Search Results - (((((((anti OR wyant) OR semantic) OR wien) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 36
- Data processing 29
- Mathematics 23
- Mathematical models 20
- Technological innovations 19
- Machine learning 18
- Data mining 17
- Algorithms 16
- artificial intelligence 15
- Computer science 14
- algorithms 14
- Management 13
- Computer networks 12
- Big data 11
- Information technology 11
- Computer algorithms 10
- Artificial Intelligence 9
- Diseases 9
- Social aspects 9
- methods 9
- Automatic control 8
- Computational linguistics 8
- Materials 8
- Neural networks (Computer science) 8
- Research 8
- Computer security 7
- Data Mining 7
- Development 7
- Logic, Symbolic and mathematical 7
- Political aspects 7
Search alternatives:
- wyant »
- wien »
- share »
-
101
Analytical modeling of wireless communication systems
Published 2016Table of Contents: “…Safety Message Broadcasting -- Modeling Information Sharing -- Cellular Networks. Multi-RAT Algorithms.…”
Full text (MFA users only)
Electronic eBook -
102
What intelligence tests miss : the psychology of rational thought
Published 2009Table of Contents: “…Inside George W. Bush's mind : hints at what IQ tests miss -- Dysrationalia : separating rationality and intelligence -- The reflective mind, the algorithmic mind, and the autonomous mind -- Cutting intelligence down to size -- Why intelligent people doing foolish things is no surprise -- The cognitive miser : ways to avoid thinking -- Framing and the cognitive miser -- Myside processing : heads I win, tails I win too! …”
Full text (MFA users only)
Electronic eBook -
103
Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence.
Published 2002Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
Full text (MFA users only)
Electronic eBook -
104
Handbook of Mathematical Induction.
Published 2014Table of Contents: “…Chapter 14: Logic and languageChapter 15: Graphs; Chapter 16: Recursion and algorithms; Chapter 17: Games and recreations; Chapter 18: Relations and functions; Chapter 19: Linear and abstract algebra; Chapter 20: Geometry; Chapter 21: Ramsey theory; Chapter 22: Probability and statistics; Part III: Solutions and hints to exercises; Chapter 23: Solutions: Foundations; Chapter 24: Solutions: Inductive techniques applied to the infinite; Chapter 25: Solutions: Paradoxes and sophisms; Chapter 26: Solutions: Empirical induction; Chapter 27: Solutions: Identities.…”
Full text (MFA users only)
Electronic eBook -
105
Applications of digital signal processing to audio and acoustics
Published 2002Full text (MFA users only)
Electronic eBook -
106
Artificial intelligence : approaches, tools, and applications
Published 2011Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
Full text (MFA users only)
Electronic eBook -
107
Computational Systems Bioinformatics (Volume 6) : Proceedings of the CSB 2007 Conference.
Published 2007Table of Contents: “…INTRODUCTION; Preprocessing to remove noisy peaks; The anti-symmetric problem; 2. ANALYSIS OF PROBLEMS AND CURRENT ALGORITHMS; 2.1. …”
Full text (MFA users only)
Electronic eBook -
108
Cybernetic intelligent systems
Published 2014Table of Contents: “…Cover ; Editorial advisory board ; Editorial ; Guest editorial ; HDR imaging for feature tracking in challenging visibility scenes ; A new classification strategy for human activity recognition using cost sensitive support vector machines for imbalanced data ; Coarticulation and speech synchronization in MPEG-4 based facial animation ; Semantic Category theory and Semantic Intertwine: the anathema of mathematics ; Tracking progress of African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method.…”
Full text (MFA users only)
Electronic eBook -
109
Text mining : applications and theory
Published 2010Table of Contents: “…Automatic Keyword Extraction from Individual Documents / Stuart Rose, Dave Engel, Nick Cramer, Wendy Cowley -- Algebraic Techniques for Multilingual Document Clustering / Brett W Bader, Peter A Chew -- Content-Based Spam Email Classification using Machine-Learning Algorithms / Eric P Jiang -- Utilizing Nonnegative Matrix Factorization for Email Classification Problems / Andreas G K Janecek, Wilfried N Gansterer -- Constrained Clustering with -means Type Algorithms / Ziqiu Su, Jacob Kogan, Charles Nicholas -- Anomaly and Trend Detection. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
110
Advances in scalable web information integration and service : proceedings of DASFAA2007, Bangkok, Thailand, 9-12 April 2007
Published 2007Table of Contents: “…Invited session. Using semantics in XML data management / Tok Wang Ling and Gillian Dobbie. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
111
Information modelling and knowledge bases XXX
Published 2019Table of Contents: “…Intro; Title Page; Preface; Committees; Contents; Goal-Oriented Adaptive and Extensible Study-Process Creation with Optimal Cyclic-Learning in Graph-Structured Knowledge; A Process Calculus for Design and Modeling of Retro-Synthesis; The Discrete-Event Approach to Simulate Stochastic Multi-Product (r, Q) Inventory Control Systems; A Semantic Orthogonal Mapping Method Through Deep-Learning for Semantic Computing; Cultures in Information Systems Development; Clutter Reduction in Parallel Coordinates Using Aesthetic Criteria; Toward Manageable Data Sources…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
112
Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...
Published 2014Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
113
Introduction to identity-based encryption
Published 2008Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
Full text (MFA users only)
Electronic eBook -
114
Advanced Artificial Intelligence.
Published 2011Table of Contents: “…Applications of temporal and spatial logic; 4.7.4. Randell algorithm; Exercises; Chapter 5 Case-Based Reasoning; 5.1 Overview; 5.2 Basic Notations; 5.3 Process Model; 5.4 Case Representation; 5.4.1 Semantic Memory Unit; 5.4.2 Memory Network; 5.5 Case Indexing; 5.6 Case Retrieval; 5.7 Similarity Relations in CBR; 5.7.1 Semantic similarity; 5.7.2 Structural similarity; 5.7.3 Goal's features; 5.7.4 Individual similarity; 5.7.5 Similarity assessment; 5.8 Case Reuse; 5.9 Case Retainion; 5.10 Instance-Based Learning.…”
Full text (MFA users only)
Electronic eBook -
115
Emerging engineering approaches and applications : selected, peer reviewed papers from the 2011 International Conference on Information Engineering for Mechanics and Materials, Aug...
Published 2011Table of Contents: “…A Hierarchical Structure of Service-Oriented Manufacturing ModeStudy of Combination Algorithm in Partitioning Manufacture Technology; The Machinability of MAR-M247 Superalloy; Chapter 3: Computational Methods for Engineering; The BP Network Classification Leafminer-Infected Leaves Based on the Fractal Dimension; An Evaluation Survey of Score Normalization in Multibiometric Systems; Non-Line-of-Sight Error Mitigation in Wireless Communication Systems; Information Delay Protocol Using Non-Orthogonal Quantum States; A New Algorithm of Image Encryption Based on 3D Arnold Cat…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
116
Advances in Mechatronics and Control Engineering III : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Mechatronics and Control Engineering (ICMCE 2014...
Published 2014Table of Contents: “…Advances in Mechatronics and Control Engineering III; Preface and Conference Organization; Table of Contents; Chapter 1: Artificial Intelligence, Algorithms and Computation Methods; A New Random Encryption Algorithm for Character Type Cipher; Exploiting Thread-Level Parallelism Based on Balancing Load for Speculative Multithreading; FNMF-ITWC Algorithm Applied to the Cancer Gene Expression Data; Fuzzy Set Based Clustering Algorithm of Web Text; MIMU Parameter Identification for Large Misalignment Angles Based on AFSA; Reduction of Risk Control Indicators of ERP System Based on Rough Set.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
117
Digital journalism, drones, and automation : the language and abstractions behind the news
Published 2020Full text (MFA users only)
Electronic eBook -
118
-
119
FRBR, before and after : a look at our bibliographic models
Published 2016Full text (MFA users only)
Electronic eBook -
120
Papers from the first European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights '06)
Published 2007Table of Contents: “…Cover; CONTENTS; EDITORIAL ADVISORY BOARD; The digital information war; Complementing DRM with digital watermarking: mark, search, retrieve; A class of non-linear asymptotic fingerprinting codes with 1-error; Verification algorithms for governed use of multimedia content; Toward semantics-aware management of intellectual property rights; DRM, law and technology: an American perspective; Clustering search results. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook