Search Results - (((((((kant OR kkants) OR wanti) OR make) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 62
- Artificial intelligence 56
- Mathematical models 53
- Machine learning 52
- Mathematics 43
- Decision making 38
- Data mining 33
- artificial intelligence 32
- Algorithms 29
- algorithms 28
- Technological innovations 25
- Python (Computer program language) 23
- Social aspects 21
- Computer algorithms 20
- methods 20
- Artificial Intelligence 19
- Computer networks 19
- Mathematical optimization 19
- Big data 18
- decision making 18
- Application software 17
- Data Mining 16
- Development 16
- Management 16
- Information technology 15
- Decision Making 14
- Neural networks (Computer science) 14
- Research 13
- Diseases 12
- Machine Learning 12
Search alternatives:
-
1
Obstetric clinical algorithms : management and evidence
Published 2010Subjects: “…Obstetrics Decision making.…”
Full text (MFA users only)
Electronic eBook -
2
Making Surveillance Public : Why You Should Be More Woke about AI and Algorithms.
Published 2024Full text (MFA users only)
Electronic eBook -
3
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
4
Theory and Algorithms for Cooperative Systems.
Published 2004Full text (MFA users only)
Electronic eBook -
5
-
6
Algorithmic Puzzles.
Published 2011Table of Contents: “…-- General strategies for algorithm design -- Analysis techniques -- Easier puzzles (#1 to #50) -- Puzzles of medium difficulty (#51 to #110) -- Harder puzzles (#111 to #150) -- Hints -- Solutions -- References -- Design stragety and analysis index.…”
Full text (MFA users only)
Electronic eBook -
7
Algorithms for Dummies.
Published 2022Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Algorithms -- Chapter 1 Introducing Algorithms -- Describing Algorithms -- The right way to make toast: Defining algorithm uses -- Finding algorithms everywhere -- Using Computers to Solve Problems -- Getting the most out of modern CPUs and GPUs -- Working with special-purpose chips -- Networks: Sharing is more than caring -- Leveraging available data…”
Full text (MFA users only)
Electronic eBook -
8
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
9
-
10
-
11
-
12
-
13
-
14
Algorithms for worst-case design and applications to risk management
Published 2002Full text (MFA users only)
Electronic eBook -
15
Handbook of Satisfiability : Handbook of Satisfiability.
Published 2009Subjects: “…Decision making Congresses.…”
Full text (MFA users only)
Electronic eBook -
16
Introduction to cryptography
Published 2018Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
Full text (MFA users only)
Electronic eBook -
17
Systematic Trading : a Practical Guide to Algorithmic Investment Strategies
Published 2016Full text (MFA users only)
Electronic eBook -
18
The Sharing Economy : Implications for the Future of Hospitality and Tourism.
Published 2017Table of Contents: “…Chaos and complexity in tourismStudy tenets -- The sharing economy and tourism -- Peer-to-peer accommodation in Greece -- Methods -- Participants -- Sample determination and collection -- Measures -- Implementation of fuzzy-set qualitative comparative analysis algorithms -- Results -- Sufficient complex statements -- Discussion -- Confirmation of tenets -- Fuzzy-set qualitative comparative analysis versus regression and Cramerâ#x80;#x99;s V -- Fit and predictive validity -- Managerial implications -- Limitations and future research -- References…”
Full text (MFA users only)
Electronic eBook -
19
We are data : algorithms and the making of our digital selves /
Published 2017Table of Contents: “…Introduction -- Categorization: making data useful -- Control: algorithm is gonna get you -- Subjectivity: who do they think you are? …”
Full text (MFA users only)
Electronic eBook -
20