Search Results - (((((((ant OR win) OR mwantis) OR wind) OR cantor) OR anne) OR share) OR hints) algorithms.

Search alternatives:

  1. 221

    Methods and Interdisciplinarity

    Published 2020
    Table of Contents: “…Towards a win-win collaboration; 2.3.3. Geography in all digital objects; 2.4. …”
    Full text (MFA users only)
    Electronic eBook
  2. 222

    Goliath's revenge : how established companies turn the tables on digital disruptors by Hewlin, Todd, Snyder, Scott A. (Scott Andrew), 1965-

    Published 2019
    Table of Contents: “…Chapter 6 Rule 3: Use Your Data as CurrencySome Historical Context; Entertainment Goes Left Brain; Moneyball Wins Games; Build Your Data Balance Sheet; Think Broadly about Your Data Assets; Understand Your Data Liabilities; Rate the Quality of Each Data Asset; Pay Special Attention to the Edge; Value Data Optionality; Maximize Return on Data; Digital Customer Segments; Master Machine Learning; The Weather Channel; Rule 3: Company and Career Readiness; Company Readiness Self-Assessment; Career Readiness Self-Assessment; Rule 3 Readiness Summary; Note…”
    Full text (MFA users only)
    Electronic eBook
  3. 223

    Cognitive Electronic Warfare : An Artificial Intelligence Approach. by Haigh, Karen

    Published 2021
    Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
    Full text (MFA users only)
    Electronic eBook
  4. 224

    Pulmonary arterial hypertension : diagnosis and evidence-based treatment

    Published 2008
    Table of Contents: “…Combination therapy in pulmonary arterial hypertension / Anne Keogh and Marius Hoeper -- Interventional and surgical modalities of treatment for pulmonary arterial hypertension / Julio Sandoval and Ramona Doyle -- End points and clinical trial design in pulmonary arterial hypertension : clinical and regulatory perspectives / Andrew J. …”
    Full text (MFA users only)
    Electronic eBook
  5. 225

    Code : Collaborative Ownership and the Digital Economy. by Ghosh, Rishab Aiyer

    Table of Contents: “…Oral Traditions, Indigenous Rights, and Valuable Old Knowledge -- 7 From Keeping "Nature's Secrets" to the Institutionalization of "Open Science" -- 8 Benefit Sharing: Experiments in Governance -- 9 Trust among the Algorithms: Ownership, Identity, and the Collaborative Stewardship of Information -- 10 Cooking-Pot Markets and Balanced Value Flows -- 11 Coase's Penguin, or, Linux and the Nature of the Firm -- 12 Paying for Public Goods -- 13 Fencing Off Ideas: Enclosure and the Disappearance of the Public Domain -- 14 A Renaissance of the Commons: How the New Sciences and Internet are Framing a New Global Identity and Order -- 15 Positive Intellectual Rights and Information Exchanges -- 16 Copyright and Globalization in the Age of Computer Networks -- Contributors -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  6. 226
  7. 227

    Mechanisms and games for dynamic spectrum allocation

    Published 2013
    Table of Contents: “…7.3.10 Other equilibrium concepts -- 7.4 Learning equilibria -- 7.4.1 Learning Nash equilibria -- 7.4.2 Learning epsilon-equilibrium -- 7.4.3 Learning coarse correlated equilibrium -- 7.4.4 Learning satisfaction equilibrium -- 7.4.5 Discussion -- 7.5 Conclusion -- References -- II Cognitive radio and sharing of unlicensed spectrum -- 8 Cooperation in cognitiveradio networks: from accessto monitoring -- 8.1 Introduction -- 8.1.1 Cooperation in cognitive radio: mutual benefits and costs -- 8.2 An overview of coalitional game theory -- 8.3 Cooperative spectrum exploration and exploitation -- 8.3.1 Motivation -- 8.3.2 Basic problem -- 8.3.3 Joint sensing and access as a cooperative game -- 8.3.4 Coalition formation algorithm for joint sensing and access -- 8.3.5 Numerical results -- 8.4 Cooperative primary user activity monitoring -- 8.4.1 Motivation -- 8.4.2 Primary user activity monitoring: basic model -- 8.4.3 Cooperative primary user monitoring -- 8.4.4 Numerical results -- 8.5 Summary -- Acknowledgements -- Copyright notice -- References -- 9 Cooperative cognitive radios with diffusion networks -- 9.1 Introduction -- 9.2 Preliminaries -- 9.2.1 Basic tools in convex and matrix analysis -- 9.2.2 Graphs -- 9.3 Distributed spectrum sensing -- 9.4 Iterative consensus-based approaches -- 9.4.1 Average consensus algorithms -- 9.4.2 Acceleration techniques for iterative consensus algorithms -- 9.4.3 Empirical evaluation -- 9.5 Consensus techniques based on CoMAC -- 9.6 Adaptive distributed spectrum sensing based on adaptive subgradient techniques -- 9.6.1 Distributed detection with adaptive filters -- 9.6.2 Set-theoretic adaptive filters for distributed detection -- 9.6.3 Empirical evaluation -- 9.7 Channel probing -- 9.7.1 Introduction -- 9.7.2 Admissibility problem -- 9.7.3 Power and admission control algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  8. 228

    There's Something about Gödel : The Complete Guide to the Incompleteness Theorem. by Berto, Francesco

    Published 2009
    Table of Contents: “…. -- 6 ... and the unsatisfied logicists, Frege and Russell -- 7 Bits of set theory -- 8 The Abstraction Principle -- 9 Bytes of set theory -- 10 Properties, relations, functions, that is, sets again -- 11 Calculating, computing, enumerating, that is, the notion of algorithm…”
    Full text (MFA users only)
    eBook
  9. 229

    Randomness through computation : some answers, more questions

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  10. 230

    Chance : the life of games and the game of life by Sá, J. P. Marques de, 1946-

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  11. 231
  12. 232

    R High Performance Programming. by Lim, Aloysius

    Published 2015
    Table of Contents: “…Data parallelism versus task parallelismImplementing data parallel algorithms; Implementing task parallel algorithms; Running the same task on workers in a cluster; Running different tasks on workers in a cluster; Executing tasks in parallel on a cluster of computers; Shared memory versus distributed memory parallelism; Optimizing parallel performance; Summary; Chapter 9: Offloading Data Processing to Database Systems; Extracting data into R versus processing data in a database; Preprocessing data in a relational database using SQL; Converting R expressions into SQL; Using dplyr…”
    Full text (MFA users only)
    Electronic eBook
  13. 233

    Mathematics and Multi-Ethnic Students : Exemplary Practices. by Germain- Mc Carthy, Yvelyne

    Published 2013
    Table of Contents: “…LYNNE GODFREY: AFRICAN AMERICANS AND THE ALGEBRA PROJECT; Engaging Students; Warm-Up; Group Work; The Winding Game; Discussion between Colleagues; Commentary; Unit Overview: The Chinese Zodiac and the Division Algorithm; 5. …”
    Full text (MFA users only)
    Electronic eBook
  14. 234

    Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow. by Ravichandiran, Sudharsan

    Published 2018
    Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
    Full text (MFA users only)
    Electronic eBook
  15. 235

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
    Full text (MFA users only)
    Electronic eBook
  16. 236

    Smart buildings, smart communities and demand response

    Published 2021
    Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
    Full text (MFA users only)
    Electronic eBook
  17. 237

    Short-Circuit Withstand Capability of Power Transformers. by Geißler, Daniel Hermann

    Published 2016
    Table of Contents: “…4.5.3 FEA Model Validation4.5.4 FEA Model for Bonded CTCs; 5 Dynamic Short-Circuit Forces Test Stand; 5.1 Design and Principal Functionality; 5.2 Deformation Measurement Systems; 5.2.1 Acceleration Sensors; 5.2.1.1 Immunity to Magnetic Fields; 5.2.1.2 Mounting to the Windings; 5.2.1.3 Signal Processing; 5.2.2 High-Speed Camera-Based Deformation Tracking; 5.2.2.1 Principal Functionality; 5.2.2.2 Marker Mounting and Image Calibration; 5.2.2.3 Displacement Calculation Algorithm; 5.2.3 Comparison of Both Systems; 5.3 Measurement Data Evaluation; 5.4 Experimental Results.…”
    Full text (MFA users only)
    Electronic eBook
  18. 238

    Social sensing : building reliable systems on unreliable data by Wang, Dong, Abdelzaher, Tarek, Kaplan, Lance

    Published 2015
    Table of Contents: “…Kaplan; Foreword; Preface; Chapter 1: A new information age; 1.1 Overview; 1.2 Challenges; 1.3 State of the Art; 1.3.1 Efforts on Discount Fusion; 1.3.2 Efforts on Trust and Reputation Systems; 1.3.3 Efforts on Fact-Finding; 1.4 Organization; Chapter 2: Social Sensing Trends and Applications; 2.1 Information Sharing: The Paradigm Shift; 2.2 An Application Taxonomy; 2.3 Early Research; 2.4 The Present Time.…”
    Full text (MFA users only)
    Electronic eBook
  19. 239

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…Acceptances, Behaviours and Infinite Activity in CSPP; HCSP: Imperative State and True Concurrency; Consolidating the Agreement Problem Protocol Verification Environment; On the Complexity of Buffer Allocation in Message Passing Systems; Java PastSet -- A Structured Distributed Shared Memory System; Synchronous Active Objects Introduce CSP's Primitives in Java; Configurable Collective Communication in LAM-MPI; Cache-Affinity Scheduling for Fine Grain Multithreading.…”
    Full text (MFA users only)
    Electronic eBook
  20. 240