Search Results - (((((((kant OR canton) OR ken) OR arte) OR cantor) OR anne) OR carter) OR canton) algorithms.

Refine Results
  1. 1
  2. 2

    How to guard an art gallery and other discrete mathematical adventures by Michael, T. S., 1960-

    Published 2009
    Table of Contents: “…s Formula: Second Proof -- 2.8 Batting Averages and Lattice Points -- 2.9 Three Dimensions and N-largements -- 2.10 Notes and References -- 2.11 Problems -- 3 How to Guard an Art Gallery -- 3.1 The Sunflower Art Gallery -- 3.2 Art Gallery Problems -- 3.3 The Art Gallery Theorem -- 3.4 Colorful Consequences -- 3.5 Triangular and Chromatic Assumptions -- 3.6 Modern Art Galleries -- 3.7 Art Gallery Sketches -- 3.8 Right-Angled Art Galleries -- 3.9 Guarding the Guards -- 3.10 Three Dimensions and the Octoplex…”
    Full text (MFA users only)
    Electronic eBook
  3. 3
  4. 4
  5. 5

    The Human Algorithm by Solis, Brian

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  6. 6
  7. 7

    Open Data Structures : an Introduction. by Morin, Pat

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  8. 8
  9. 9

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  10. 10
  11. 11

    Entangled political economy

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  12. 12
  13. 13

    Genome Sequencing Technology and Algorithms. by Kim, Sun

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  14. 14

    Graph algorithms and applications 3

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  15. 15

    Metaheuristic optimization for the design of automatic control laws by Sandou, Guillaume

    Published 2013
    Table of Contents: “…Motivations to use metaheuristic algorithms -- 1.3. Organization of the book -- Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  16. 16
  17. 17

    Algorithms, architectures and information systems security

    Published 2009
    Table of Contents: “…Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T.K. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 18
  19. 19
  20. 20