Search Results - (((((((ant OR wanti) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 41
- Data processing 39
- Mathematics 31
- Mathematical models 27
- Machine learning 26
- artificial intelligence 26
- Algorithms 25
- algorithms 24
- Mathematical optimization 23
- Data mining 21
- Technological innovations 20
- Artificial Intelligence 17
- Computer algorithms 17
- Computer networks 17
- Information technology 16
- Big data 14
- Social aspects 14
- Management 13
- methods 13
- Development 12
- Research 12
- Data Mining 11
- Application software 10
- Design and construction 10
- Electronic data processing 10
- History 10
- Neural networks (Computer science) 10
- Diseases 9
- Philosophy 9
- Python (Computer program language) 9
Search alternatives:
- ant »
- wanti »
- mantis »
- cantor »
- share »
-
281
-
282
Infectious diseases in pediatric otolaryngology : a practical guide
Published 2016Full text (MFA users only)
Electronic eBook -
283
Progress reports on impedance spectroscopy : measurements, modeling, and application
Published 2017Full text (MFA users only)
Electronic eBook -
284
Automatic control in power generation, distribution, and protection : proceedings of the IFAC Symposium, Pretoria, Republic of South Africa, 15-19 September 1980
Published 1981Table of Contents: “…COMPUTER AIDED DESIGN OF CONTROL ALGORITHMS…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
285
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
286
Communicating mathematics : a conference in honor of Joseph A. Gallian's 65th birthday, July 16-19, 2007, University of Minnesota, Duluth, Minnesota
Published 2009Table of Contents: “…; ""McKay's canonical graph labeling algorithm""; ""A multiplicative deformation of the Möbius function for the poset of partitions of a multiset""…”
Full text (MFA users only)
Electronic eBook -
287
Cryptography : protocols, design, and applications
Published 2012Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
Full text (MFA users only)
Electronic eBook -
288
Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics
Published 2016Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
Full text (MFA users only)
Electronic eBook -
289
Computational models of argument : proceedings of COMMA 2014
Published 2014Table of Contents: “…Properties of Random VAFs and Implications for Efficient AlgorithmsResolution-Based Grounded Semantics Revisited -- Decomposing Abstract Dialectical Frameworks -- A Principled Approach to the Implementation of Argumentation Models -- Combining Paraconsistent Logic with Argumentation -- Probabilistic Argument Graphs for Argumentation Lotteries -- Enthymeme Construction in Dialogues Using Shared Knowledge -- Strategies in Dialogues: A Game-Theoretic Approach -- Argumentation Logic -- Splitting Abstract Dialectical Frameworks…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
290
Elements of algebraic coding systems
Published 2014Table of Contents: “…Constructing f-reducing polynomials -- 7.1 Introduction -- 7.2 Factoring polynomials over large finite fields -- 7.2.1 Resultant -- 7.2.2 Algorithm for factorization based on the resultant -- 7.2.3 The Zassenhaus algorithm -- 7.3 Finding roots of polynomials over finite fields -- 7.3.1 Finding roots when p is large -- 7.3.2 Finding roots when q = pm is large but p is small -- 7.4 Problems with solutions.…”
Full text (MFA users only)
Electronic eBook -
291
Convergence : the redesign of design
Published 2017Table of Contents: “…The Point Where All of the Intelligence Converges ENDNOTES; IMAGES; CHAPTER 4 PARAMETRICS AND COMPUTATION ; BIM Tools ; Challenges to the Convergence ; Computational Tools ; On the Evolution of a Parametric/Computational Convergence ; Simulation and Automation ; The Algorithm of Everything ; Algorithms and Machine Learning ; ENDNOTES; IMAGES; CHAPTER 5 VIRTUAL AND PHYSICAL ; Advances in Virtual Reality ; VR and Reality Capture ; Reality Computing ; Uses for VR in Architecture ; VR and AR in Architecture, Engineering, and Construction ; Leveraging Video Games in AEC.…”
Full text (MFA users only)
Electronic eBook -
292
Mechatronic Systems, Mechanics and Materials II : Selected, peer reviewed papers from the Symposium on Mechatronics Systems, Mechanics and Materials 2013, October 9-10, 2013, Jastr...
Published 2013Table of Contents: “…Optimization-Supported Decision-Making in the Marine Game Environment Prediction of the Spatial Orientation of a Ship by Means of Neural Networks; Safe Ship Control Method with the Use of Ant Colony Optimization; Selected Problems of the Asynchronous Drive Control with the Three-Phase Soft-Start System; System Architecture of Mission Planning and Autonomous Surface Vessel Control; The Characteristics of the Matrix Game Sensitivity of the Safe Passing of Ships at Sea; The Comparison of Parameter Identification Methods for Fractional, Partial Differential Equation; III. …”
Full text (MFA users only)
Electronic eBook -
293
Approximate dynamic programming : solving the curses of dimensionality
Published 2011Full text (MFA users only)
Electronic eBook -
294
Mount Sinai expert guides. Gastroenterology
Published 2014Full text (MFA users only)
Electronic eBook -
295
Code halos : how the digital lives of people, things, and organizations are changing the rules of business
Published 2014Table of Contents: “…The "Skinterface" Will Change the Consumer ExperienceIndustrial Amplifiers: Harnessing the Power of the Internet of Things; Smart Appliances Become Amplifiers in the Home; The Application Interface: Window to a Beautiful Experience; The Algorithm: Data Becomes Meaning; Facebook's EdgeRank Algorithm Makes It Personal; Successful Algorithms Power Code Connections and Create Insight; All Data, Great and Small; Netflix Lassos Data to Win in the Market; New Business Models Showcase Code Halo Value; Why Didn't They Tune in the Zune?…”
Full text (MFA users only)
Electronic eBook -
296
Frames and Harmonic Analysis.
Published 2018Table of Contents: “…Examples; References; The Kaczmarz algorithm, row action methods, and statistical learning algorithms; 1. …”
Full text (MFA users only)
Electronic eBook -
297
Systemic Risk from Global Financial Derivatives.
Published 2012Table of Contents: “…FDIC FIs as Participants in the Five Financial Derivatives Markets; Tables; 1. Value and Market Share of Financial Derivatives for 202 FIs; B. Market Data Based Systemic Risk Measures and Financial Network Perspective; III. …”
Full text (MFA users only)
Electronic eBook -
298
Challenges and opportunities of HealthGrids : proceedings of Healthgrid 2006
Published 2006Table of Contents: “…Advancing of Russian ChemBioGrid by Bringing Data Management Tools into Collaborative EnvironmentGPS@ Bioinformatics Portal: From Network to EGEE Grid; Blast2GO Goes Grid: Developing a Grid-Enabled Prototype for Functional Genomics Analysis; Bioprofiling over Grid for eHealthcare; SARS Grid-An AG-Based Disease Management and Collaborative Platform; Knowledge Discovery on HealthGrids; A Secure Semantic Interoperability Infrastructure for Inter-Enterprise Sharing of Electronic Healthcare Records.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
299
Language and logos : studies in theoretical and computational linguistics
Published 2010Table of Contents: “…CONTENTS -- Preface -- Part I Syntax -- A Spurious Genitive Puzzle in Polish -- Semantic Type Effects on Crossing Movement in German -- Me and Chomsky -- On the Typology of Verb Second -- Movement from Verb-Second Clauses Revisited -- Spurious Ambiguities and the Parentheticals Debate -- Part II Semantics -- On Squeamishness of the Royal Kind -- Information Structure of schon -- When- Clauses, Factive Verbs and Correlates -- The Proof Theory of Partial Variables -- Brentano's Apple -- How to Interpret Expletive Negation under bevor in German…”
Full text (MFA users only)
Electronic eBook -
300
Human Behavior Analysis for Library and Information Science.
Published 2017Table of Contents: “…Covers; Editorial advisory board; Guest editorial; Developing a context-aware annotation system for Hakka culture-specific language learning; Is there any efficient reading strategy when using text signals for navigation in a long document?…”
Full text (MFA users only)
Electronic eBook