Search Results - (((((((kant OR canton) OR mantis) OR mind) OR cantor) OR anne) OR shared) OR hints) algorithms.

Search alternatives:

  1. 201

    Better living through economics

    Published 2010
    Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  2. 202

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
    Full text (MFA users only)
    Electronic eBook
  3. 203

    Innovation Manufacturing and Engineering Management : Selected, peer reviewed papers from the International Conference on Innovation Manufacturing and Engineering Management (IMEM)...

    Published 2011
    Table of Contents: “…Application of DNA Genetic Algorithm in Manufacturing System Scheduling OptimizationSoft-Sensor for Estimation of Lead Slices Thickness in Continuous Casting Process; Hydrodynamic Mathematical Modeling of the Yangshan Deep-Water Harbor Waters, China; Multidisciplinary Design Method Taking Traditional Manufacturing Factors into Account; Research on the Seed-Fertilizer Box for a Ridge-Till and No-Till Seeder; Research on the Investment Decision-Making on the Application of Advanced Manufacturing Technologies in Enterprises; Zigbee-Based Data Acquisition System for Manufacturing…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 204

    Mechanical, Electronic and Information Technology Engineering

    Published 2015
    Table of Contents: “…An Approach for the Implementation of Intelligent PID Controller Based on Fast Genetic Algorithm; Research of Large Erecting Control System Based on Fuzzy PID Control Algorithm; An Investigation of Undulating Shape Adaptation Characteristics of a Hydraulic-Driven Bionic Undulating Robot; Wireless Monitoring and Controlling Marine Navigation Parameters; Research on PCS Real-Time System Based on Integrated Control and Simulation; Rapid Design of DC Motor Speed Control System Based on MATLAB.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  5. 205

    The Failure of Risk Management : Why It's Broken and How to Fix It. by Hubbard, Douglas W.

    Published 2020
    Table of Contents: “…: WHY AMBIGUITY DOES NOT OFFSET UNCERTAINTY -- UNINTENDED EFFECTS OF SCALES: WHAT YOU DON'T KNOW CAN HURT YOU -- DIFFERENT BUT SIMILAR-SOUNDING METHODS AND SIMILAR BUT DIFFERENT-SOUNDING METHODS -- NOTES -- CHAPTER 9: Bears, Swans and Other Obstacles to Improved Risk Management -- ALGORITHM AVERSION AND A KEY FALLACY -- ALGORITHMS VERSUS EXPERTS: GENERALIZING THE FINDINGS -- A NOTE ABOUT BLACK SWANS…”
    Full text (MFA users only)
    Electronic eBook
  6. 206

    Advanced Analytics with R and Tableau. by Stirrup, Jen

    Published 2016
    Table of Contents: “…; How to do Clustering in Tableau; Creating Clusters; Clustering example in Tableau; Creating a Tableau group from cluster results; Constraints on saving Clusters; Interpreting your results; How Clustering Works in Tableau; The clustering algorithm; Scaling; Clustering without using k-means; Hierarchical modeling; Statistics for Clustering; Describing Clusters -- Summary tab; Testing your Clustering.…”
    Full text (MFA users only)
    Electronic eBook
  7. 207

    Towards 5G : Applications, Requirements and Candidate Technologies. by Vannithamby, Rath

    Published 2016
    Table of Contents: “…4.5.4 A System View of€Interference Management: Radio Circuits, PHY€Mechanisms, and€Protocol Designs4.5.5 Dynamic Cloud Services Spectrum Sharing Algorithms and€Mechanisms for€B4G Networks; 4.5.6 Fundamentals of Spectrum Sharing in Device-to-Device and Heterogeneous Communication Networks ; 4.5.7 Structured Sharing of€Network and€Compute Resources in€a€Community of€Devices; 4.5.8 A Unified Framework for Enabling Energy-efficient Mobile Internet Apps and Energy-efficient Cloud Offloading ; References; Part II Candidate Technologies -- Evolutionary ; Chapter 5 Towards Green and Soft.…”
    Full text (MFA users only)
    Electronic eBook
  8. 208

    Information Networking in Asia

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  9. 209

    Lead generation for dummies by Rothman, Dayna

    Published 2014
    Table of Contents: “…Creating an Internal Blogging ProgramChapter 9: Creating Lasting Relationships Through Social Media; Sharing on Social Media; Getting the Most out of Facebook; Leveraging Twitter; Engaging Through LinkedIn; Building Your Google+ Presence; Getting Visual with Pinterest; Attracting Attention with SlideShare; Chapter 10: Getting Found Through Search Engine Optimization; Maximizing Different Traffic Sources; Knowing Your Search Engines; Making the Most out of Google Algorithm Updates; Choosing Your Keywords; Perfecting On-Page SEO; Utilizing Links in a Natural Way.…”
    Full text (MFA users only)
    Electronic eBook
  10. 210

    Topology '90

    Published 1992
    Table of Contents: “…(p-1)/2Tangles in Prisms, Tangles in Cobordisms -- A Computational Algorithm of Spectral Flow in Floer Homology…”
    Full text (MFA users only)
    Electronic eBook
  11. 211

    Global optimization methods in geophysical inversion by Sen, Mrinal K.

    Published 2013
    Table of Contents: “…5.6 Multimodal fitness functions, genetic drift, GA with sharing, and repeat (parallel) GA -- 5.7 Uncertainty estimates -- 5.8 Evolutionary programming -- a variant of GA -- 5.9 Summary -- 6 Other stochastic optimization methods -- 6.1 The neighborhood algorithm (NA) -- 6.1.1 Voronoi diagrams -- 6.1.2 Voronoi diagrams in SA and GA -- 6.1.3 Neighborhood sampling algorithm -- 6.2 Particle swarm optimization (PSO) -- 6.3 Simultaneous perturbation stochastic approximation (SPSA) -- 7 Geophysical applications of simulated annealing and genetic algorithms -- 7.1 1D seismic waveform inversion -- 7.1.1 Application of heat bath SA -- 7.1.2 Application of GAs -- 7.1.3 Real-data examples -- 7.1.4 Hybrid GA/LI inversion using different measures of fitness -- 7.1.5 Hybrid VFSA inversion using different strategies -- 7.2 Prestack migration velocity estimation -- 7.2.1 1D earth structure -- 7.2.2 2D earth structure -- 7.2.3 Multiple and simultaneous VFSA for imaging -- 7.3 Inversion of resistivity sounding data for 1D earth models -- 7.3.1 Exact parameterization -- 7.3.2 Overparameterization with smoothing -- 7.4 Inversion of resistivity profiling data for 2D earth models -- 7.4.1 Inversion of synthetic data -- 7.4.2 Inversion of field data -- 7.5 Inversion of magnetotelluric sounding data for 1D earth models -- 7.6 Stochastic reservoir modeling -- 7.7 Seismic deconvolution by mean field annealing (MFA) and Hopfield network -- 7.7.1 Synthetic example -- 7.7.2 Real-data example -- 7.8 Joint inversion -- 7.8.1 Joint travel time and gravity inversion -- 7.8.2 Time-lapse (4D) seismic and well production joint inversion -- 8 Uncertainty estimation -- 8.1 Methods of numerical integration -- 8.1.1 Grid search or enumeration -- 8.1.2 Monte Carlo integration -- 8.1.3 Importance sampling -- 8.1.4 Multiple MAP estimation -- 8.2 Simulated annealing: the Gibbs sampler.…”
    Full text (MFA users only)
    Electronic eBook
  12. 212

    Limits, Limits Everywhere : the Tools of Mathematical Analysis by Applebaum, David, 1956-

    Published 2012
    Table of Contents: “…Continued Fractions; 9.1 Euclid's Algorithm; 9.2 Rational and Irrational Numbers as Continued Fractions; 10. …”
    Full text (MFA users only)
    Electronic eBook
  13. 213

    Legitimate applications of peer to peer networks by Verma, Dinesh C.

    Published 2004
    Table of Contents: “…-- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir.…”
    Full text (MFA users only)
    Electronic eBook
  14. 214
  15. 215

    The cinema of sensations

    Published 2015
    Table of Contents: “…I Perception, Body and Mind -- Thinking like a Carpet: Embodied Perception and Individuation in Algorithmic Media / Laura U. …”
    Full text (MFA users only)
    Electronic eBook
  16. 216

    Microbiological sensors for the drinking water industry

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  17. 217

    The marketing performance blueprint : strategies and technologies to build and measure business success by Roetzer, Paul, 1978-

    Published 2014
    Table of Contents: “…Title Page; Copyright; Dedication; Foreword; Acknowledgments; Introduction; Underprepared and Underperforming; Build a Performance-Driven Organization; Accelerate Success; Note; Section I: The Backstory; Chapter 1: Mind the Gaps; The Marketing Talent Gap; The Marketing Technology Gap; The Marketing Strategy Gap; The Marketing Performance Gap; Notes; Chapter 2: Commit to Digital Transformation; Adoption and Adaptation; Obstacles to Evolution; The Exposed Brand; Notes; Section II: Marketing Talent; Chapter 3: Build a Modern Marketing Team; A Talent War Has Begun; Rise of the Hybrids.…”
    Full text (MFA users only)
    Electronic eBook
  18. 218
  19. 219

    Combinatorial and Computational Mathematics : Present and Future.

    Published 2001
    Table of Contents: “…2 LIST OF APPLICABLE MATHEMATICS IN SOCIAL SCIENCE3 SOCIAL WELFARE FUNCTIONS (SWF); 4 PROSPECTS; 5 OPEN PROBLEMS; References; Twelve Views of Matroid Theory; INTRODUCTION; 1 LINEAR DEPENDENCE WITHOUT SCALARS; 2 BASIS EXCHANGE PROPERTIES; 3 GEOMETRIC LATTICES; 4 GRAPH THEORY WITHOUT VERTICES; 5 GRAPH THEORY AND LEAN LINEAR ALGEBRA; 6 VARIETIES OF FINITE MATROIDS; 7 SECRET-SHARING MATROIDS; 8 GREEDY ALGORITHMS, MATROID INTERSECTION, AND MATROID PARTITION; 9 MATRIX MULTIPLICATION AND THE CAUCHY-BINET IDENTITY; 10 BASIS GENERATING FUNCTIONS AND THE MATRIX-TREE THEOREM…”
    Full text (MFA users only)
    Electronic eBook
  20. 220

    Entity information life cycle for big data : master data management and information integration by Talburt, John R., Zhou, Yinle, 1986-

    Published 2015
    Table of Contents: “…CLUSTER-TO-CLUSTER CLASSIFICATIONSELECTING AN APPROPRIATE ALGORITHM; CONCLUDING REMARKS; Chapter 9 -- Blocking; BLOCKING; BLOCKING BY MATCH KEY; DYNAMIC BLOCKING VERSUS PRERESOLUTION BLOCKING; BLOCKING PRECISION AND RECALL; MATCH KEY BLOCKING FOR BOOLEAN RULES; MATCH KEY BLOCKING FOR SCORING RULES; CONCLUDING REMARKS; Chapter 10 -- CSRUD for Big Data; LARGE-SCALE ER FOR MDM; THE TRANSITIVE CLOSURE PROBLEM; DISTRIBUTED, MULTIPLE-INDEX, RECORD-BASED RESOLUTION; AN ITERATIVE, NONRECURSIVE ALGORITHM FOR TRANSITIVE CLOSURE; ITERATION PHASE: SUCCESSIVE CLOSURE BY REFERENCE IDENTIFIER.…”
    Full text (MFA users only)
    Electronic eBook