Search Results - (((((((anti OR want) OR santis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 201

    Function Estimates. by Marron, J. S.

    Published 1986
    Table of Contents: “…Contents -- Preface -- Logspline density estimation -- Statistical encounters with B-splines -- Estimation of a transfer function in a nongaussian context -- Evaluating the performance of an inversion algorithm -- Harmonic splines in geomagnetism -- Problems in estimating the anomalous gravity potential of the earth from discrete data -- What regression model should be chosen when the statistician misspecifies the error distribution? …”
    Full text (MFA users only)
    Electronic eBook
  2. 202
  3. 203

    Introduction to graph theory by Voloshin, Vitaly I. (Vitaly Ivanovich), 1954-

    Published 2009
    Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
    Full text (MFA users only)
    Electronic eBook
  4. 204

    Conversations on violence : an anthology

    Published 2021
    Table of Contents: “…What Does an Anti-Fascist Life Feel Like? -- Natasha Lennard -- 16. …”
    Full text (MFA users only)
    Electronic eBook
  5. 205

    Artificial Intelligence and Machine Learning Fundamentals : Develop Real-World Applications Powered by the Latest AI Advances. by Nagy, Zsolt

    Published 2018
    Table of Contents: “…Optimizing the Minmax Algorithm with Alpha-Beta PruningDRYing up the Minmax Algorithm -- The NegaMax Algorithm; Using the EasyAI Library; Activity 4: Connect Four; Summary; Regression; Introduction; Linear Regression with One Variable; What Is Regression?…”
    Full text (MFA users only)
    Electronic eBook
  6. 206

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  7. 207
  8. 208

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  9. 209
  10. 210

    Mastering Scala machine learning by Kozlov, Alexander

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  11. 211

    CUDA programming : a developer's guide to parallel computing with GPUs by Cook, Shane

    Published 2013
    Table of Contents: “…ALGORITHMIC ISSUESFINDING AND AVOIDING ERRORS; DEVELOPING FOR FUTURE GPUS; FURTHER RESOURCES; CONCLUSION; References; Index.…”
    Full text (MFA users only)
    Electronic eBook
  12. 212
  13. 213

    Numerical Methods for Eigenvalue Problems. by Börm, Steffen

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  14. 214

    Eat, cook, grow : mixing human-computer interactions with human-food interactions

    Published 2014
    Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
    Full text (MFA users only)
    Electronic eBook
  15. 215
  16. 216

    Parallel Computing : Advances and Current Issues, Proceedings of the International Conference Parco2001. by Joubert, G. R.

    Published 2002
    Table of Contents: “…Committees ; Preface ; Invited Papers ; Deploying Parallel Numerical Library Routines to Cluster Computing in a Self Adapting Fashion ; 1 Overview ; 2 Numerical libraries in shared homogeneous distributed environments ; 3 Sample software implementation and results.…”
    Full text (MFA users only)
    Electronic eBook
  17. 217

    Optimization of Observation and Control Processes. by Malyshev, V. V.

    Published 2000
    Table of Contents: “…Optimization of Informational Noise When Observing a Dynamic Object""; ""4.6. Example of Observing a Maneuvering Object""; ""Chapter 5. …”
    Full text (MFA users only)
    Electronic eBook
  18. 218

    Handbook of operations research in natural resources

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  19. 219
  20. 220