Search Results - (((((((ant OR wind) OR mantis) OR wien) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 27
- Data processing 24
- Mathematics 24
- Mathematical models 20
- Mathematical optimization 19
- Algorithms 17
- algorithms 17
- Technological innovations 15
- Machine learning 14
- artificial intelligence 14
- Data mining 13
- Information technology 13
- Management 12
- Computer algorithms 11
- Big data 10
- Computer networks 10
- Design and construction 9
- Artificial Intelligence 8
- Mechatronics 8
- Neural networks (Computer science) 8
- Automatic control 7
- Bioinformatics 7
- Computer programming 7
- Electric power systems 7
- Manufacturing processes 7
- Research 7
- Social aspects 7
- Wireless communication systems 7
- Computer science 6
- Data Mining 6
Search alternatives:
- ant »
- mantis »
- cantor »
- wind »
- wien »
- share »
-
361
Exploratory data analysis with MATLAB
Published 2017Table of Contents: “…3.4 Stochastic Neighbor Embedding3.5 Summary and Further Reading; Exercises; Chapter 4 Data Tours; 4.1 Grand Tour; 4.1.1 Torus Winding Method; 4.1.2 Pseudo Grand Tour; 4.2 Interpolation Tours; 4.3 Projection Pursuit; 4.4 Projection Pursuit Indexes; 4.4.1 Posse Chi-Square Index; 4.4.2 Moment Index; 4.5 Independent Component Analysis; 4.6 Summary and Further Reading; Exercises; Chapter 5 Finding Clusters; 5.1 Introduction; 5.2 Hierarchical Methods; 5.3 Optimization Methods- k-Means; 5.4 Spectral Clustering; 5.5 Document Clustering; 5.5.1 Nonnegative Matrix Factorization -- Revisited.…”
Full text (MFA users only)
Electronic eBook -
362
Digital journalism, drones, and automation : the language and abstractions behind the news
Published 2020Full text (MFA users only)
Electronic eBook -
363
Credit securitizations and derivatives : challenges for the global markets
Published 2013Table of Contents: “…Market Credit Risk Pricing -- Regulation -- Developments in Structured Finance Markets -- Impairments of Asset-Backed Securities and Outstanding Ratings -- Issuance of Asset-backed Securities and Outstanding Volume -- Global CDO Issuance and Outstanding Volume -- PART II CREDIT PORTFOLIO RISK MEASUREMENT -- Mortgage Credit Risk -- Five C's of Credit and Mortgage Credit Risk -- Determinants of Mortgage Default, Loss Given Default and Exposure at Default -- Determinants of Mortgage Default -- Determinants of Mortgage LGD -- Determinants of Mortgage EAD -- Modeling Methods for Default, LGD and EAD -- Model Risk Management -- Credit Portfolio Correlations and Uncertainty -- Introduction -- Gaussian and Semi-Gaussian Single Risk Factor Model -- Individual and Simultaneous Confidence Bounds and Intervals -- Confidence Intervals for Asset Correlations -- Confidence Intervals for Default and Survival Time Correlations -- Confidence Intervals for Default Correlations -- Confidence Intervals for Survival Time Correlations -- Credit Portfolio Correlations with Dynamic Leverage Ratios -- The Hui et al. (2007) Model -- The Method of Images for Constant Coefficients -- The Method of Images for Time-Varying Coefficients -- Modelling Default Correlations in a Two-Firm Model -- Default Correlations -- A Two-Firm Model with Dynamic Leverage Ratios -- Method of Images for Constant Coefficients -- Method of Images for Time-Varying Coefficients -- Alternative Methodologies for General Values -- Numerical Results -- Accuracy -- The Impact of Correlation between Two Firms -- The Impact of Different Credit Quality Paired Firms -- The Impact of Volatilities -- The Impact of Drift Levels -- The Impact of Initial Value of Leverage Ratio Levels -- Impact of Correlation between Firms and Interest Rates -- The Price of Credit-Linked Notes -- A Hierarchical Model of Tail-Dependent Asset Returns -- The Variance Compound Gamma Model -- Multivariate Process for Logarithmic Asset Returns -- Dependence Structure -- Sampling -- Copula Properties -- An Application Example -- Portfolio Setup -- Test Portfolios -- Parameter Setup -- Simulation Results -- Importance Sampling Algorithm -- Conclusions -- Appendix A: The VCG Probability Distribution Function Appendix B: HAC Representation for the VCG Framework -- Monte Carlo Methods for Portfolio Credit Risk -- Modeling Credit Portfolio Losses -- Risk Measures -- Modeling Dependency -- Estimating Risk Measures via Monte Carlo -- Crude Monte Carlo Estimators -- Importance Sampling -- Specific Models -- The Bernoulli Mixture Model -- Factor Models -- Copula Models -- Intensity Models -- An Example Point Process Model -- Appendix A: A Primer on Rare-event Simulation -- Efficiency -- Importance Sampling -- The Choice of g -- Adaptive Importance Sampling -- Importance Sampling for Stochastic Processes -- Credit Portfolio Risk and Diversification -- Introduction -- Model Setup -- Independent Asset Values -- Correlated Asset Values -- Large Portfolio Limit -- Correlated Diffusion -- Correlated GARCH Process -- Applications of the Structural Recovery Rate -- Conclusions -- PART III CREDIT PORTFOLIO RISK SECURITIZATION AND TRANCHING -- Differences in Tranching Methods: Some Results and Implications -- Defining a Tranche -- The Mathematics of Tranching -- PD-based Tranching -- EL-based Tranching -- The EL of a Tranche Necessarily Increases When Either the Attachment Point or the Detachment Point is Decreased -- Upper Bound on Tranche Expected LGD (LGDt) Assumption Given EL-based Tranches -- Skipping of Some Tranches in the EL-based Approach -- Global Structured Finance Rating -- Asset-Backed Securities -- The ABS Structure for the Experiment -- Cash Flow Modeling -- Modeling and Simulating Defaults -- Expected Loss Rating -- Global Sensitivity Analysis -- Elementary Effects -- Variance-based Method -- Global Sensitivity Analysis Results -- Uncertainty Analysis -- Sensitivity Analysis -- Global Rating -- PART IV CREDIT DERIVATIVES -- Analytic Dynamic Factor Copula Model -- Pricing Equations -- One-factor Copula Model -- Multi-period Factor Copula Models -- Calibration -- Dynamic Modeling of Credit Derivatives -- General Model Choice -- Modeling Option Prices -- Modeling Credit Risk -- Portfolio Credit Derivatives -- Modeling Asset Dynamics -- The Market Model -- The Asset-value Model -- Empirical Analysis -- Elementary Data -- Implied Dividends -- Market Dynamics -- Asset Value Model -- Tranche Pricing -- Out-of-time Application -- Pricing and Calibration in Market Models -- Basic notions -- The model -- Modeling Assumptions -- Absence of Arbitrage -- An affine specification -- Pricing -- Calibration -- Calibration Procedure -- Calibration Results -- Appendix A: Computations -- Counterparty Credit Risk and Clearing of Derivatives -- From the Perspective of an Industrial Corporate with a Focus on Commodity Markets -- Credit exposures in commodity business -- Settlement Exposure -- Performance Exposure -- Example of Fixed Price Deal with Performance Exposure -- Example of a Floating Price Deal with Performance Exposure -- General Remarks on Credit Exposure Concepts -- Ex Ante exposure-reducing techniques -- Payment Terms -- Material Adverse Change Clauses -- Master Agreements -- Netting -- Margining -- Close Out Exposure and Threshold -- Ex Ante risk-reducing techniques -- Credit Enhancements in General -- Parent Company Guarantees -- Letters of Credit -- Credit Insurance -- Clearing via a Central Counterparty -- Ex Post risk-reducing techniques -- Factoring -- Novation -- Risk-reducing Trades -- Hedging with CDS -- Hedging with Contingent-CDS -- Hedging with Puts on Equity -- Ex Post work out considerations -- Practical credit risk management and pricing Peculiarities of commodity markets -- Peculiarities of commodity related credit portfolios -- Credit Risk Capital for a commodity related portfolio measured with an extension of CreditMetrics -- CreditRisk+ study: applied to a commodity related credit portfolio -- CDS Industrial Sector Indices, Credit and Liquidity Risk -- The Data -- Methodology and Results -- Preliminary Analysis -- Common Factor Analysis -- Stability of Relations -- Risk Transfer and Pricing of Illiquid Assets with Loan CDS -- Shipping Market -- Loan Credit Default Swaps -- LCDS Pricing -- Modeling LCDS Under the Intensity-based Model -- Valuation Framework for LCDS -- The Structural Approach -- Credit Risk in Shipping Loans -- Valuation of LCDS on Shipping Loans -- Simulation Model -- Numerical Results -- Appendix A: Monte Carlo Parameterization PART V REGULATION -- Regulatory Capital Requirements for Securitizations -- Regulatory Approaches for Securitizations -- Ratings Based Approach (RBA) -- Supervisory Formula Approach (SFA) -- Standardized Approach (SA) -- Post-crisis Revisions to the Basel Framework -- Regulating OTC Derivatives -- The Wall Street Transparency and Accountability Part of the Dodd-Frank Act of 2010 -- Which Derivatives Will Be Affected? …”
Full text (MFA users only)
Electronic eBook -
364
Advanced security solutions for multimedia
Published 2021Full text (MFA users only)
Electronic eBook -
365
Security, Privacy and Reliability in Computer Communications and Networks.
Published 2016Table of Contents: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN INNOVATION AND CHANGE IN EDUCATION -- CROSS-CULTURAL PERSPECTIVE -- Title Page -- Security, Privacy and Reliability in Computer Communications and Networks -- Copyright Page -- Contents -- Preface -- Acknowledgments -- List of Contributors -- List of Figures -- List of Tables -- List of Algorithms -- List of Abbreviations -- PART I -- Privacy -- Chapter 1 -- Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Ad Hoc Networks -- Abstract -- 1.1 Introduction -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures -- 1.2.1 Anonymity Definition and Assessment -- 1.2.2 Antitraffic Analysis Measures -- 1.3 System Assumptions and Attack Model -- 1.3.1 Network Model -- 1.3.2 Adversary Model -- 1.3.3 Evidence Theory and Belief Metric -- 1.4 Distributed Beamforming to Increase the BS Anonymity -- 1.4.1 Overview of the DiBAN Protocol -- 1.4.2 DiBAN Illustrative Example -- 1.4.3 DiBAN Energy Analysis -- 1.5 Distributed Beamforming Relay Selection Approach -- 1.6 Validation Experiments -- 1.6.1 Simulation Environment -- 1.6.2 Simulation Results -- 1.7 Conclusions and FutureWork -- Appendix I: Numerical Evidence Theory Belief Calculation Example -- References -- Chapter 2 -- A Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication -- Abstract -- 2.1 Introduction -- 2.2 Related Works -- 2.3 System Model and Preliminaries -- 2.3.1 Network Model -- 2.3.2 Attack Model -- 2.3.3 Security Requirements -- 2.4 The Proposed PETS Scheme -- 2.4.1 Scheme Overview -- 2.4.2 System Initiation -- 2.4.3 Vehicle-RSU Key Agreement -- 2.4.4 Traffic Information Collection and Aggregation -- 2.4.5 Traffic Jam Message Propagation -- 2.5 Security Analysis -- 2.6 Performance Evaluation -- 2.6.1 Traffic Information Sending/Collection Overhead.…”
Full text (MFA users only)
Electronic eBook -
366
Advanced wireless communications & Internet : future evolving technologies
Published 2011Table of Contents: “…Glisic -- 11.1 Introduction 585 -- 11.2 Background and Related Work 586 -- 11.3 Cooperative Communications 593 -- 11.4 Relay-Assisted Communications 616 -- 11.5 Two-Way Relay-Assisted Communications 646 -- 11.6 Relay-Assisted Communications With Reuse of Resources 651 -- Appendices 668 -- 12 Biologically Inspired Paradigms inWireless Networks 683 -- 12.1 Biologically Inspired Model for Securing Hybrid Mobile Ad Hoc Networks 683 -- 12.2 Biologically Inspired Routing in Ad Hoc Networks 687 -- 12.3 Analytical Modeling of AntNet as Adaptive Mobile Agent Based Routing 691 -- 12.4 Biologically Inspired Algorithm for Optimum Multicasting 697 -- 12.5 Biologically Inspired (BI) Distributed Topology Control 703 -- 12.6 Optimization of Mobile Agent Routing in Sensor Networks 708 -- 12.7 Epidemic Routing 710 -- 12.8 Nano-Networks 715 -- 12.9 Genetic Algorithm Based Dynamic Topology Reconfiguration in Cellular Multihop Wireless Networks 718 -- References 739 -- 13 Positioning in Wireless Networks 743 -- 13.1 Mobile Station Location in Cellular Networks 743.…”
Full text (MFA users only)
Electronic eBook -
367
SCADA Security : Machine Learning Concepts for Intrusion Detection and Prevention.
Published 2020Table of Contents: “…6.3.1 Learning of Most-Representative Data Sets -- 6.3.2 Decision-Making Model -- 6.4 EXPERIMENTAL SETUP -- 6.4.1 Choice of Parameters -- 6.4.2 The Candidate Classifiers -- 6.5 RESULTS AND DISCUSSION -- 6.5.1 Integrating GATUD into SDAD -- 6.5.2 Integrating GATUD into the Clustering-based Method -- 6.6 CONCLUSION -- CHAPTER 7 Threshold Password-Authenticated Secret Sharing Protocolss -- 7.1 MOTIVATION -- 7.2 EXISTING SOLUTIONS -- 7.3 DEFINITION OF SECURITY -- 7.4 TPASS PROTOCOLS -- 7.4.1 Protocol-Based on Two-Phase Commitment -- 7.4.2 Protocol Based on Zero-Knowledge Proof -- 7.4.3 Correctness…”
Full text (MFA users only)
Electronic eBook -
368
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book -
369
Networks-on-chip : from implementations to programming paradigms
Published 2014Table of Contents: “…3.2.1 DVC scheme3.2.2 Congestion avoidance scheme; 3.3 Multiple-port shared buffer with congestion awareness; 3.3.1 DVC scheme among multiple ports; 3.3.2 Congestion avoidance scheme; 3.4 DVC router microarchitecture; 3.4.1 VC control module; 3.4.2 Metric aggregation and congestion avoidance; 3.4.3 VC allocation module; 3.5 HiBB router microarchitecture; 3.5.1 VC control module; 3.5.2 VC allocation and output port allocation; 3.5.3 VC regulation; 3.6 Evaluation; 3.6.1 DVC router evaluation; 3.6.2 HiBB router evaluation; 3.7 Chapter summary; References.…”
Full text (MFA users only)
Electronic eBook -
370
-
371
Fog and fogonomics : challenges and practices of fog computing, communication, networking, strategy, and economics
Published 2020Table of Contents: “…3.3.1.2 Computation Task Models 68 -- 3.3.1.3 Quality of Experience 71 -- 3.3.2 Computation Offloading Game 71 -- 3.3.2.1 Game Formulation 71 -- 3.3.2.2 Algorithm Development 74 -- 3.3.2.3 Price of Anarchy 74 -- 3.3.2.4 Performance Evaluation 75 -- 3.4 Conclusion 80 -- References 80 -- 4 Pricing Tradeoffs for Data Analytics in Fog-Cloud Scenarios 83 /Yichen Ruan, Liang Zheng, Maria Gorlatova, Mung Chiang, and Carlee Joe-Wong -- 4.1 Introduction: Economics and Fog Computing 83 -- 4.1.1 Fog Application Pricing 85 -- 4.1.2 Incentivizing Fog Resources 86 -- 4.1.3 A Fogonomics Research Agenda 86 -- 4.2 Fog Pricing Today 87 -- 4.2.1 Pricing Network Resources 87 -- 4.2.2 Pricing Computing Resources 89 -- 4.2.3 Pricing and Architecture Trade-offs 89 -- 4.3 Typical Fog Architectures 90 -- 4.3.1 Fog Applications 90 -- 4.3.2 The Cloud-to-Things Continuum 90 -- 4.4 A Case Study: Distributed Data Processing 92 -- 4.4.1 A Temperature Sensor Testbed 92 -- 4.4.2 Latency, Cost, and Risk 95 -- 4.4.3 System Trade-off: Fog or Cloud 98 -- 4.5 Future Research Directions 101 -- 4.6 Conclusion 102 -- Acknowledgments 102 -- References 103 -- 5 Quantitative and Qualitative Economic Benefits of Fog 107 /Joe Weinman -- 5.1 Characteristics of Fog Computing Solutions 108 -- 5.2 Strategic Value 109 -- 5.2.1 Information Excellence 110 -- 5.2.2 Solution Leadership 110 -- 5.2.3 Collective Intimacy 110 -- 5.2.4 Accelerated Innovation 111 -- 5.3 Bandwidth, Latency, and Response Time 111 -- 5.3.1 Network Latency 113 -- 5.3.2 Server Latency 114 -- 5.3.3 Balancing Consolidation and Dispersion to Minimize Total Latency 114 -- 5.3.4 Data Traffic Volume 115 -- 5.3.5 Nodes and Interconnections 116 -- 5.4 Capacity, Utilization, Cost, and Resource Allocation 117 -- 5.4.1 Capacity Requirements 117 -- 5.4.2 Capacity Utilization 118 -- 5.4.3 Unit Cost of Delivered Resources 119 -- 5.4.4 Resource Allocation, Sharing, and Scheduling 120 -- 5.5 Information Value and Service Quality 120 -- 5.5.1 Precision and Accuracy 120.…”
Full text (MFA users only)
Electronic eBook -
372
Big data analytics : turning big data into big money
Published 2013Full text (MFA users only)
Electronic eBook -
373
Reconfigurable computing : the theory and practice of FPGA-based computation
Published 2008Full text (MFA users only)
Electronic eBook -
374
Nonlinear science and complexity
Published 2007Table of Contents: “…Bruzón -- Applying a new algorithm to derive nonclassical symmetries / M.S. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
375
-
376
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
377
-
378
Decision Intelligence for Dummies
Published 2022Table of Contents: “…Preventing Wrong Influences from Affecting Decisions -- Bad influences in AI and analytics -- The blame game -- Ugly politics and happy influencers -- Risk Factors in Decision Intelligence -- DI and Hyperautomation -- Part 5 The Part of Tens -- Chapter 17 Ten Steps to Setting Up a Smart Decision -- Check Your Data Source -- Track Your Data Lineage -- Know Your Tools -- Use Automated Visualizations -- Impact = Decision -- Do Reality Checks -- Limit Your Assumptions -- Think Like a Science Teacher -- Solve for Missing Data -- Partial versus incomplete data -- Clues and missing answers -- Take Two Perspectives and Call Me in the Morning -- Chapter 18 Bias In, Bias Out (and Other Pitfalls) -- A Pitfalls Overview -- Relying on Racist Algorithms -- Following a Flawed Model for Repeat Offenders -- Using A Sexist Hiring Algorithm -- Redlining Loans -- Leaning on Irrelevant Information -- Falling Victim to Framing Foibles -- Being Overconfident -- Lulled by Percentages -- Dismissing with Prejudice -- Index -- EULA.…”
Full text (MFA users only)
Electronic eBook -
379
XIVth International Congress on Mathematical Physics : Lisbon, 28 July - 2 August 2003
Published 2005Table of Contents: “…Lieb (Princeton), Jakob Yngvason (U. Wien). Semiclassical dynamics of an electron moving in a slowly perturbed periodic potential / Stefan Teufel, Gianluca Panati (Tech. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
380