Search Results - (((((((anti OR want) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Artificial intelligence 41
- Machine learning 35
- Mathematical models 29
- Mathematics 29
- artificial intelligence 25
- Data mining 24
- Algorithms 23
- Technological innovations 22
- algorithms 22
- Computer networks 19
- methods 18
- Artificial Intelligence 17
- Computer algorithms 17
- Application software 16
- Development 16
- Python (Computer program language) 15
- Social aspects 15
- Big data 14
- Data Mining 14
- Diseases 14
- Research 14
- Information technology 13
- Management 13
- Mathematical optimization 13
- Electronic data processing 12
- Neural networks (Computer science) 12
- Computer simulation 11
- History 11
- Security measures 11
Search alternatives:
- mantis »
- share »
-
321
Data analytics and big data
Published 2018Table of Contents: “…When real time makes the difference; 4.4. What should data analytics address?…”
Full text (MFA users only)
Electronic eBook -
322
Automated database applications testing : specification representation for automated reasoning
Published 2010Table of Contents: “…Software testing definitions. 1.4. When should testing start in the software lifecycle? …”
Full text (MFA users only)
Electronic eBook -
323
Online engineering
Published 2009Table of Contents: “…THE COVARIANCE INTERSECTION ALGORITHM; 6. LARGEST ELLIPSOID ALGORITHM; 6.1. The Intersection Problem; 6.2. …”
Full text (MFA users only)
Electronic eBook -
324
Medical data privacy handbook
Published 2015Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
Full text (MFA users only)
Electronic eBook -
325
-
326
Scala for Machine Learning - Second Edition.
Published 2017Full text (MFA users only)
Electronic eBook -
327
Infectious diseases in pediatric otolaryngology : a practical guide
Published 2016Full text (MFA users only)
Electronic eBook -
328
Progress reports on impedance spectroscopy : measurements, modeling, and application
Published 2017Full text (MFA users only)
Electronic eBook -
329
Automatic control in power generation, distribution, and protection : proceedings of the IFAC Symposium, Pretoria, Republic of South Africa, 15-19 September 1980
Published 1981Table of Contents: “…COMPUTER AIDED DESIGN OF CONTROL ALGORITHMS…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
330
Communicating mathematics : a conference in honor of Joseph A. Gallian's 65th birthday, July 16-19, 2007, University of Minnesota, Duluth, Minnesota
Published 2009Table of Contents: “…; ""McKay's canonical graph labeling algorithm""; ""A multiplicative deformation of the Möbius function for the poset of partitions of a multiset""…”
Full text (MFA users only)
Electronic eBook -
331
Cryptography : protocols, design, and applications
Published 2012Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
Full text (MFA users only)
Electronic eBook -
332
Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics
Published 2016Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
Full text (MFA users only)
Electronic eBook -
333
Development of industrial manufacturing : selected, peer reviewed papers from the 2013 2nd International Conference on Sustainable Energy and Environmental Engineering (ICSEEE 2013...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
334
Oracle SOA Suite 11g Performance Cookbook.
Published 2013Full text (MFA users only)
Electronic eBook -
335
Elements of algebraic coding systems
Published 2014Table of Contents: “…Constructing f-reducing polynomials -- 7.1 Introduction -- 7.2 Factoring polynomials over large finite fields -- 7.2.1 Resultant -- 7.2.2 Algorithm for factorization based on the resultant -- 7.2.3 The Zassenhaus algorithm -- 7.3 Finding roots of polynomials over finite fields -- 7.3.1 Finding roots when p is large -- 7.3.2 Finding roots when q = pm is large but p is small -- 7.4 Problems with solutions.…”
Full text (MFA users only)
Electronic eBook -
336
Convergence : the redesign of design
Published 2017Table of Contents: “…The Point Where All of the Intelligence Converges ENDNOTES; IMAGES; CHAPTER 4 PARAMETRICS AND COMPUTATION ; BIM Tools ; Challenges to the Convergence ; Computational Tools ; On the Evolution of a Parametric/Computational Convergence ; Simulation and Automation ; The Algorithm of Everything ; Algorithms and Machine Learning ; ENDNOTES; IMAGES; CHAPTER 5 VIRTUAL AND PHYSICAL ; Advances in Virtual Reality ; VR and Reality Capture ; Reality Computing ; Uses for VR in Architecture ; VR and AR in Architecture, Engineering, and Construction ; Leveraging Video Games in AEC.…”
Full text (MFA users only)
Electronic eBook -
337
Digital wealth : an automatic way to invest successfully
Published 2016Full text (MFA users only)
Electronic eBook -
338
Approximate dynamic programming : solving the curses of dimensionality
Published 2011Full text (MFA users only)
Electronic eBook -
339
Mount Sinai expert guides. Gastroenterology
Published 2014Full text (MFA users only)
Electronic eBook -
340
Code halos : how the digital lives of people, things, and organizations are changing the rules of business
Published 2014Table of Contents: “…The "Skinterface" Will Change the Consumer ExperienceIndustrial Amplifiers: Harnessing the Power of the Internet of Things; Smart Appliances Become Amplifiers in the Home; The Application Interface: Window to a Beautiful Experience; The Algorithm: Data Becomes Meaning; Facebook's EdgeRank Algorithm Makes It Personal; Successful Algorithms Power Code Connections and Create Insight; All Data, Great and Small; Netflix Lassos Data to Win in the Market; New Business Models Showcase Code Halo Value; Why Didn't They Tune in the Zune?…”
Full text (MFA users only)
Electronic eBook