Search Results - (((((((ant OR wkantiii) OR semantic) OR wind) OR cantor) OR anne) OR shared) OR hints) algorithms.

Search alternatives:

  1. 281

    High Performance Computing Systems and Applications & OSCAR Symposium. by International Symposium on High Performance Computing Systems and Applications (17th : 2003 : Sherbrooke, Quebec)

    Published 2003
    Table of Contents: “…""Table of Contents / Table des matières""; ""Preface""; ""Préface""; ""Symposium Organizers / Comité organisateur""; ""Program Committee / Comité scientifique""; ""Part I: Applications / Partie I: applications""; ""Concurrent Computation and Time Complexity Bounds for Algebraic Fractals""; ""Fast Algorithm to Estimate Dense Disparity Fields""; ""Evolutionary Grids of Interacting Stellar Binaries Containing Neutron Star Accretors""; ""HYDRA-MPI: An Adaptive Particle-Particle, Particle-Mesh Code for Conducting Cosmological Simulations on MPP Architectures""…”
    Full text (MFA users only)
    Electronic eBook
  2. 282
  3. 283

    Three Views of Logic : Mathematics, Philosophy, and Computer Science. by Loveland, Donald W.

    Published 2014
    Table of Contents: “…Proof Theory; 1 Propositional Logic; 1.1 Propositional Logic Semantics; 1.2 Syntax: Deductive Logics; 1.3 The Resolution Formal Logic; 1.4 Handling Arbitrary Propositional Wffs; 2 Predicate Logic; 2.1 First-Order Semantics; 2.2 Resolution for the Predicate Calculus; 2.2.1 Substitution; 2.2.2 The Formal System for Predicate Logic; 2.2.3 Handling Arbitrary Predicate Wffs; 3 An Application: Linear Resolution and Prolog; 3.1 OSL-Resolution; 3.2 Horn Logic; 3.3 Input Resolution and Prolog; Appendix A: The Induction Principle.…”
    Full text (MFA users only)
    Electronic eBook
  4. 284

    Big data in medical science and healthcare management : diagnosis, therapy, side effects

    Published 2016
    Table of Contents: “…Autopilot and "doctor algorithm"? -- 1. Intro big data for healthcare? / Peter Langkafel -- 2. …”
    Full text (MFA users only)
    Electronic eBook
  5. 285

    Real-time database systems : architecture and techniques

    Published 2001
    Full text (MFA users only)
    Electronic eBook
  6. 286

    Mathematics and Multi-Ethnic Students : Exemplary Practices. by Germain- Mc Carthy, Yvelyne

    Published 2013
    Table of Contents: “…LYNNE GODFREY: AFRICAN AMERICANS AND THE ALGEBRA PROJECT; Engaging Students; Warm-Up; Group Work; The Winding Game; Discussion between Colleagues; Commentary; Unit Overview: The Chinese Zodiac and the Division Algorithm; 5. …”
    Full text (MFA users only)
    Electronic eBook
  7. 287

    Gradience in grammar : generative perspectives

    Published 2006
    Table of Contents: “…Frisch and Adrienne Stearns -- Intermediate syntactic variants in a dialect : standard speech repertoire and relative acceptability / Leonie Cornips -- Gradedness and optionality in mature and developing grammars / Antonella Sorace -- Decomposing gradience : quantitative versus qualitative distinctions / Matthias Schlesewsky, Ina Bornkessel, and Brian McElree -- Gradient perception of intonation / Caroline Féry and Ruben Stoel -- Prototypicality judgements as inverted perception / Paul Boersma -- Modelling productivity with the gradual learning algorithm : the problem of accidentally exceptionless generalizations / Adam Albright and Bruce Hayes -- Gradedness as relative efficiency in the processing of syntax and semantics / John A. …”
    Full text (MFA users only)
    Electronic eBook
  8. 288

    Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow. by Ravichandiran, Sudharsan

    Published 2018
    Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
    Full text (MFA users only)
    Electronic eBook
  9. 289

    Constraint Solving over Multi-valued Logics : Application to Digital Circuits.

    Published 2002
    Table of Contents: “…-- 3.2 Test Generation -- 3.3 TG Modelling Approaches and Algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  10. 290

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
    Full text (MFA users only)
    Electronic eBook
  11. 291

    HTML5 Multimedia Development Cookbook. by Cruse, Dale

    Published 2011
    Table of Contents: “…More flexible footer contentApplying the outline algorithm; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Are you sure?…”
    Full text (MFA users only)
    Electronic eBook
  12. 292

    Circuit analysis

    Published 2011
    Table of Contents: “…CIRCUIT ANALYSIS; ELECTRICAL ENGINEERINGDEVELOPMENTS; CONTENTS; PREFACE; ELEMENT STAMP ALGORITHM FOR MATRIXFORMULATION OF SYMBOLIC CIRCUITS; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  13. 293

    From text to political positions : text analysis across disciplines

    Published 2014
    Table of Contents: “…Conditional probabilities and associative framing ; Semantic network analysis.…”
    Full text (MFA users only)
    Electronic eBook
  14. 294

    Challenges in information technology management

    Published 2008
    Table of Contents: “…Improved data mining algorithms for frequent patterns with composite items / Ke Wang, James N.K. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 295

    Meeting security challenges through data analytics and decision support

    Published 2016
    Table of Contents: “…Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 296

    Fuzzy systems and data mining II : proceedings of FSDM 2016

    Published 2016
    Table of Contents: “…Adaptive Fuzzy Sliding-Mode Control of Robot and SimulationHesitant Bipolar Fuzzy Set and Its Application in Decision Making; Chance Constrained Twin Support Vector Machine for Uncertain Pattern Classification; Set-Theoretic Kripke-Style Semantics for Monoidal T-Norm (Based) Logics; Data Mining; Dynamic Itemset Mining Under Multiple Support Thresholds; Deep Learning with Large Scale Dataset for Credit Card Data Analysis; Probabilistic Frequent Itemset Mining Algorithm over Uncertain Databases with Sampling; Priority Guaranteed and Energy Efficient Routing in Data Center Networks.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 297

    Smart buildings, smart communities and demand response

    Published 2021
    Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
    Full text (MFA users only)
    Electronic eBook
  18. 298

    Short-Circuit Withstand Capability of Power Transformers. by Geißler, Daniel Hermann

    Published 2016
    Table of Contents: “…4.5.3 FEA Model Validation4.5.4 FEA Model for Bonded CTCs; 5 Dynamic Short-Circuit Forces Test Stand; 5.1 Design and Principal Functionality; 5.2 Deformation Measurement Systems; 5.2.1 Acceleration Sensors; 5.2.1.1 Immunity to Magnetic Fields; 5.2.1.2 Mounting to the Windings; 5.2.1.3 Signal Processing; 5.2.2 High-Speed Camera-Based Deformation Tracking; 5.2.2.1 Principal Functionality; 5.2.2.2 Marker Mounting and Image Calibration; 5.2.2.3 Displacement Calculation Algorithm; 5.2.3 Comparison of Both Systems; 5.3 Measurement Data Evaluation; 5.4 Experimental Results.…”
    Full text (MFA users only)
    Electronic eBook
  19. 299

    Social sensing : building reliable systems on unreliable data by Wang, Dong, Abdelzaher, Tarek, Kaplan, Lance

    Published 2015
    Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
    Full text (MFA users only)
    Electronic eBook
  20. 300