Search Results - (((((((ante OR want) OR santis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 581
  2. 582

    Computational models of argument : Proceedings of COMMA 2012

    Published 2012
    Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  3. 583
  4. 584

    A Hands-On Guide to Designing Embedded Systems. by Taylor, Adam

    Published 2021
    Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
    Full text (MFA users only)
    Electronic eBook
  5. 585
  6. 586
  7. 587

    Vehicle Dynamics. by Meywerk, Martin

    Published 2015
    Table of Contents: “…11.4 Linearized Equations of Motion of the Single-track Model -- 11.5 Relationship between Longitudinal Forces and Lateral Forces in the Contact Patch -- 11.6 Effect of Differentials when Cornering -- 11.7 Questions and Exercises -- Chapter 12 Circular Driving at a Constant Speed -- 12.1 Equations -- 12.2 Solution of the Equations -- 12.3 Geometric Aspects -- 12.4 Oversteering and Understeering -- 12.5 Questions and Exercises -- Chapter 13 Dynamic Behaviour -- 13.1 Stability of Steady-state Driving Conditions -- 13.2 Steering Behaviour -- 13.3 Crosswind Behaviour -- 13.4 Questions and Exercises…”
    Full text (MFA users only)
    Electronic eBook
  8. 588

    Banking and finance issues in emerging markets.

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  9. 589

    Cybersecurity Law, standards and regulations by Schreider, Tari

    Published 2020
    Table of Contents: “…Authors of original encryption algorithms never really thought that governments would want to have access to their en... -- In an effort to bring sanity to the uncontrolled growth of encryption regulations, two important laws have been introduced. …”
    Full text (MFA users only)
    Electronic eBook
  10. 590
  11. 591
  12. 592
  13. 593
  14. 594
  15. 595
  16. 596

    IBM TotalStorage : SAN product, design, and optimization guide

    Published 2005
    Table of Contents: “…-- 3.7.6 What happens when there is more than one shortest path? -- 3.7.7 Can FSPF cause any problems? …”
    Full text (MFA users only)
    Electronic eBook
  17. 597

    The structure of amorphous materials using molecular dynamics by Massobrio, C. (Carlo)

    Published 2023
    Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
    Full text (MFA users only)
    Electronic eBook
  18. 598
  19. 599

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  20. 600

    Advanced security solutions for multimedia

    Published 2021
    Full text (MFA users only)
    Electronic eBook