Search Results - (((((((anti OR granting) OR span) OR wantsa) OR cantor) OR anne) OR carter) OR banting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 20
- Data processing 13
- Mathematics 13
- Mathematical models 11
- Diseases 10
- artificial intelligence 10
- Technological innovations 9
- Computer networks 8
- Machine learning 8
- Neural networks (Computer science) 8
- Data mining 7
- Research 7
- Social aspects 7
- methods 7
- Algorithms 6
- Artificial Intelligence 6
- Computer simulation 6
- diagnosis 6
- Computer security 5
- Graph theory 5
- Materials 5
- algorithms 5
- therapy 5
- Bioinformatics 4
- Computational biology 4
- Computer algorithms 4
- Development 4
- Electric power systems 4
- History 4
- Information technology 4
Search alternatives:
-
1
Responsible Data Science : transparency and fairness in algorithms
Published 2021Full text (MFA users only)
Electronic eBook -
2
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
3
Probability and Algorithms.
Published 1900Table of Contents: “…""PROBABILITY AND ALGORITHMS""; ""Copyright""; ""Preface""; ""Contents""; ""1. …”
Full text (MFA users only)
Electronic eBook -
4
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
5
Pathway modeling and algorithm research
Published 2011Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
6
An introduction to the analysis of algorithms
Published 2012Table of Contents: “…Notes -- 2. Greedy algorithms. 2.1. Minimum cost spanning trees. 2.2. Jobs with deadlines and profits. 2.3. …”
Full text (MFA users only)
Electronic eBook -
7
Security of block ciphers : from algorithm design to hardware implementation
Published 2015Full text (MFA users only)
Electronic eBook -
8
C# Data Structures and Algorithms : Explore the possibilities of C# for developing a variety of efficient applications.
Published 2018Table of Contents: “…InsertionRemoval; Example -- BST visualization; AVL trees; Implementation; Example -- keep the tree balanced; Red-black trees; Implementation; Example -- RBT-related features; Binary heaps; Implementation; Example -- heap sort; Binomial heaps; Fibonacci heaps; Summary; Chapter 6: Exploring Graphs; Concept of graphs; Applications; Representation; Adjacency list; Adjacency matrix; Implementation; Node; Edge; Graph; Example -- undirected and unweighted edges; Example -- directed and weighted edges; Traversal; Depth-first search; Breadth-first search; Minimum spanning tree; Kruskal's algorithm.…”
Full text (MFA users only)
Electronic eBook -
9
-
10
Network Routing : Algorithms, Protocols, and Architectures.
Published 2017Table of Contents: “…2.7.2 Distance Vector-Based Approach2.8 Shortest Widest Path and Widest Shortest Path; 2.9 Tree, Spanning Tree, and Steiner Tree Algorithms; 2.9.1 Spanning Tree: Breadth First Search and Depth First Search; 2.9.2 Minimum Spanning Tree; 2.9.3 Steiner Tree; 2.10 k-Shortest Paths Algorithm; 2.11 Summary; Further Lookup; Exercises; 3 Routing Protocols: Framework and Principles; 3.1 Routing Protocol, Routing Algorithm, and Routing Table; 3.2 Routing Information Representation and Protocol Messages; 3.3 Distance Vector Routing Protocol; 3.3.1 Conceptual Framework and Illustration.…”
Full text (MFA users only)
Electronic eBook -
11
Modern anti-windup synthesis : control augmentation for actuator saturation
Published 2011Full text (MFA users only)
Electronic eBook -
12
Data Structure and Algorithms Using C++ : A Practical Implementation.
Published 2021Table of Contents: “…4.8 Inline Member Function -- 4.9 Friend Function -- 4.9.1 Simple Friend Function -- 4.9.2 Friend With Inline Substitution -- 4.9.3 Granting Friendship to Another Class (Friend Class) -- 4.9.4 More Than One Class Having the Same Friend Function -- 4.10 Static Data Member and Member Functions -- 4.11 Constructor and Destructor -- 4.11.1 Constructor -- 4.11.2 Destructor -- 4.12 Dynamic Memory Allocation -- 4.13 This Pointer -- 4.14 Class Within Class -- 4.15 Questions -- 5 Stack -- 5.1 STACK -- 5.2 Operations Performed With STACK -- 5.3 ALGORITHMS -- 5.4 Applications of STACK…”
Full text (MFA users only)
Electronic eBook -
13
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
14
Optimization and anti-optimization of structures under uncertainty
Published 2010Table of Contents: “…Formulation of the two-level optimization-anti-optimization problem. 9.4. Algorithms for two-level optimization-anti-optimization. 9.5. …”
Full text (MFA users only)
Electronic eBook -
15
Testing the transparency benefits of inflation targeting : evidence from private sector forecasts
Published 2006Full text (MFA users only)
Electronic eBook -
16
The Biostatistics of Aging : From Gompertzian Mortality to an Index of Aging-Relatedness.
Published 2014Full text (MFA users only)
Electronic eBook -
17
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
18
-
19
Machine Learning and Big Data Concepts, Algorithms, Tools and Applications
Published 2020Full text (MFA users only)
Electronic eBook -
20
Intelligence emerging : adaptivity and search in evolving neural systems
Published 2015Full text (MFA users only)
Electronic eBook