Search Results - (((((((ant OR wanti) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 261

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
    Full text (MFA users only)
    Electronic eBook
  2. 262

    Hands-On Automated Machine Learning : a beginner's guide to building automated machine learning systems using AutoML and Python. by Das, Sibanjan

    Published 2018
    Table of Contents: “…; Why use AutoML and how does it help?; When do you automate ML?; What will you learn?; Core components of AutoML systems; Automated feature preprocessing; Automated algorithm selection; Hyperparameter optimization; Building prototype subsystems for each component; Putting it all together as an end-to-end AutoML system; Overview of AutoML libraries; Featuretools; Auto-sklearn; MLBox; TPOT; Summary.…”
    Full text (MFA users only)
    Electronic eBook
  3. 263
  4. 264

    Helping Children Learn Mathematics.

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  5. 265

    Bladder Cancer : diagnosis and clinical management

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  6. 266

    Social sensing : building reliable systems on unreliable data by Wang, Dong, Abdelzaher, Tarek, Kaplan, Lance

    Published 2015
    Table of Contents: “…Kaplan; Foreword; Preface; Chapter 1: A new information age; 1.1 Overview; 1.2 Challenges; 1.3 State of the Art; 1.3.1 Efforts on Discount Fusion; 1.3.2 Efforts on Trust and Reputation Systems; 1.3.3 Efforts on Fact-Finding; 1.4 Organization; Chapter 2: Social Sensing Trends and Applications; 2.1 Information Sharing: The Paradigm Shift; 2.2 An Application Taxonomy; 2.3 Early Research; 2.4 The Present Time.…”
    Full text (MFA users only)
    Electronic eBook
  7. 267
  8. 268
  9. 269

    Computing the homology of the lambda algebra by Tangora, Martin C.

    Published 1985
    Table of Contents: “…Corollaries to the structure formulas""; ""2.6. Tri-grading when p is odd""; ""2.7. The endomorphism Î?""; ""2.8. …”
    Full text (MFA users only)
    Electronic eBook
  10. 270

    Cystic Tumors of the Pancreas : Diagnosis and Treatment

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  11. 271
  12. 272

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…Acceptances, Behaviours and Infinite Activity in CSPP; HCSP: Imperative State and True Concurrency; Consolidating the Agreement Problem Protocol Verification Environment; On the Complexity of Buffer Allocation in Message Passing Systems; Java PastSet -- A Structured Distributed Shared Memory System; Synchronous Active Objects Introduce CSP's Primitives in Java; Configurable Collective Communication in LAM-MPI; Cache-Affinity Scheduling for Fine Grain Multithreading.…”
    Full text (MFA users only)
    Electronic eBook
  13. 273

    Symbolic computation and education

    Published 2007
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 274

    Solving transport problems : towards green logistics

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  15. 275
  16. 276

    Artificial intelligent techniques for electric and hybrid electric vehicles

    Published 2020
    Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
    Full text (MFA users only)
    Electronic eBook
  17. 277

    Data analytics and big data by Sedkaoui, Soraya

    Published 2018
    Table of Contents: “…When real time makes the difference; 4.4. What should data analytics address?…”
    Full text (MFA users only)
    Electronic eBook
  18. 278

    Automated database applications testing : specification representation for automated reasoning by Mikhail, Rana Farid

    Published 2010
    Table of Contents: “…Software testing definitions. 1.4. When should testing start in the software lifecycle? …”
    Full text (MFA users only)
    Electronic eBook
  19. 279

    Online engineering

    Published 2009
    Table of Contents: “…THE COVARIANCE INTERSECTION ALGORITHM; 6. LARGEST ELLIPSOID ALGORITHM; 6.1. The Intersection Problem; 6.2. …”
    Full text (MFA users only)
    Electronic eBook
  20. 280

    Medical data privacy handbook

    Published 2015
    Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
    Full text (MFA users only)
    Electronic eBook