Search Results - (((((((ant OR wanti) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 281

    Neural nets and chaotic carriers by Whittle, Peter, 1927-

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  2. 282
  3. 283
  4. 284

    Automatic control in power generation, distribution, and protection : proceedings of the IFAC Symposium, Pretoria, Republic of South Africa, 15-19 September 1980

    Published 1981
    Table of Contents: “…COMPUTER AIDED DESIGN OF CONTROL ALGORITHMS…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  5. 285

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  6. 286

    Communicating mathematics : a conference in honor of Joseph A. Gallian's 65th birthday, July 16-19, 2007, University of Minnesota, Duluth, Minnesota

    Published 2009
    Table of Contents: “…; ""McKay's canonical graph labeling algorithm""; ""A multiplicative deformation of the Möbius function for the poset of partitions of a multiset""…”
    Full text (MFA users only)
    Electronic eBook
  7. 287

    Cryptography : protocols, design, and applications

    Published 2012
    Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
    Full text (MFA users only)
    Electronic eBook
  8. 288

    Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics by Ahmadian, Amir Sharif

    Published 2016
    Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
    Full text (MFA users only)
    Electronic eBook
  9. 289

    Computational models of argument : proceedings of COMMA 2014

    Published 2014
    Table of Contents: “…Properties of Random VAFs and Implications for Efficient AlgorithmsResolution-Based Grounded Semantics Revisited -- Decomposing Abstract Dialectical Frameworks -- A Principled Approach to the Implementation of Argumentation Models -- Combining Paraconsistent Logic with Argumentation -- Probabilistic Argument Graphs for Argumentation Lotteries -- Enthymeme Construction in Dialogues Using Shared Knowledge -- Strategies in Dialogues: A Game-Theoretic Approach -- Argumentation Logic -- Splitting Abstract Dialectical Frameworks…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 290

    Elements of algebraic coding systems by Rocha, Valdemar C. da, 1947-

    Published 2014
    Table of Contents: “…Constructing f-reducing polynomials -- 7.1 Introduction -- 7.2 Factoring polynomials over large finite fields -- 7.2.1 Resultant -- 7.2.2 Algorithm for factorization based on the resultant -- 7.2.3 The Zassenhaus algorithm -- 7.3 Finding roots of polynomials over finite fields -- 7.3.1 Finding roots when p is large -- 7.3.2 Finding roots when q = pm is large but p is small -- 7.4 Problems with solutions.…”
    Full text (MFA users only)
    Electronic eBook
  11. 291

    Convergence : the redesign of design by Deutsch, Randy

    Published 2017
    Table of Contents: “…The Point Where All of the Intelligence Converges ENDNOTES; IMAGES; CHAPTER 4 PARAMETRICS AND COMPUTATION ; BIM Tools ; Challenges to the Convergence ; Computational Tools ; On the Evolution of a Parametric/Computational Convergence ; Simulation and Automation ; The Algorithm of Everything ; Algorithms and Machine Learning ; ENDNOTES; IMAGES; CHAPTER 5 VIRTUAL AND PHYSICAL ; Advances in Virtual Reality ; VR and Reality Capture ; Reality Computing ; Uses for VR in Architecture ; VR and AR in Architecture, Engineering, and Construction ; Leveraging Video Games in AEC.…”
    Full text (MFA users only)
    Electronic eBook
  12. 292

    Mechatronic Systems, Mechanics and Materials II : Selected, peer reviewed papers from the Symposium on Mechatronics Systems, Mechanics and Materials 2013, October 9-10, 2013, Jastr...

    Published 2013
    Table of Contents: “…Optimization-Supported Decision-Making in the Marine Game Environment Prediction of the Spatial Orientation of a Ship by Means of Neural Networks; Safe Ship Control Method with the Use of Ant Colony Optimization; Selected Problems of the Asynchronous Drive Control with the Three-Phase Soft-Start System; System Architecture of Mission Planning and Autonomous Surface Vessel Control; The Characteristics of the Matrix Game Sensitivity of the Safe Passing of Ships at Sea; The Comparison of Parameter Identification Methods for Fractional, Partial Differential Equation; III. …”
    Full text (MFA users only)
    Electronic eBook
  13. 293
  14. 294

    Mount Sinai expert guides. Gastroenterology

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  15. 295

    Code halos : how the digital lives of people, things, and organizations are changing the rules of business by Frank, Malcolm

    Published 2014
    Table of Contents: “…The "Skinterface" Will Change the Consumer ExperienceIndustrial Amplifiers: Harnessing the Power of the Internet of Things; Smart Appliances Become Amplifiers in the Home; The Application Interface: Window to a Beautiful Experience; The Algorithm: Data Becomes Meaning; Facebook's EdgeRank Algorithm Makes It Personal; Successful Algorithms Power Code Connections and Create Insight; All Data, Great and Small; Netflix Lassos Data to Win in the Market; New Business Models Showcase Code Halo Value; Why Didn't They Tune in the Zune?…”
    Full text (MFA users only)
    Electronic eBook
  16. 296

    Frames and Harmonic Analysis. by Kim, Yeonhyang

    Published 2018
    Table of Contents: “…Examples; References; The Kaczmarz algorithm, row action methods, and statistical learning algorithms; 1. …”
    Full text (MFA users only)
    Electronic eBook
  17. 297

    Systemic Risk from Global Financial Derivatives. by Markose, Sheri M.

    Published 2012
    Table of Contents: “…FDIC FIs as Participants in the Five Financial Derivatives Markets; Tables; 1. Value and Market Share of Financial Derivatives for 202 FIs; B. Market Data Based Systemic Risk Measures and Financial Network Perspective; III. …”
    Full text (MFA users only)
    Electronic eBook
  18. 298

    Challenges and opportunities of HealthGrids : proceedings of Healthgrid 2006

    Published 2006
    Table of Contents: “…Advancing of Russian ChemBioGrid by Bringing Data Management Tools into Collaborative EnvironmentGPS@ Bioinformatics Portal: From Network to EGEE Grid; Blast2GO Goes Grid: Developing a Grid-Enabled Prototype for Functional Genomics Analysis; Bioprofiling over Grid for eHealthcare; SARS Grid-An AG-Based Disease Management and Collaborative Platform; Knowledge Discovery on HealthGrids; A Secure Semantic Interoperability Infrastructure for Inter-Enterprise Sharing of Electronic Healthcare Records.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 299

    Language and logos : studies in theoretical and computational linguistics

    Published 2010
    Table of Contents: “…CONTENTS -- Preface -- Part I Syntax -- A Spurious Genitive Puzzle in Polish -- Semantic Type Effects on Crossing Movement in German -- Me and Chomsky -- On the Typology of Verb Second -- Movement from Verb-Second Clauses Revisited -- Spurious Ambiguities and the Parentheticals Debate -- Part II Semantics -- On Squeamishness of the Royal Kind -- Information Structure of schon -- When- Clauses, Factive Verbs and Correlates -- The Proof Theory of Partial Variables -- Brentano's Apple -- How to Interpret Expletive Negation under bevor in German…”
    Full text (MFA users only)
    Electronic eBook
  20. 300

    Human Behavior Analysis for Library and Information Science. by Greifender, Elke

    Published 2017
    Table of Contents: “…Covers; Editorial advisory board; Guest editorial; Developing a context-aware annotation system for Hakka culture-specific language learning; Is there any efficient reading strategy when using text signals for navigation in a long document?…”
    Full text (MFA users only)
    Electronic eBook