Search Results - (((((((anti OR want) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

Search alternatives:

  1. 321

    Data analytics and big data by Sedkaoui, Soraya

    Published 2018
    Table of Contents: “…When real time makes the difference; 4.4. What should data analytics address?…”
    Full text (MFA users only)
    Electronic eBook
  2. 322

    Automated database applications testing : specification representation for automated reasoning by Mikhail, Rana Farid

    Published 2010
    Table of Contents: “…Software testing definitions. 1.4. When should testing start in the software lifecycle? …”
    Full text (MFA users only)
    Electronic eBook
  3. 323

    Online engineering

    Published 2009
    Table of Contents: “…THE COVARIANCE INTERSECTION ALGORITHM; 6. LARGEST ELLIPSOID ALGORITHM; 6.1. The Intersection Problem; 6.2. …”
    Full text (MFA users only)
    Electronic eBook
  4. 324

    Medical data privacy handbook

    Published 2015
    Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
    Full text (MFA users only)
    Electronic eBook
  5. 325

    Neural nets and chaotic carriers by Whittle, Peter, 1927-

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  6. 326

    Scala for Machine Learning - Second Edition. by Nicolas, Patrick R.

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  7. 327
  8. 328
  9. 329

    Automatic control in power generation, distribution, and protection : proceedings of the IFAC Symposium, Pretoria, Republic of South Africa, 15-19 September 1980

    Published 1981
    Table of Contents: “…COMPUTER AIDED DESIGN OF CONTROL ALGORITHMS…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 330

    Communicating mathematics : a conference in honor of Joseph A. Gallian's 65th birthday, July 16-19, 2007, University of Minnesota, Duluth, Minnesota

    Published 2009
    Table of Contents: “…; ""McKay's canonical graph labeling algorithm""; ""A multiplicative deformation of the Möbius function for the poset of partitions of a multiset""…”
    Full text (MFA users only)
    Electronic eBook
  11. 331

    Cryptography : protocols, design, and applications

    Published 2012
    Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
    Full text (MFA users only)
    Electronic eBook
  12. 332

    Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics by Ahmadian, Amir Sharif

    Published 2016
    Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
    Full text (MFA users only)
    Electronic eBook
  13. 333
  14. 334

    Oracle SOA Suite 11g Performance Cookbook. by Brasier, Matthew

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  15. 335

    Elements of algebraic coding systems by Rocha, Valdemar C. da, 1947-

    Published 2014
    Table of Contents: “…Constructing f-reducing polynomials -- 7.1 Introduction -- 7.2 Factoring polynomials over large finite fields -- 7.2.1 Resultant -- 7.2.2 Algorithm for factorization based on the resultant -- 7.2.3 The Zassenhaus algorithm -- 7.3 Finding roots of polynomials over finite fields -- 7.3.1 Finding roots when p is large -- 7.3.2 Finding roots when q = pm is large but p is small -- 7.4 Problems with solutions.…”
    Full text (MFA users only)
    Electronic eBook
  16. 336

    Convergence : the redesign of design by Deutsch, Randy

    Published 2017
    Table of Contents: “…The Point Where All of the Intelligence Converges ENDNOTES; IMAGES; CHAPTER 4 PARAMETRICS AND COMPUTATION ; BIM Tools ; Challenges to the Convergence ; Computational Tools ; On the Evolution of a Parametric/Computational Convergence ; Simulation and Automation ; The Algorithm of Everything ; Algorithms and Machine Learning ; ENDNOTES; IMAGES; CHAPTER 5 VIRTUAL AND PHYSICAL ; Advances in Virtual Reality ; VR and Reality Capture ; Reality Computing ; Uses for VR in Architecture ; VR and AR in Architecture, Engineering, and Construction ; Leveraging Video Games in AEC.…”
    Full text (MFA users only)
    Electronic eBook
  17. 337
  18. 338
  19. 339

    Mount Sinai expert guides. Gastroenterology

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  20. 340

    Code halos : how the digital lives of people, things, and organizations are changing the rules of business by Frank, Malcolm

    Published 2014
    Table of Contents: “…The "Skinterface" Will Change the Consumer ExperienceIndustrial Amplifiers: Harnessing the Power of the Internet of Things; Smart Appliances Become Amplifiers in the Home; The Application Interface: Window to a Beautiful Experience; The Algorithm: Data Becomes Meaning; Facebook's EdgeRank Algorithm Makes It Personal; Successful Algorithms Power Code Connections and Create Insight; All Data, Great and Small; Netflix Lassos Data to Win in the Market; New Business Models Showcase Code Halo Value; Why Didn't They Tune in the Zune?…”
    Full text (MFA users only)
    Electronic eBook