Search Results - (((((((ant OR wantsa) OR semantic) OR find) OR cantor) OR anne) OR plans) OR hints) algorithms.

  1. 81

    Naming and reference : the link of word to object by Nelson, R. J. (Raymond John), 1917-

    Published 1992
    Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
    Full text (MFA users only)
    Electronic eBook
  2. 82

    Automating open source intelligence : algorithms for OSINT

    Published 2016
    Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
    Full text (MFA users only)
    Electronic eBook
  3. 83
  4. 84
  5. 85

    Handbook of Satisfiability : Handbook of Satisfiability. by Biere, A.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  6. 86

    Empathic space : the computation of human-centric architecture

    Published 2014
    Table of Contents: “…Exhaustive Enumeration of Small Rectangular PlansEnumeration of Built Forms: An 'Archetypal Building'; An 'Architectural Morphospace'; The Deep Structure of the Picturesque; Form as Process; The Failure of the Top-Down Approach; Thinking Algorithmically; Crafting Space: Generative Processes of Architectural Configurations; Space Block Hanoi, 36 Old Streets district, Hanoi, Vietnam; Solutions You Cannot Draw; Bottom-Up Urban Design; Evolutionary Building Design; Reverse Engineering from the Shadow; Recent Projects with Adaptive Architecture; INTERACTIONS IN THE FIELD.…”
    Full text (MFA users only)
    Electronic eBook
  7. 87
  8. 88
  9. 89

    Handbook for pandemic and mass-casualty planning and response

    Published 2012
    Table of Contents: “…Section 2: Principles of Response to Catastrophes with Mass CasualtiesBasics of Terror Medicine; Mass-Casualty Planning and Response; Interoperability within Military Medical Forces in Contemporary NATO Operations; The Complete Protection of a Combat Soldier; Experience from Past Conflicts; Triage Protocols for Critical-Care Patients in Disaster Conditions; Development of Standards of Care for Polytrauma in Multiple-Casualty Incidents; Treatment Algorithms and Hospital Triage in Mass-Casualty Incidents; Guidelines for Limb Amputation and Reconstruction in Mass-Casualty Incidents…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 90

    Turing's vision : the birth of computer science by Bernhardt, Chris

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  11. 91

    Adventures in Raspberry Pi by Philbin, Carrie Anne

    Published 2017
    Table of Contents: “…Programming the Sensors to Find Out the Current Temperature -- Creating Pixel Art -- Creating a Sense HAT Desk Thermometer -- Further Adventures with Cameras and HATs -- Chapter 10 The Big Adventure: Building a Raspberry Pi Jukebox -- An Overview of the Jukebox Project -- What You Will Need -- Part One: Creating the LCD Screen -- Preparing the LCD Screen by Adding Headers -- Mounting the LCD Screen and Wiring Up the Breadboard -- Adding Scripts to Drive the LCD Screen -- Part Two: Downloading and Playing MP3s -- Installing a Media Player and Getting Music Files -- Writing a Jukebox Python Program -- Part Three: Controlling the Jukebox with Buttons -- Connecting the Buttons -- Adapting Your Jukebox Program to Include GPIO Buttons -- Part Four: Displaying Jukebox Information on the LCD Screen -- Finishing Up -- Appendix Where to Go from Here -- Websites -- Clubs -- Inspiring Projects and Tutorials -- Videos -- Books and Magazines -- Glossary -- Index -- EULA.…”
    Full text (MFA users only)
    Electronic eBook
  12. 92

    The mathematica guidebook for numerics by Trott, Michael, Ph. D.

    Published 2006
    Full text (MFA users only)
    Electronic eBook
  13. 93
  14. 94
  15. 95
  16. 96

    Language production and interpretation : linguistics meets cognition by Zeevat, Henk, 1952-

    Published 2014
    Table of Contents: “…Provisional English; 2.3. The Production Algorithm; 2.3.1. Procedural Interpretation of the Constraints; 2.4. …”
    Full text (MFA users only)
    Electronic eBook
  17. 97
  18. 98

    Learning predictive analytics with python : gain practical insights into predictive modelling by implementing Predictive Analytics algorithms on public datasets with Python by Kumar, Ashish

    Published 2016
    Table of Contents: “…Cover ; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Predictive Modelling ; Introducing predictive modelling; Scope of predictive modelling; Ensemble of statistical algorithms; Statistical tools; Historical data; Mathematical function; Business context; Knowledge matrix for predictive modelling; Task matrix for predictive modelling; Applications and examples of predictive modelling; LinkedIn's ""People also viewed"" feature; What it does?…”
    Full text (MFA users only)
    Electronic eBook
  19. 99
  20. 100

    CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260). by Singh, Glen D.

    Published 2018
    Table of Contents: “…Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA).…”
    Full text (MFA users only)
    Electronic eBook