Search Results - (((((((anti OR wyant) OR semantic) OR wien) OR cantor) OR anne) OR shape) OR hints) algorithms.

Search alternatives:

  1. 141

    Handbook of Modal Logic. by Blackburn, Patrick

    Published 2006
    Table of Contents: “…13 Quantified Modal Logic13.1 Syntax and Semantics; 13.2 Constant Domain Tableaus; 13.3 Soundness and Completeness; 13.4 Variations; 14 Conclusion; Bibliography; Chapter 3 Complexity of Modal Logic; 1 Introduction; 1.1 Examples of decision problems in modal logic; 1.2 A simple and a hard problem; 1.3 The model checking problem; 1.4 The consequence problem; 1.5 A tiling logic; 2 Decision algorithms; 2.1 Selection of points; 2.2 Filtration; 2.3 Hintikka set elimination; 2.4 Hintikka set elimination without constraints; 2.5 Forcing exponentially deep paths; 2.6 Tree automata; 2.7 Pseudo-models.…”
    Full text (MFA users only)
    Electronic eBook
  2. 142

    Uniqueness questions in reconstruction of multidimensional objects from tomography-type projection data by Golubyatnikov, V. P. (Vladimir P.)

    Published 2000
    Table of Contents: “…Stability estimates for recovering the shapes of convex bodies from the shapes of their projections -- Chapter 3. …”
    Full text (MFA users only)
    Electronic eBook
  3. 143

    Stochastic Models in Reliability Engineering. by Cui, Lirong

    Published 2020
    Table of Contents: “…5.3 Time-Varying Reliability Evaluation Based on MDD -- 5.3.1 The Construction of System MDD -- 5.3.2 System Reliability Evaluation Based on MDD -- 5.4 Numerical Studies -- 5.4.1 Illustrative Example -- 5.4.2 System MDD for the Illustrative Example -- 5.4.3 System Reliability Assessment for the Illustrative Example -- 5.5 Conclusions -- References -- Chapter 6 An Upside-Down Bathtub-Shaped Failure Rate Model Using a DUS Transformation of Lomax Distribution -- 6.1 Introduction -- 6.2 DUS-Lomax Distribution -- 6.3 Shapes -- 6.3.1 Shape of Probability Density Function…”
    Full text (MFA users only)
    Electronic eBook
  4. 144

    Advances in nonlinear waves and symbolic computation by Yan, Zhenya

    Published 2009
    Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
    Full text (MFA users only)
    Electronic eBook
  5. 145

    Biomedical image understanding : methods and applications

    Published 2014
    Table of Contents: “…Venkatesh -- Benchmarking lymph node metastasis classification for gastric cancer staging / Su Zhang, Chao Li, Shuheng Zhang, Lifang Pang and Huan Zhang -- The use of knowledge in biomedical image analysis / Florence Cloppet -- Active shape model for contour detection of anatomical structure / Huiqi Li and Qing Nie.…”
    Full text (MFA users only)
    Electronic eBook
  6. 146

    Differential algebra and related topics - proceedings of the international workshop. by SIT, WILLIAM Y.

    Published 2002
    Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
    Full text (MFA users only)
    Electronic eBook
  7. 147

    Language and logos : studies in theoretical and computational linguistics

    Published 2010
    Table of Contents: “…CONTENTS -- Preface -- Part I Syntax -- A Spurious Genitive Puzzle in Polish -- Semantic Type Effects on Crossing Movement in German -- Me and Chomsky -- On the Typology of Verb Second -- Movement from Verb-Second Clauses Revisited -- Spurious Ambiguities and the Parentheticals Debate -- Part II Semantics -- On Squeamishness of the Royal Kind -- Information Structure of schon -- When- Clauses, Factive Verbs and Correlates -- The Proof Theory of Partial Variables -- Brentano's Apple -- How to Interpret Expletive Negation under bevor in German…”
    Full text (MFA users only)
    Electronic eBook
  8. 148
  9. 149

    Multi-agent machine learning : a reinforcement approach

    Published 2014
    Table of Contents: “…2.12 Eligibility TracesReferences; Chapter 3: Learning in Two-Player Matrix Games; 3.1 Matrix Games; 3.2 Nash Equilibria in Two-Player Matrix Games; 3.3 Linear Programming in Two-Player Zero-Sum Matrix Games; 3.4 The Learning Algorithms; 3.5 Gradient Ascent Algorithm; 3.6 WoLF-IGA Algorithm; 3.7 Policy Hill Climbing (PHC); 3.8 WoLF-PHC Algorithm; 3.9 Decentralized Learning in Matrix Games; 3.10 Learning Automata; 3.11 Linear Reward-Inaction Algorithm; 3.12 Linear Reward-Penalty Algorithm; 3.13 The Lagging Anchor Algorithm; 3.14 L R-I Lagging Anchor Algorithm; References.…”
    Full text (MFA users only)
    Electronic eBook
  10. 150

    Communication System Security.

    Published 2012
    Table of Contents: “…Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. …”
    Full text (MFA users only)
    Electronic eBook
  11. 151

    Radon Transforms and Tomography. by Quinto, Eric Todd

    Published 2001
    Table of Contents: “…Expository Papers -- Local tomography and related problems -- Tomography problems arising in synthetic aperture radar -- Introduction to local tomography -- Algorithms in ultrasound tomography -- Radon transforms, differential equations, and microlocal analysis -- Supplementary bibliography to A bibliographic survey of the Pompeiu problem -- II. …”
    Full text (MFA users only)
    Electronic eBook
  12. 152

    Pervasive Computing in Cognitive Communications Applications. by Ghinea, George

    Published 2021
    Table of Contents: “…Cover -- Guest editorial -- Single-loop sigma delta modulator design and verification for cognitive IoT applications -- Efficient task scheduling on virtual machine in cloud computing environment -- High gain switched beam Yagi-Uda antenna for millimeter wave communications -- PAPR reduction using OQAM for spectrum sensing -- Energy efficiency in cloud data centres using parallel hybrid Jaya algorithm -- Soft computing based audio signal analysis for accident prediction -- Kuznets curve with parabola shaped ultra-wideband antenna with defected ground plane for communications…”
    Full text (MFA users only)
    eBook
  13. 153

    Smart intelligent computing and communication technology

    Published 2021
    Table of Contents: “…Intro -- Title Page -- Preface -- Committees -- Contents -- Evolution of Computing Intelligence -- A Novel Compression Algorithm Based on Bio-Orthogonal Transform and Encoding Methods for Computed Tomography Images -- Performance Analysis of K-Nearest Neighbor Classification Algorithms for Bank Loan Sectors -- An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks -- Identification of Sickle Cells in Erythrocytes Images Using Shape Descriptors -- Impact of Personality Traits on Interpersonal Dependency…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 154
  15. 155

    Advanced Methods and Technologies for Agent and Multi-Agent Systems. by Edited by

    Published 2013
    Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
    Full text (MFA users only)
    Electronic eBook
  16. 156

    Visual Data Mining : The VisMiner Approach. by Anderson, Russell K.

    Published 2012
    Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
    Full text (MFA users only)
    Electronic eBook
  17. 157
  18. 158

    Numerical methods for viscosity solutions and applications

    Published 2001
    Full text (MFA users only)
    Electronic eBook
  19. 159

    DSP with Python Programming. by Charbit, Maurice

    Published 2017
    Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  20. 160

    OpenCV Android Programming By Example. by Muhammad, Amgad

    Published 2015
    Full text (MFA users only)
    Electronic eBook