grain Multithreading.…”
Full text (MFA users only)
Electronic eBook -
273
Symbolic computation and education
Published 2007Full text (MFA users only)
Electronic Conference Proceeding eBook -
274
Solving transport problems : towards green logistics
Published 2019Full text (MFA users only)
Electronic eBook -
275
Artificial Neural Network Applications for Software Reliability Prediction.
Published 2017Full text (MFA users only)
Electronic eBook -
276
Artificial intelligent techniques for electric and hybrid electric vehicles
Published 2020Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
Full text (MFA users only)
Electronic eBook -
277
Data analytics and big data
Published 2018Table of Contents: “…When real time makes the difference; 4.4. What should data analytics address?…”
Full text (MFA users only)
Electronic eBook -
278
Automated database applications testing : specification representation for automated reasoning
Published 2010Table of Contents: “…Software testing definitions. 1.4. When should testing start in the software lifecycle? …”
Full text (MFA users only)
Electronic eBook -
279
Online engineering
Published 2009Table of Contents: “…THE COVARIANCE INTERSECTION ALGORITHM; 6. LARGEST ELLIPSOID ALGORITHM; 6.1. The Intersection Problem; 6.2. …”
Full text (MFA users only)
Electronic eBook -
280
Medical data privacy handbook
Published 2015Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
Full text (MFA users only)
Electronic eBook