Search Results - (((((((ant OR wyant) OR semantic) OR file) OR cantor) OR anne) OR plane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 100
- Mathematics 75
- Mathematical models 73
- Artificial intelligence 56
- Algorithms 50
- Machine learning 42
- algorithms 42
- Data mining 34
- artificial intelligence 33
- methods 33
- Mathematical optimization 29
- Computer networks 27
- Digital techniques 24
- Signal processing 24
- Artificial Intelligence 23
- Computer science 23
- Computer algorithms 21
- Image processing 21
- Data Mining 20
- Development 20
- Python (Computer program language) 20
- Technological innovations 20
- Computer simulation 18
- Application software 17
- Diseases 16
- Computational Biology 15
- Information technology 15
- Management 15
- Numerical analysis 15
- Computer security 14
Search alternatives:
- ant »
- wyant »
- semantic »
- cantor »
- plane »
-
81
Randomization, Relaxation, and Complexity in Polynomial Equation Solving.
Published 2011Full text (MFA users only)
Electronic eBook -
82
Fundamentals of grid computing : theory, algorithms and technologies
Published 2010Full text (MFA users only)
Electronic eBook -
83
Building software for simulation : theory and algorithms, with applications in C++
Published 2011Full text (MFA users only)
Electronic eBook -
84
Inverse synthetic aperture radar imaging with MATLAB algorithms
Published 2012Full text (MFA users only)
Electronic eBook -
85
Romance syntax, semantics and L2 acquisition : selected papers from the 30th Linguistic Symposium on Romance Languages : Gainesville, Florida, February 2000
Published 2001Table of Contents: “…ROMANCE SYNTAX, SEMANTICS AND L2 ACQUISITION -- Editorial page -- Title page -- Copyright page -- Acknowledgements -- Table of contents -- CONTRIBUTORS -- Dedication -- ROMANCE SYNTAX, SEMANTICS, AND L2 ACQUISITION -- 0. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
86
-
87
Genetic and evolutionary computation : medical applications
Published 2010Full text (MFA users only)
Electronic eBook -
88
Algorithmic problems of group theory, their complexity, and applications to cryptography
Published 2015Full text (MFA users only)
Electronic eBook -
89
-
90
Supersonic Business Jets in Preliminary Aircraft Design.
Published 2016Full text (MFA users only)
Electronic eBook -
91
Entity information life cycle for big data : master data management and information integration
Published 2015Full text (MFA users only)
Electronic eBook -
92
-
93
-
94
Image reconstruction : applications in medical sciences
Published 2017Full text (MFA users only)
Electronic eBook -
95
Biomedical signal analysis : contemporary methods and applications
Published 2010Full text (MFA users only)
Electronic eBook -
96
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
97
Coding theory : algorithms, architectures, and applications
Published 2007Full text (MFA users only)
Electronic eBook -
98
Visual computing for medicine : theory, algorithms, and applications
Published 2014Full text (MFA users only)
Electronic eBook -
99
Naming and reference : the link of word to object
Published 1992Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
Full text (MFA users only)
Electronic eBook -
100
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
Full text (MFA users only)
Electronic eBook