Search Results - (((((((ante OR want) OR santis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 46
- Artificial intelligence 44
- Machine learning 35
- Mathematics 32
- Mathematical models 29
- artificial intelligence 28
- Algorithms 25
- Data mining 25
- Mathematical optimization 24
- algorithms 24
- Technological innovations 20
- Artificial Intelligence 19
- Computer networks 19
- Computer algorithms 17
- methods 17
- Application software 16
- Development 16
- Information technology 16
- Big data 15
- Python (Computer program language) 15
- Social aspects 15
- Data Mining 14
- Management 13
- Electronic data processing 12
- Neural networks (Computer science) 12
- Research 12
- Computer science 10
- Design and construction 10
- History 10
- Wireless communication systems 10
Search alternatives:
-
601
Power system wide-area stability analysis and control
Published 2018Full text (MFA users only)
Electronic eBook -
602
The internet of things and big data analytics integrated platforms and industry use cases
Published 2020Full text (MFA users only)
Electronic eBook -
603
IP multicast with applications to IPTV and mobile DVB-H
Published 2008Table of Contents: “…Cover -- TOC36;CONTENTS -- Preface -- About the Author -- CH36;1 INTRODUCTION TO IP MULTICAST -- 146;1 Introduction -- 146;2 Why Multicast Protocols are Wanted47;Needed -- 146;3 Basic Multicast Protocols and Concepts -- 146;4 IPTV and DVB45;H Applications -- 146;5 Course of Investigation -- Appendix 146;A58; Multicast IETF Request for Comments -- Appendix 146;B58; Multicast Bibliography -- References -- CH36;2 MULTICAST ADDRESSING FOR PAYLOAD -- 246;1 IP Multicast Addresses -- 246;146;1 Limited Scope Addresses -- 246;146;2 GLOP Addressing -- 246;146;3 Generic IPv4 Addressing -- 246;2 Layer 2 Multicast Addresses -- 246;246;1 Ethernet MAC Address Mapping -- 246;3 MPEG45;Layer Addresses -- References -- CH36;3 MULTICAST PAYLOAD FORWARDING -- 346;1 Multicasting on a LAN Segment -- 346;2 Multicasting between Network Segments -- 346;3 Multicast Distribution Trees -- 346;4 Multicast Forwarding58; Reverse Path Forwarding -- 346;5 Multicast Forwarding58; Center45;Based Tree Algorithm -- 346;6 Implementing IP Multicast in a Network -- References -- CH36;4 DYNAMIC HOST REGISTRATION8212;INTERNET GROUP MANAGEMENT PROTOCOL -- 446;1 IGMP Messages -- 446;2 IGMPv3 Messages -- 446;3 IGMP Operation -- Appendix 446;A58; Protocol Details for IGMPv2 -- 446;A46;1 Overview -- 446;A46;2 Protocol Description -- 446;A46;3 Receiver 40;Host41; State Diagram -- 446;A46;4 Router State Diagram -- Appendix 446;B58; IGMP Snooping Switches -- Appendix 446;C58; Example of Router Configurations -- References -- CH36;5 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; PROTOCOL INDEPENDENT MULTICAST -- 546;1 Introduction to PIM -- 546;2 PIM SM Details -- 546;246;1 Approach -- 546;246;2 PIM SM Protocol Overview -- 546;246;3 Detailed Protocol Description -- 546;246;4 Packet Formats -- References -- CH36;6 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; CORE45;BASED TREES -- 646;1 Motivation -- 646;2 Basic Operation -- 646;3 CBT Components and Functions -- 646;346;1 CBT Control Message Retransmission Strategy -- 646;346;2 Nonmember Sending -- 646;4 Core Router Discovery -- 646;5 Protocol Specification Details -- 646;546;1 CBT HELLO Protocol -- 646;546;2 JOIN_REQUEST Processing -- 646;546;3 JOIN_ACK Processing -- 646;546;4 QUIT_NOTIFICATION Processing -- 646;546;5 ECHO_REQUEST Processing -- 646;546;6 ECHO_REPLY Processing -- 646;546;7 FLUSH_TREE Processing -- 646;546;8 Nonmember Sending -- 646;546;9 Timers and Default Values -- 646;546;10 CBT Packet Formats and Message Types -- 646;546;11 Core Router Discovery -- 646;6 CBT Version 3 -- 646;646;1 The First Step58; Joining the Tree -- 646;646;2 Transient State -- 646;646;3 Getting 34;On Tree34; -- 646;646;4 Pruning and Prune State -- 646;646;5 The Forwarding Cache -- 646;646;6 Packet Forwarding -- 646;646;7 The 34;Keepalive34; Protocol -- 646;646;8 Control Message Precedence and Forwarding Criteria -- 646;646;9 Broadcast LANs -- 646;646;10 The 34;all45;cbt45;routers34; Group -- 646;646;11 Nonmember Sending -- References -- CH36;7 MULTICAST ROUTING8212;DENSE45;MODE PROTOCOLS58; PIM DM.…”
Full text (MFA users only)
Electronic eBook -
604
Security, Privacy and Reliability in Computer Communications and Networks.
Published 2016Table of Contents: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN INNOVATION AND CHANGE IN EDUCATION -- CROSS-CULTURAL PERSPECTIVE -- Title Page -- Security, Privacy and Reliability in Computer Communications and Networks -- Copyright Page -- Contents -- Preface -- Acknowledgments -- List of Contributors -- List of Figures -- List of Tables -- List of Algorithms -- List of Abbreviations -- PART I -- Privacy -- Chapter 1 -- Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Ad Hoc Networks -- Abstract -- 1.1 Introduction -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures -- 1.2.1 Anonymity Definition and Assessment -- 1.2.2 Antitraffic Analysis Measures -- 1.3 System Assumptions and Attack Model -- 1.3.1 Network Model -- 1.3.2 Adversary Model -- 1.3.3 Evidence Theory and Belief Metric -- 1.4 Distributed Beamforming to Increase the BS Anonymity -- 1.4.1 Overview of the DiBAN Protocol -- 1.4.2 DiBAN Illustrative Example -- 1.4.3 DiBAN Energy Analysis -- 1.5 Distributed Beamforming Relay Selection Approach -- 1.6 Validation Experiments -- 1.6.1 Simulation Environment -- 1.6.2 Simulation Results -- 1.7 Conclusions and FutureWork -- Appendix I: Numerical Evidence Theory Belief Calculation Example -- References -- Chapter 2 -- A Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication -- Abstract -- 2.1 Introduction -- 2.2 Related Works -- 2.3 System Model and Preliminaries -- 2.3.1 Network Model -- 2.3.2 Attack Model -- 2.3.3 Security Requirements -- 2.4 The Proposed PETS Scheme -- 2.4.1 Scheme Overview -- 2.4.2 System Initiation -- 2.4.3 Vehicle-RSU Key Agreement -- 2.4.4 Traffic Information Collection and Aggregation -- 2.4.5 Traffic Jam Message Propagation -- 2.5 Security Analysis -- 2.6 Performance Evaluation -- 2.6.1 Traffic Information Sending/Collection Overhead.…”
Full text (MFA users only)
Electronic eBook -
605
SCADA Security : Machine Learning Concepts for Intrusion Detection and Prevention.
Published 2020Table of Contents: “…6.3.1 Learning of Most-Representative Data Sets -- 6.3.2 Decision-Making Model -- 6.4 EXPERIMENTAL SETUP -- 6.4.1 Choice of Parameters -- 6.4.2 The Candidate Classifiers -- 6.5 RESULTS AND DISCUSSION -- 6.5.1 Integrating GATUD into SDAD -- 6.5.2 Integrating GATUD into the Clustering-based Method -- 6.6 CONCLUSION -- CHAPTER 7 Threshold Password-Authenticated Secret Sharing Protocolss -- 7.1 MOTIVATION -- 7.2 EXISTING SOLUTIONS -- 7.3 DEFINITION OF SECURITY -- 7.4 TPASS PROTOCOLS -- 7.4.1 Protocol-Based on Two-Phase Commitment -- 7.4.2 Protocol Based on Zero-Knowledge Proof -- 7.4.3 Correctness…”
Full text (MFA users only)
Electronic eBook -
606
NGN architectures, protocols, and services
Published 2014Table of Contents: “…1.7 The Convergence of the Two Worlds: Next Generation Networks1.7.1 NGN Perspective of Telecom Operators; 1.7.2 When Will NGN Emerge?; 1.8 The Structure of This Book; References; Chapter 2 Internet Fundamentals by IETF; 2.1 Internet Architecture and IETF Standardization; 2.2 Fundamental Internet Protocols; 2.2.1 Internet Protocol Version 4; 2.2.2 Internet Protocol Version 6; 2.2.3 User Datagram Protocol; 2.2.4 Transmission Control Protocol; 2.2.5 Stream Control Transmission Protocol; 2.3 Addressing and Numbering; 2.3.1 IPv4 Addressing; 2.3.2 Network Address Translation.…”
Full text (MFA users only)
Electronic eBook -
607
Qualitative Spatial and Temporal Reasoning.
Published 2012Table of Contents: “…Generalized Intervals; 3.1. "When they built the bridge."…”
Full text (MFA users only)
Electronic eBook -
608
Medicine Meets Virtual Reality 13 : the Magical Next Becomes the Medical Now
Published 2005Table of Contents: “…Spherical mechanism analysis of a surgical robot for minimally invasive surgery -- analytical and experimental approaches -- Using an ontology of human anatomy to inform reasoning with geometric models -- Assessing surgical skill training under hazardous conditions in a virtual environment -- An automatic robust meshing algorithm for soft tissue modeling -- Visualizing volumetric data sets using a wireless handheld computer -- Quantifying risk behavior in surgical simulation -- Haptic herniorrhaphy simulation with robust and fast collision detection algorithm -- Affordable virtual environments: Buildinga virtual beach for clinical use -- Analysis of masticatory muscle condition using the 4-dimensional muscle model for a patient with square mandible -- Automated renderer for visual human and volumetric scan segmentations -- Distributed collaborative radiological visualization using access grid -- Development of a method for surface and subsurface modeling using force and position sensors -- The physiology and pharmacology of growing old, as shown in body simulation -- Physiologic and chemical simulation of cyanide and sarin toxicity and therapy.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
609
Anesthesia student survival guide : a case-based approach
Published 2016Full text (MFA users only)
Electronic eBook -
610
Scala Machine Learning Projects : Build real-world machine learning and deep learning projects with Scala.
Published 2018Full text (MFA users only)
Electronic eBook -
611
CCNA Security Study Guide : Exam 210-260.
Published 2018Full text (MFA users only)
Electronic eBook -
612
From complexity in the natural sciences to complexity in operation management systems
Published 2019Full text (MFA users only)
Electronic eBook -
613
The illustrated network : how TCP/IP works in a modern network
Published 2017Table of Contents: “…Example ARP Operation -- ARP Variations -- Proxy ARP -- Reverse ARP -- ARPs on WANs -- ARP and IPv6 -- Neighbor Discovery Protocol -- ND Address Resolution -- Questions for Readers -- 7 IPv4 and IPv6 Headers -- Packet Headers and Addresses -- The IPv4 Packet Header -- Fragmentation and IPv4 -- Fragmentation and MTU -- Fragmentation and Reassembly -- Path MTU Determination -- A Fragmentation Example -- Limitations of IPv4 -- The IPv6 Header Structure -- IPv4 and IPv6 Headers Compared -- IPv6 Header Changes -- IPv6 and Fragmentation -- Questions for Readers -- 8 Internet Control Message Protocol -- ICMP and Ping -- The ICMP Message Format -- ICMP Message Fields -- ICMP Types and Codes -- ICMP Error Messages -- ICMP Query Messages -- Other ICMP Messages -- Sending ICMP Messages -- When ICMP Must Be Sent -- When ICMP Must Not Be Sent -- Ping -- Traceroute -- Path MTU -- ICMPv6 -- Basic ICMPv6 Messages -- Destination Unreachable -- Packet Too Big -- Time Exceeded -- Parameter Problem -- Echo Request and Reply -- Neighbor Discovery and Autoconfiguration -- Routers and Neighbor Discovery -- Interface Addresses -- Neighbor Solicitation and Advertisement -- Questions for Readers -- 9 Routing -- Routers and Routing Tables -- Hosts and Routing Tables -- Direct and Indirect Delivery -- Routing -- Direct Delivery without Routing -- Indirect Delivery and the Router -- Questions for Readers -- 10 Forwarding IP Packets -- Router Architectures -- Basic Router Architectures -- Another Router Architecture -- Router Access -- The Console Port -- The Auxiliary Port -- The Network -- Forwarding Table Lookups -- Dual Stacks, Tunneling, and IPv6 -- Dual Protocol Stacks -- Tunneling -- Tunneling Mechanisms -- Transition Considerations -- Questions for Readers -- 11 User Datagram Protocol -- UDP Ports and Sockets -- What UDP Is For -- The UDP Header -- IPv4 and IPv6 Notes.…”
Full text (MFA users only)
Electronic eBook -
614
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book -
615
Hybrid systems, optimal control and hybrid vehicles : theory, methods and applications
Published 2017Full text (MFA users only)
Electronic eBook -
616
-
617
Relationship inference with Familias and R : statistical methods in forensic genetics
Published 2016Full text (MFA users only)
Electronic eBook -
618
-
619
Analyzing neural time series data : theory and practice
Published 2014Table of Contents: “…Which Sampling Rate to Use When Recording Data -- 6.7. Other Optional Equipment to Consider -- pt. …”
Full text (MFA users only)
Electronic eBook -
620
COST ANALYSIS OF ELECTRONIC SYSTEMS.
Published 2012Table of Contents: “…5.2.1 Traditional cost accounting (TCA)5.2.2 Activity-based costing; 5.3 Activity-Based Cost Model Example; 5.4 Summary and Discussion; References; Bibliography; Problems; Chapter 6 Parametric Cost Modeling; 6.1 Cost Estimating Relationships (CERs); 6.1.1 Developing CERs; 6.2 A Simple Parametric Cost Modeling Example; 6.3 Limitations of CERs; 6.3.1 Bounds of the data; 6.3.2 Scope of the data; 6.3.3 Overfitting; 6.3.4 Don't force a correlation when one does not exist; 6.3.5 Historical data; 6.4 Other Parametric Cost Modeling/Estimation Approaches; 6.4.1 Feature-based costing (FBC).…”
Full text (MFA users only)
Electronic eBook