Search Results - (((((((kant OR stantis) OR mantis) OR hands) OR cantor) OR anne) OR file) OR planning) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 108
- Mathematical models 81
- Mathematics 67
- Artificial intelligence 57
- Machine learning 52
- Algorithms 49
- algorithms 42
- artificial intelligence 39
- methods 39
- Data mining 35
- Artificial Intelligence 26
- Python (Computer program language) 26
- Computer networks 25
- Technological innovations 25
- Computer algorithms 24
- Signal processing 24
- Development 23
- Digital techniques 23
- Mathematical optimization 22
- Application software 21
- Data Mining 21
- Image processing 20
- Management 20
- Research 20
- Decision making 19
- Diseases 19
- Computer simulation 18
- Computer science 17
- Computer security 17
- Treatment 17
Search alternatives:
- kant »
- stantis »
- mantis »
-
1
-
2
Network-Based Distributed Planning Using Coevolutionary Algorithms.
Published 2004Table of Contents: “…Combinatorial optimization. 2.3. Evolutionary algorithms. 2.4. Agents. 2.5. Distributed problem solving -- 3. …”
Full text (MFA users only)
Electronic eBook -
3
Optimization of Computer Networks : Modeling and Algorithms: a Hands-On Approach.
Published 2016Full text (MFA users only)
Electronic eBook -
4
-
5
Data Clustering : Algorithms and Applications.
Published 2013Full text (MFA users only)
Electronic eBook -
6
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
7
Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
Published 2018Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
Full text (MFA users only)
Electronic eBook -
8
Genetic Algorithms : Concepts and Designs.
Published 1999Table of Contents: “…Genetic Algorithms in Production Planning and Scheduling Problems; 10. …”
Full text (MFA users only)
Electronic eBook -
9
Algorithmic trading : winning strategies and their rationale
Published 2013Full text (MFA users only)
Electronic eBook -
10
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
11
-
12
-
13
Bioinformatics algorithms : techniques and applications
Published 2008Full text (MFA users only)
Electronic eBook -
14
-
15
The rise of the algorithms : how YouTube and TikTok conquered the world
Published 2024Full text (MFA users only)
Electronic eBook -
16
-
17
-
18
-
19
Jewels of stringology : text algorithms.
Published 2002Table of Contents: “…Stringology. 1.1. Text file facilities. 1.2. Dictionaries. 1.3. Data compression. 1.4. …”
Full text (MFA users only)
Electronic eBook -
20