Search Results - (((((((kant OR semantic) OR wantis) OR abantu) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 161

    International e-Conference of Computer Science 2006

    Published 2007
    Table of Contents: “…A Computational Algorithm to Obtain the Law of the Solvable Lie Algebra of n x n Upper-Triangular MatricesWeb Data Extraction using Semantic Generators -- Integrity-Enhanced Improvements for ISO 9001 registeredOrganizations -- A Ghost Bit Based Finite Field Arithmetic for FPGAs -- A Scalable Finite Field Multiplier with Interleaving Reduction -- Intelligent Tutoring Systems and Convex Geometries -- Towards Operational Content Infrastructure -- A Computational Fusion of Wavelets and Neural Networks in a Classifier for Biomedical Applications…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 162

    STAIRS 2010 : Proceedings of the Fifth Starting AI Researchers' Symposium. by Ågotnes, Thomas

    Published 2010
    Table of Contents: “…; Generative Structure Learning for Markov Logic Networks; Learning Fuzzy Models of User Interests in a Semantic Information Retrieval System; Ontology-Based Document and Query Representation May Improve the Effectiveness of Information Retrieval.…”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Parallel Computing : Advances and Current Issues, Proceedings of the International Conference Parco2001. by Joubert, G. R.

    Published 2002
    Table of Contents: “…Committees ; Preface ; Invited Papers ; Deploying Parallel Numerical Library Routines to Cluster Computing in a Self Adapting Fashion ; 1 Overview ; 2 Numerical libraries in shared homogeneous distributed environments ; 3 Sample software implementation and results.…”
    Full text (MFA users only)
    Electronic eBook
  4. 164

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  5. 165

    Logic and Discrete Mathematics : A Concise Introduction, Solutions Manual. by Conradie, Willem

    Published 2015
    Table of Contents: “…Valid and invalid propositional inferences -- 3.3 Semantic tableaux -- 3.4 Logical equivalences. Negating propositional formulae -- 3.5 Normal forms. …”
    Full text (MFA users only)
    Electronic eBook
  6. 166

    Logic and Discrete Mathematics : A Concise Introduction. by Conradie, Willem

    Published 2015
    Table of Contents: “…Valid and invalid propositional inferences -- 3.3 The concept and use of deductive systems -- 3.4 Semantic tableaux -- 3.5 Logical equivalences. Negating propositional formulae -- 3.6 Normal forms. …”
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Anaphora Resolution. by Mitkov, Ruslan

    Published 2014
    Table of Contents: “…2.1.2 Syntactic knowledge2.1.3 Semantic knowledge; 2.1.4 Discourse knowledge; 2.1.5 Real-world (common-sense) knowledge; 2.2 Anaphora resolution in practice; 2.2.1 Identification of anaphors; 2.2.1.1 Identification of anaphoric pronouns; 2.2.1.2 Identification of anaphoric noun phrases; 2.2.1.3 Tools and resources for the identification of anaphors; 2.2.2 Location of the candidates for antecedents; 2.2.2.1 The search scope of candidates for antecedent; 2.2.2.2 Tools and resources needed for the location of potential candidates; 2.2.3 The resolution algorithm: factors in anaphora resolution.…”
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Enterprise AI for Dummies. by Jarvinen, Zachary

    Published 2020
    Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Strong, Weak, General, and Narrow -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Exploring Practical AI and How It Works -- Chapter 1 Demystifying Artificial Intelligence -- Understanding the Demand for AI -- Converting big data into actionable information -- Relieving global cost pressure -- Accelerating product development and delivery -- Facilitating mass customization -- Identifying the Enabling Technology -- Processing -- Algorithms…”
    Full text (MFA users only)
    Electronic eBook
  9. 169

    Recent Advances in Natural Language Processing : Selected Papers from RANLP'95

    Published 1997
    Table of Contents: “…An augmented Earley algorithm for repair; 5.1 String representations; 5.2 Augmentations to the standard algorithm; 5.3 The augmented algorithm; 5.4 Remarks; 6 Conclusion; REFERENCES; Parsing for Targeted Errors in Controlled Languages; Abstract; 1. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 170

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook
  11. 171

    R High Performance Programming. by Lim, Aloysius

    Published 2015
    Table of Contents: “…Data parallelism versus task parallelismImplementing data parallel algorithms; Implementing task parallel algorithms; Running the same task on workers in a cluster; Running different tasks on workers in a cluster; Executing tasks in parallel on a cluster of computers; Shared memory versus distributed memory parallelism; Optimizing parallel performance; Summary; Chapter 9: Offloading Data Processing to Database Systems; Extracting data into R versus processing data in a database; Preprocessing data in a relational database using SQL; Converting R expressions into SQL; Using dplyr…”
    Full text (MFA users only)
    Electronic eBook
  12. 172

    Integrated and collaborative product development environment : technologies and implementations by Li, W. D.

    Published 2006
    Table of Contents: “…Intelligent Optimisation of Process Planning; 5.1 Intelligent Optimisation Strategies for CAPP Systems; 5.2 Knowledge Representation of Process Plans; 5.2.1 Process plan representation; 5.2.2 Machining cost criteria for process plans; 5.2.3 Precedence constraints; 5.3 A Hybrid GA/SA-based Optimisation Method; 5.3.1 Overview of the algorithm; 5.3.2 Genetic algorithm -- phase 1; 5.3.3 Simulated annealing algorithm -- phase 2; 5.3.4 Constraint handling algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  13. 173

    Revolutionary routines : the habits of social transformation by Pedwell, Carolyn

    Published 2021
    Full text (MFA users only)
    Electronic eBook
  14. 174

    Tales of Literacy for the 21st Century : the Literary Agenda. by Wolf, Maryanne

    Published 2016
    Table of Contents: “…; Deep reading and what comes next; A first algorithm for what comes next; Notes; 7: A Tale of Hope for Non-Literate Children.…”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    Emerging engineering approaches and applications : selected, peer reviewed papers from the 2011 International Conference on Information Engineering for Mechanics and Materials, Aug...

    Published 2011
    Table of Contents: “…A Hierarchical Structure of Service-Oriented Manufacturing ModeStudy of Combination Algorithm in Partitioning Manufacture Technology; The Machinability of MAR-M247 Superalloy; Chapter 3: Computational Methods for Engineering; The BP Network Classification Leafminer-Infected Leaves Based on the Fractal Dimension; An Evaluation Survey of Score Normalization in Multibiometric Systems; Non-Line-of-Sight Error Mitigation in Wireless Communication Systems; Information Delay Protocol Using Non-Orthogonal Quantum States; A New Algorithm of Image Encryption Based on 3D Arnold Cat…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 176

    Delphi High Performance : Build fast Delphi applications using concurrency, parallel programming and memory management. by Gabrijelčič, Primož

    Published 2018
    Table of Contents: “…; Different types of speed; Algorithm complexity; Big O and Delphi data structures; Data structures in practice; Mr. …”
    Full text (MFA users only)
    Electronic eBook
  17. 177

    Materials Science and Intelligent Technologies Applications : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Key Engineering Materials and Computer Sc...

    Published 2014
    Table of Contents: “…Automatic Badminton Action Recognition Using RGB-D SensorKinect-Based Badminton Action Analysis System; A Review of Hot Topic Detection and Tracking Technology; Study on the Improvement of TFIDF Algorithm in Data Mining; A New Protocol for Secure Distributed Multiplication of Two Polynomial Shared Values; Human Posture Recognition Based on DAG-SVMS; The Design and Implementation of Astronomical Multi-Catalog Storage and Cross-Match Based on Hadoop; The Multi-Scale Hough Transform Lane Detection Method Based on the Algorithm of Otsu and Canny; Design of Heart Sound Analyzer.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 178

    Insight into Theoretical and Applied Informatics : Introduction to Information Technologies and Computer Science. by Yatsko, Andrzej

    Published 2015
    Table of Contents: “…1.2.7 Informatics and Economics1.3 Information Theory; 1.3.1 Quantities of Information; 1.3.1.1 Units for Measuring Computer Information; 1.3.1.2 Quantities of Information in Information Theory; 1.3.2 Coding Theory; 1.3.3 Semiotics; 1.3.3.1 Computational Semiotics; 2 Algorithmics; 2.1 The Science of Algorithms; 2.1.1 Algorithm Design; 2.1.2 Algorithmic Complexity Theory; 2.1.3 Algorithm Analysis; 2.2 Data Science (Datalogy); 2.2.1 Raw Data; 2.2.2 Data Structures; 2.2.3 Data Analysis (Data Analytics); 2.2.4 Data Mining; 3 Computer Programming; 3.1 Computer Programming Languages.…”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    Iaeng transactions on electrical engineering. Vol. 1, Special issue of the International Multiconference of Engineers and Computer Scientists 2012

    Published 2013
    Table of Contents: “…Pawar -- Web services for chronic pain monitoring / Nuno Goncalo Coelho Costa Pombo, Pedro Jose Guerra de Araujo and Joaquim Manuel Vieira da Silva Viana -- Parallel binomial American option pricing on CPU-GPU hybrid platform / Nan Zhang, Chi-Un Lei and Ka Lok Man -- The subsystem grouping scheme using use case dependency graph and domain-specific semantic model for large complex systems / Nanchaya Khrueahong and Wiwat Vatanawood -- MOBM: a methodology for building practical domain ontologies from database information / Minyoung Ra [and others] -- A trial of the dynamic weighted sum method for multi-objective optimization / Hong Zhang -- A multi-agent platform to manage distributed and heterogeneous knowledge by using semantic web / Inaya Lahoud [and others] -- An intelligent train marshaling based on the processing time considering group layout of freight cars / Yoichi Hirashima -- A web-based multilingual intelligent tutor system based on Jackson's learning styles profiler and expert systems / H. …”
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Handbook for pandemic and mass-casualty planning and response

    Published 2012
    Table of Contents: “…Burn Injuries during Mass-Casualty IncidentsBlast Injuries; Section 3: Communication and Information Sharing; Information Sharing in Practice and for Practice: Mass-Casualty Cases; Communication between Emergency Medical Services and Media during Mass-Casualty Events in Croatia; Just-in-Time Information; Collaboration Topologies for Interdisciplinary and Interlevel Information Exchange; Networks and Their Role in Counteracting Contemporary Global Threats: A New Model; Architecture of R & D Project Management Systems at Medical Institutions; Lessons Learned; Lessons Learned; Subject Index…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook