Search Results - (((((((ant OR wkant) OR mwantis) OR when) OR cantor) OR anne) OR shane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 35
- Data processing 26
- artificial intelligence 24
- Machine learning 21
- Mathematical optimization 21
- Mathematics 21
- Mathematical models 20
- Algorithms 19
- algorithms 18
- Artificial Intelligence 16
- Data mining 15
- Social aspects 13
- Computer algorithms 12
- Technological innovations 12
- Computer networks 11
- Neural networks (Computer science) 10
- methods 10
- Design and construction 9
- Development 9
- Diseases 9
- Information technology 9
- Python (Computer program language) 9
- Research 9
- Data Mining 8
- History 8
- Statistical methods 8
- Application software 7
- Electronic data processing 7
- Management 7
- Philosophy 7
Search alternatives:
- mwantis »
-
261
-
262
Eat, cook, grow : mixing human-computer interactions with human-food interactions
Published 2014Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
Full text (MFA users only)
Electronic eBook -
263
Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference.
Published 2006Table of Contents: “…An extended branch-and-bound algorithm for fuzzy linear bilevel programming / G. …”
Full text (MFA users only)
Electronic eBook -
264
Automatic indexing and abstracting of document texts
Published 2000Full text (MFA users only)
Electronic eBook -
265
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
266
Fast finance : does the financial world allow social loafing?
Published 2014Full text (MFA users only)
Electronic eBook -
267
-
268
Fundamentals of patenting and licensing for scientists and engineers
Published 2009Table of Contents: “…When final rejection is received. 8.9. Appeal. 8.10. …”
Full text (MFA users only)
Electronic eBook -
269
Understanding large temporal networks and spatial networks : exploration, pattern searching, visualization and network evolution
Published 2014Table of Contents: “…Spanish Algorithms -- 3.8.4.A Sparse Network Algorithm -- 3.9. …”
Full text (MFA users only)
Electronic eBook -
270
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?…”
Full text (MFA users only)
Electronic eBook -
271
Practical Strategies in Geriatric Mental Health : Cases and Approaches.
Published 2019Full text (MFA users only)
Electronic eBook -
272
Data mining for the social sciences : an introduction
Published 2015Full text (MFA users only)
Electronic eBook -
273
Handbook for pandemic and mass-casualty planning and response
Published 2012Full text (MFA users only)
Electronic Conference Proceeding eBook -
274
Debates in the digital humanities 2016
Published 2016Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
Full text (MFA users only)
Electronic eBook -
275
Machine learning for the web
Published 2016Table of Contents: “…Preface; Introduction to Practical Machine Learning Using Python; General machine-learning concepts; Machine-learning example; Installing and importing a module (library); Preparing, manipulating and visualizing data -- NumPy, pandas and matplotlib tutorials; Using NumPy; Arrays creation; Array manipulations; Array operations; Linear algebra operations; Statistics and mathematical functions; Understanding the pandas module; Exploring data; Manipulate data; Matplotlib tutorial; Scientific libraries used in the book; When to use machine learning; Summary; Unsupervised Machine Learning.…”
Full text (MFA users only)
Electronic eBook -
276
Test driven development in Ruby : a practical introduction to TDD using problem and solution domain analysis
Published 2017Table of Contents: “…Problem Domain AnalysisSolution Domain Analysis; Alternative Representations; Divide and Conquer Strategy; Designing Test Cases; Sum a List of Numbers; Sequence of Test Cases; Starter Test; Next Test ; Story Test ; Assertion; Test Driving Calculator; Canonical Test Structure; Given; When; Then; Arrange, Act, Assert; Calculator; Addition; Subtraction; Common Mistakes; Common Mistakes in the TDD Cycle; Mistakes in Step One; Mistakes in Step Two; Mistakes in Step Three; Mistakes in Step Four; Mistakes in Step Five; Base Conversion; Problem Statement; Problem Domain Analysis.…”
Full text (MFA users only)
Electronic eBook -
277
Foreign exchange: the complete deal : a comprehensive guide to the theory and practice of the forex market
Published 2012Table of Contents: “…When liquidity disappears -- The carry trade and Torschlusspanik (door shut panic) -- 12. …”
Full text (MFA users only)
Electronic eBook -
278
Deep Learning with TensorFlow : Explore neural networks and build intelligent systems with Python, 2nd Edition.
Published 2018Table of Contents: “…; Artificial neural networks; The biological neurons; The artificial neuron; How does an ANN learn?; ANNs and the backpropagation algorithm; Weight optimization; Stochastic gradient descent; Neural network architectures; Deep Neural Networks (DNNs); Multilayer perceptron; Deep Belief Networks (DBNs).…”
Full text (MFA users only)
Electronic eBook -
279
W.C. McKern and the Midwestern Taxonomic Method
Published 2003Full text (MFA users only)
Electronic eBook -
280
Professional Practice in Paramedic, Emergency and Urgent Care.
Published 2013Full text (MFA users only)
Electronic eBook