Search Results - (((((((anti OR fine) OR cantee) OR granting) OR cantor) OR anne) OR maarten) OR tkanto) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 19
- Diseases 13
- Data processing 12
- Machine learning 12
- artificial intelligence 11
- Mathematical models 10
- Mathematics 9
- Technological innovations 9
- diagnosis 9
- Neural networks (Computer science) 8
- Artificial Intelligence 7
- Social aspects 7
- methods 7
- Data mining 6
- Materials 6
- Research 6
- Algorithms 5
- Computer networks 5
- Computer simulation 5
- algorithms 5
- therapy 5
- Computer science 4
- Computer security 4
- Machine Learning 4
- Mechanical engineering 4
- Neural Networks, Computer 4
- Security measures 4
- Skin 4
- Automatic control 3
- Bioinformatics 3
Search alternatives:
- fine »
- cantee »
- granting »
- tkanto »
-
1
Responsible Data Science : transparency and fairness in algorithms
Published 2021Table of Contents: “…Black-Box Models 35 -- Ethical Challenges with Interpretable Models 38 -- Black-Box Models 39 -- Ensembles 39 -- Nearest Neighbors 41 -- Clustering 41 -- Association Rules 42 -- Collaborative Filters 42 -- Artificial Neural Nets and Deep Neural Nets 43 -- Problems with Black-Box Predictive Models 45 -- Problems with Unsupervised Algorithms 47 -- Summary 48 -- Chapter 3 The Ways AI Goes Wrong, and the Legal Implications 49 -- AI and Intentional Consequences by Design 50 -- Deepfakes 50 -- Supporting State Surveillance and Suppression 51 -- Behavioral Manipulation 52 -- Automated Testing to Fine-Tune Targeting 53 -- AI and Unintended Consequences 55 -- Healthcare 56 -- Finance 57 -- Law Enforcement 58 -- Technology 60 -- The Legal and Regulatory Landscape around AI 61 -- Ignorance Is No Defense: AI in the Context of Existing Law and Policy 63 -- A Finger in the Dam: Data Rights, Data Privacy, and Consumer Protection Regulations 64 -- Trends in Emerging Law and Policy Related to AI 66 -- Summary 69 --…”
Full text (MFA users only)
Electronic eBook -
2
-
3
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
4
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
5
Pathway modeling and algorithm research
Published 2011Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
6
Genetic Algorithms + Data Structures = Evolution Programs
Published 1994Table of Contents: “…I. Genetic Algorithms -- 1 GAs: What Are They? -- 2 GAs: How Do They Work? …”
Full text (MFA users only)
Electronic eBook -
7
-
8
Network Routing : Algorithms, Protocols, and Architectures.
Published 2017Full text (MFA users only)
Electronic eBook -
9
Modern anti-windup synthesis : control augmentation for actuator saturation
Published 2011Full text (MFA users only)
Electronic eBook -
10
Data Structure and Algorithms Using C++ : A Practical Implementation.
Published 2021Table of Contents: “…4.8 Inline Member Function -- 4.9 Friend Function -- 4.9.1 Simple Friend Function -- 4.9.2 Friend With Inline Substitution -- 4.9.3 Granting Friendship to Another Class (Friend Class) -- 4.9.4 More Than One Class Having the Same Friend Function -- 4.10 Static Data Member and Member Functions -- 4.11 Constructor and Destructor -- 4.11.1 Constructor -- 4.11.2 Destructor -- 4.12 Dynamic Memory Allocation -- 4.13 This Pointer -- 4.14 Class Within Class -- 4.15 Questions -- 5 Stack -- 5.1 STACK -- 5.2 Operations Performed With STACK -- 5.3 ALGORITHMS -- 5.4 Applications of STACK…”
Full text (MFA users only)
Electronic eBook -
11
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
12
Inverse synthetic aperture radar imaging with MATLAB algorithms
Published 2012Full text (MFA users only)
Electronic eBook -
13
Network routing : algorithms, protocols, and architectures
Published 2007Full text (MFA users only)
Electronic eBook -
14
Optimization and anti-optimization of structures under uncertainty
Published 2010Table of Contents: “…Formulation of the two-level optimization-anti-optimization problem. 9.4. Algorithms for two-level optimization-anti-optimization. 9.5. …”
Full text (MFA users only)
Electronic eBook -
15
Testing the transparency benefits of inflation targeting : evidence from private sector forecasts
Published 2006Full text (MFA users only)
Electronic eBook -
16
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
17
-
18
Intelligence emerging : adaptivity and search in evolving neural systems
Published 2015Full text (MFA users only)
Electronic eBook -
19
Thyroid Fine Needle Aspiration.
Published 2013Table of Contents: “…Algorithmic chart to detect papillary carcinoma in thyroid fine needle aspirationAdequacy assessment; Reporting incorporating Bethesda Classification and UK Thy1-5 classification; References; Chapter 2 Nodular goiter and mimickers; General patterns of nodular goiter; Nodular goiter with oncocytic (Hürthle cell) metaplasia; Diffuse follicular variant of papillary thyroid carcinoma; Clinical vignette; Macrofollicular variant of papillary thyroid carcinoma; Nodular goiter harboring papillary microcarcinoma; False negatives; References; Chapter 3 Follicular neoplasm and mimickers.…”
Full text (MFA users only)
Electronic eBook -
20
Metastatic neoplasms in fine-needle aspiration cytology : diagnostic tips and traps
Published 2015Full text (MFA users only)
Electronic eBook