Search Results - (((((((anti OR want) OR santis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Artificial intelligence 41
- Machine learning 35
- Mathematical models 29
- Mathematics 29
- artificial intelligence 25
- Data mining 24
- Algorithms 23
- Technological innovations 22
- algorithms 22
- Computer networks 19
- methods 18
- Artificial Intelligence 17
- Computer algorithms 17
- Application software 16
- Development 16
- Python (Computer program language) 15
- Social aspects 15
- Big data 14
- Data Mining 14
- Diseases 14
- Research 14
- Information technology 13
- Management 13
- Mathematical optimization 13
- Electronic data processing 12
- Neural networks (Computer science) 12
- Computer simulation 11
- History 11
- Security measures 11
-
201
Function Estimates.
Published 1986Table of Contents: “…Contents -- Preface -- Logspline density estimation -- Statistical encounters with B-splines -- Estimation of a transfer function in a nongaussian context -- Evaluating the performance of an inversion algorithm -- Harmonic splines in geomagnetism -- Problems in estimating the anomalous gravity potential of the earth from discrete data -- What regression model should be chosen when the statistician misspecifies the error distribution? …”
Full text (MFA users only)
Electronic eBook -
202
The silicon jungle : a novel of deception, power, and Internet intrigue
Published 2011Full text (MFA users only)
Electronic eBook -
203
Introduction to graph theory
Published 2009Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
Full text (MFA users only)
Electronic eBook -
204
Conversations on violence : an anthology
Published 2021Table of Contents: “…What Does an Anti-Fascist Life Feel Like? -- Natasha Lennard -- 16. …”
Full text (MFA users only)
Electronic eBook -
205
Artificial Intelligence and Machine Learning Fundamentals : Develop Real-World Applications Powered by the Latest AI Advances.
Published 2018Table of Contents: “…Optimizing the Minmax Algorithm with Alpha-Beta PruningDRYing up the Minmax Algorithm -- The NegaMax Algorithm; Using the EasyAI Library; Activity 4: Connect Four; Summary; Regression; Introduction; Linear Regression with One Variable; What Is Regression?…”
Full text (MFA users only)
Electronic eBook -
206
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
207
Applied data analytics : principles and applications
Published 2020Full text (MFA users only)
Electronic eBook -
208
-
209
Slantwise moves : games, literature, and social invention in nineteenth-century America
Published 2018Full text (MFA users only)
Electronic eBook -
210
-
211
CUDA programming : a developer's guide to parallel computing with GPUs
Published 2013Table of Contents: “…ALGORITHMIC ISSUESFINDING AND AVOIDING ERRORS; DEVELOPING FOR FUTURE GPUS; FURTHER RESOURCES; CONCLUSION; References; Index.…”
Full text (MFA users only)
Electronic eBook -
212
Discovering knowledge in data : an introduction to data mining
Published 2005Full text (MFA users only)
Electronic eBook -
213
Numerical Methods for Eigenvalue Problems.
Published 2012Full text (MFA users only)
Electronic eBook -
214
Eat, cook, grow : mixing human-computer interactions with human-food interactions
Published 2014Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
Full text (MFA users only)
Electronic eBook -
215
Literature and encyclopedism in Enlightenment Britain : the pursuit of complete knowledge
Published 2014Full text (MFA users only)
Electronic eBook -
216
Parallel Computing : Advances and Current Issues, Proceedings of the International Conference Parco2001.
Published 2002Table of Contents: “…Committees ; Preface ; Invited Papers ; Deploying Parallel Numerical Library Routines to Cluster Computing in a Self Adapting Fashion ; 1 Overview ; 2 Numerical libraries in shared homogeneous distributed environments ; 3 Sample software implementation and results.…”
Full text (MFA users only)
Electronic eBook -
217
Optimization of Observation and Control Processes.
Published 2000Table of Contents: “…Optimization of Informational Noise When Observing a Dynamic Object""; ""4.6. Example of Observing a Maneuvering Object""; ""Chapter 5. …”
Full text (MFA users only)
Electronic eBook -
218
Handbook of operations research in natural resources
Published 2007Full text (MFA users only)
Electronic eBook -
219
-
220
Diabetes and cardiovascular disease : a guide to clinical management
Published 2015Full text (MFA users only)
Electronic eBook