Search Results - (((((((anti OR wyant) OR semantic) OR wien) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 101

    Analytical modeling of wireless communication systems by Chiasserini, C. F. (Carla-Fabiani), Gribaudo, Marco, 1972-, Manini, Daniele

    Published 2016
    Table of Contents: “…Safety Message Broadcasting -- Modeling Information Sharing -- Cellular Networks. Multi-RAT Algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  2. 102

    What intelligence tests miss : the psychology of rational thought by Stanovich, Keith E., 1950-

    Published 2009
    Table of Contents: “…Inside George W. Bush's mind : hints at what IQ tests miss -- Dysrationalia : separating rationality and intelligence -- The reflective mind, the algorithmic mind, and the autonomous mind -- Cutting intelligence down to size -- Why intelligent people doing foolish things is no surprise -- The cognitive miser : ways to avoid thinking -- Framing and the cognitive miser -- Myside processing : heads I win, tails I win too! …”
    Full text (MFA users only)
    Electronic eBook
  3. 103

    Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence. by Kvasnicka, V.

    Published 2002
    Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
    Full text (MFA users only)
    Electronic eBook
  4. 104

    Handbook of Mathematical Induction. by Gunderson, David S.

    Published 2014
    Table of Contents: “…Chapter 14: Logic and languageChapter 15: Graphs; Chapter 16: Recursion and algorithms; Chapter 17: Games and recreations; Chapter 18: Relations and functions; Chapter 19: Linear and abstract algebra; Chapter 20: Geometry; Chapter 21: Ramsey theory; Chapter 22: Probability and statistics; Part III: Solutions and hints to exercises; Chapter 23: Solutions: Foundations; Chapter 24: Solutions: Inductive techniques applied to the infinite; Chapter 25: Solutions: Paradoxes and sophisms; Chapter 26: Solutions: Empirical induction; Chapter 27: Solutions: Identities.…”
    Full text (MFA users only)
    Electronic eBook
  5. 105
  6. 106

    Artificial intelligence : approaches, tools, and applications

    Published 2011
    Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
    Full text (MFA users only)
    Electronic eBook
  7. 107

    Computational Systems Bioinformatics (Volume 6) : Proceedings of the CSB 2007 Conference. by Markstein, Peter

    Published 2007
    Table of Contents: “…INTRODUCTION; Preprocessing to remove noisy peaks; The anti-symmetric problem; 2. ANALYSIS OF PROBLEMS AND CURRENT ALGORITHMS; 2.1. …”
    Full text (MFA users only)
    Electronic eBook
  8. 108

    Cybernetic intelligent systems

    Published 2014
    Table of Contents: “…Cover ; Editorial advisory board ; Editorial ; Guest editorial ; HDR imaging for feature tracking in challenging visibility scenes ; A new classification strategy for human activity recognition using cost sensitive support vector machines for imbalanced data ; Coarticulation and speech synchronization in MPEG-4 based facial animation ; Semantic Category theory and Semantic Intertwine: the anathema of mathematics ; Tracking progress of African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method.…”
    Full text (MFA users only)
    Electronic eBook
  9. 109

    Text mining : applications and theory

    Published 2010
    Table of Contents: “…Automatic Keyword Extraction from Individual Documents / Stuart Rose, Dave Engel, Nick Cramer, Wendy Cowley -- Algebraic Techniques for Multilingual Document Clustering / Brett W Bader, Peter A Chew -- Content-Based Spam Email Classification using Machine-Learning Algorithms / Eric P Jiang -- Utilizing Nonnegative Matrix Factorization for Email Classification Problems / Andreas G K Janecek, Wilfried N Gansterer -- Constrained Clustering with -means Type Algorithms / Ziqiu Su, Jacob Kogan, Charles Nicholas -- Anomaly and Trend Detection. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 110

    Advances in scalable web information integration and service : proceedings of DASFAA2007, Bangkok, Thailand, 9-12 April 2007

    Published 2007
    Table of Contents: “…Invited session. Using semantics in XML data management / Tok Wang Ling and Gillian Dobbie. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  11. 111

    Information modelling and knowledge bases XXX

    Published 2019
    Table of Contents: “…Intro; Title Page; Preface; Committees; Contents; Goal-Oriented Adaptive and Extensible Study-Process Creation with Optimal Cyclic-Learning in Graph-Structured Knowledge; A Process Calculus for Design and Modeling of Retro-Synthesis; The Discrete-Event Approach to Simulate Stochastic Multi-Product (r, Q) Inventory Control Systems; A Semantic Orthogonal Mapping Method Through Deep-Learning for Semantic Computing; Cultures in Information Systems Development; Clutter Reduction in Parallel Coordinates Using Aesthetic Criteria; Toward Manageable Data Sources…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  12. 112

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 113

    Introduction to identity-based encryption by Martin, Luther

    Published 2008
    Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
    Full text (MFA users only)
    Electronic eBook
  14. 114

    Advanced Artificial Intelligence.

    Published 2011
    Table of Contents: “…Applications of temporal and spatial logic; 4.7.4. Randell algorithm; Exercises; Chapter 5 Case-Based Reasoning; 5.1 Overview; 5.2 Basic Notations; 5.3 Process Model; 5.4 Case Representation; 5.4.1 Semantic Memory Unit; 5.4.2 Memory Network; 5.5 Case Indexing; 5.6 Case Retrieval; 5.7 Similarity Relations in CBR; 5.7.1 Semantic similarity; 5.7.2 Structural similarity; 5.7.3 Goal's features; 5.7.4 Individual similarity; 5.7.5 Similarity assessment; 5.8 Case Reuse; 5.9 Case Retainion; 5.10 Instance-Based Learning.…”
    Full text (MFA users only)
    Electronic eBook
  15. 115

    Emerging engineering approaches and applications : selected, peer reviewed papers from the 2011 International Conference on Information Engineering for Mechanics and Materials, Aug...

    Published 2011
    Table of Contents: “…A Hierarchical Structure of Service-Oriented Manufacturing ModeStudy of Combination Algorithm in Partitioning Manufacture Technology; The Machinability of MAR-M247 Superalloy; Chapter 3: Computational Methods for Engineering; The BP Network Classification Leafminer-Infected Leaves Based on the Fractal Dimension; An Evaluation Survey of Score Normalization in Multibiometric Systems; Non-Line-of-Sight Error Mitigation in Wireless Communication Systems; Information Delay Protocol Using Non-Orthogonal Quantum States; A New Algorithm of Image Encryption Based on 3D Arnold Cat…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 116

    Advances in Mechatronics and Control Engineering III : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Mechatronics and Control Engineering (ICMCE 2014...

    Published 2014
    Table of Contents: “…Advances in Mechatronics and Control Engineering III; Preface and Conference Organization; Table of Contents; Chapter 1: Artificial Intelligence, Algorithms and Computation Methods; A New Random Encryption Algorithm for Character Type Cipher; Exploiting Thread-Level Parallelism Based on Balancing Load for Speculative Multithreading; FNMF-ITWC Algorithm Applied to the Cancer Gene Expression Data; Fuzzy Set Based Clustering Algorithm of Web Text; MIMU Parameter Identification for Large Misalignment Angles Based on AFSA; Reduction of Risk Control Indicators of ERP System Based on Rough Set.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 117
  18. 118

    Knowledge-based Intelligent System. by Jang, Hyejung

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  19. 119
  20. 120

    Papers from the first European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights '06)

    Published 2007
    Table of Contents: “…Cover; CONTENTS; EDITORIAL ADVISORY BOARD; The digital information war; Complementing DRM with digital watermarking: mark, search, retrieve; A class of non-linear asymptotic fingerprinting codes with 1-error; Verification algorithms for governed use of multimedia content; Toward semantics-aware management of intellectual property rights; DRM, law and technology: an American perspective; Clustering search results. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook