Search Results - (((((((anti OR canton) OR span) OR wants) OR cantor) OR anne) OR character) OR wanting) algorithms.

Refine Results
  1. 1
  2. 2

    Algorithms unlocked by Cormen, Thomas H.

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  3. 3

    Probability and Algorithms. by Staff, National Research Council

    Published 1900
    Table of Contents: “…""PROBABILITY AND ALGORITHMS""; ""Copyright""; ""Preface""; ""Contents""; ""1. …”
    Full text (MFA users only)
    Electronic eBook
  4. 4

    Meta-Algorithmics : Patterns for Robust, Low Cost, High Quality Systems. by Simske, Steven J.

    Published 2013
    Table of Contents: “…META-ALGORITHMICS; Contents; Acknowledgments; 1 Introduction and Overview; 1.1 Introduction; 1.2 Why Is This Book Important?…”
    Full text (MFA users only)
    Electronic eBook
  5. 5
  6. 6

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  7. 7

    An Introduction to Algorithmic Trading : Basic to Advanced Strategies. by Leshik, Edward, Cralle, Jane

    Published 2011
    Table of Contents: “…Introduction to trading algorithms. History ; All about trading algorithms you ever wanted to know ... ; Algos defined and explained ; Who uses and provides algos ; Why have they become mainstream so quickly? …”
    Full text (MFA users only)
    Electronic eBook
  8. 8

    An introduction to the analysis of algorithms by Soltys, Michael, 1971-

    Published 2012
    Table of Contents: “…Notes -- 2. Greedy algorithms. 2.1. Minimum cost spanning trees. 2.2. Jobs with deadlines and profits. 2.3. …”
    Full text (MFA users only)
    Electronic eBook
  9. 9
  10. 10

    C# Data Structures and Algorithms : Explore the possibilities of C# for developing a variety of efficient applications. by Jamro, Marcin

    Published 2018
    Table of Contents: “…InsertionRemoval; Example -- BST visualization; AVL trees; Implementation; Example -- keep the tree balanced; Red-black trees; Implementation; Example -- RBT-related features; Binary heaps; Implementation; Example -- heap sort; Binomial heaps; Fibonacci heaps; Summary; Chapter 6: Exploring Graphs; Concept of graphs; Applications; Representation; Adjacency list; Adjacency matrix; Implementation; Node; Edge; Graph; Example -- undirected and unweighted edges; Example -- directed and weighted edges; Traversal; Depth-first search; Breadth-first search; Minimum spanning tree; Kruskal's algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  11. 11

    Graph algorithms and applications 3

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  12. 12

    Network Routing : Algorithms, Protocols, and Architectures. by Medhi, Deep

    Published 2017
    Table of Contents: “…2.7.2 Distance Vector-Based Approach2.8 Shortest Widest Path and Widest Shortest Path; 2.9 Tree, Spanning Tree, and Steiner Tree Algorithms; 2.9.1 Spanning Tree: Breadth First Search and Depth First Search; 2.9.2 Minimum Spanning Tree; 2.9.3 Steiner Tree; 2.10 k-Shortest Paths Algorithm; 2.11 Summary; Further Lookup; Exercises; 3 Routing Protocols: Framework and Principles; 3.1 Routing Protocol, Routing Algorithm, and Routing Table; 3.2 Routing Information Representation and Protocol Messages; 3.3 Distance Vector Routing Protocol; 3.3.1 Conceptual Framework and Illustration.…”
    Full text (MFA users only)
    Electronic eBook
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Computational aspects of discrete subgroups of lie groups : Virtual Conference on Computational Aspects of Discrete Subgroups of Lie Groups, June 14-18, 2021, Institute for Computa...

    Published 2023
    Table of Contents: “…Computational models: type of allowed simple steps -- 5. Geometric Algorithms -- 6. Blum-Shub-Smale Machines, BSS Machines -- 7. …”
    Full text (MFA users only)
    Electronic eBook
  19. 19

    We are data : algorithms and the making of our digital selves by Cheney-Lippold, John

    Published 2017
    Table of Contents: “…-- Privacy: wanted dead or alive -- Conclusion: ghosts in the machine.…”
    Full text (MFA users only)
    Electronic eBook
  20. 20

    Optimization and anti-optimization of structures under uncertainty by Elishakoff, Isaac

    Published 2010
    Table of Contents: “…Formulation of the two-level optimization-anti-optimization problem. 9.4. Algorithms for two-level optimization-anti-optimization. 9.5. …”
    Full text (MFA users only)
    Electronic eBook