Search Results - (((((((ant OR wyatt) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 661

    Contemporary Ring Theory 2011 : Proceedings of the Sixth China-japan-korea International Conference on Ring Theory. by Kim, Jin Yong

    Published 2012
    Table of Contents: “…Abelian rings and uniquely clean rings; References; WHEN DO THE DIRECT SUMS OF MODULES INHERIT CERTAIN PROPERTIES? …”
    Full text (MFA users only)
    Electronic eBook
  2. 662

    The Big Bang Theory and Philosophy : Rock, Paper, Scissors, Aristotle, Locke

    Published 2012
    Table of Contents: “…; The Giant "Hedon" Collider; The Egoism Polarization; The Social Contract Instability; The Aristotelian Virtue Vortex; The Dennis Kim Conundrum; Part Three: "Perhaps You Mean A Different Thing Than I Do When You Say 'Science'"; Chapter 7: Getting Fundamental about Doing Physics in The Big Bang Theory; Studies in Sheldonology; A Unified Theory of Sheldon?…”
    Full text (MFA users only)
    Electronic eBook
  3. 663

    Mechanical Instability. by Krysinski, Tomasz

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  4. 664

    Regularization theory for ill-posed problems : selected topics by Lu, Shuai, Pereverzev, Sergei V.

    Published 2013
    Table of Contents: “…Numerical examples3 Multiparameter regularization; 3.1 When do we really need multiparameter regularization?…”
    Full text (MFA users only)
    Electronic eBook
  5. 665

    Lead generation for dummies by Rothman, Dayna

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  6. 666

    Analytics stories : using data to make good things happen by Winston, Wayne L.

    Published 2021
    Table of Contents: “…-- How much should we order and when should we order? -- How does the UPS driver know the order to deliver packages? …”
    Full text (MFA users only)
    Electronic eBook
  7. 667

    A Hands-On Guide to Designing Embedded Systems. by Taylor, Adam

    Published 2021
    Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
    Full text (MFA users only)
    Electronic eBook
  8. 668

    Vehicle Dynamics. by Meywerk, Martin

    Published 2015
    Table of Contents: “…11.4 Linearized Equations of Motion of the Single-track Model -- 11.5 Relationship between Longitudinal Forces and Lateral Forces in the Contact Patch -- 11.6 Effect of Differentials when Cornering -- 11.7 Questions and Exercises -- Chapter 12 Circular Driving at a Constant Speed -- 12.1 Equations -- 12.2 Solution of the Equations -- 12.3 Geometric Aspects -- 12.4 Oversteering and Understeering -- 12.5 Questions and Exercises -- Chapter 13 Dynamic Behaviour -- 13.1 Stability of Steady-state Driving Conditions -- 13.2 Steering Behaviour -- 13.3 Crosswind Behaviour -- 13.4 Questions and Exercises…”
    Full text (MFA users only)
    Electronic eBook
  9. 669

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  10. 670

    Handbook of convex optimization methods in imaging science

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  11. 671

    Stochastic filtering with applications in finance by Bhar, Ramaprasad

    Published 2010
    Table of Contents: “…Economic convergence in a filtering framework. 3.3. Ex-ante equity risk premium. 3.4. Concluding remarks -- 4. …”
    Full text (MFA users only)
    Electronic eBook
  12. 672
  13. 673

    Data Analysis and Applications 1 : New and Classical Approaches. by Skiadas, Christos

    Published 2019
    Table of Contents: “…Similarity to homogeneous distributional shapes1.3.11. Stability; 1.3.12. Further Aspects; 1.4. …”
    Full text (MFA users only)
    Electronic eBook
  14. 674

    Advanced mathematical & computational tools in metrology & testing VIII

    Published 2009
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 675

    The structure of amorphous materials using molecular dynamics by Massobrio, C. (Carlo)

    Published 2023
    Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
    Full text (MFA users only)
    Electronic eBook
  16. 676
  17. 677
  18. 678

    Statistical learning from a regression perspective by Berk, Richard A.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  19. 679

    Security, Privacy and Reliability in Computer Communications and Networks. by Sha, Kewei

    Published 2016
    Table of Contents: “…5.6 Threats Analysis and Future Trends -- 5.7 Conclusion -- References -- PART III -- Cryptographic Algorithms -- Chapter 6 -- Quasigroup-Based Encryption for Low-Powered Devices -- Abstract -- 6.1 Introduction -- 6.2 Background-Low Energy Cryptosystems -- 6.3 Overview of Quasigroup Encryption -- 6.4 The Preliminary Block Cipher Design -- 6.5 Overview of Software Implementation -- 6.6 Overview of Three FPGA Implementations -- 6.6.1 The Quasigroup Implementation -- 6.6.2 Comparison Design-Parallel AES -- 6.6.3 Hybrid Front-End/AES Design -- 6.7 Experimental Results -- 6.8 Toward a Single-Chip Implementation -- 6.9 Algorithm Results for B = 2 to 8 -- 6.10 Generating Quasigroups Fast -- 6.11 Our Quasigroup Block Cipher Algorithm -- 6.12 Cryptanalysis and Improvements in the Block Cipher -- 6.13 Overview of a General Linear Cryptanalytical Attack -- 6.14 The LAT Design -- 6.15 Pilingup Attempts for N = 16, 32, and 64 -- 6.16 Analysis of the Attack on the Quasigroup -- 6.17 The Issue of a Total Linear Bias of 1/2 -- 6.18 Attack Complexity -- 6.19 Possible Changes that Could Be Made in the Design of This Attack Model -- 6.20 Which Quasigroup Order Is Best? …”
    Full text (MFA users only)
    Electronic eBook
  20. 680

    Uncommon sense : investment wisdom since the stock market's dawn by Kemp, Michael E.

    Published 2015
    Full text (MFA users only)
    Electronic eBook