Search Results - (((((((kant OR want) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Artificial intelligence 40
- Machine learning 35
- Mathematics 28
- Mathematical models 25
- artificial intelligence 25
- Data mining 24
- Algorithms 23
- algorithms 22
- Technological innovations 19
- Computer networks 18
- Artificial Intelligence 17
- Computer algorithms 17
- methods 17
- Application software 16
- Development 16
- Python (Computer program language) 15
- Social aspects 15
- Big data 14
- Data Mining 14
- Information technology 13
- Management 13
- Mathematical optimization 13
- Electronic data processing 12
- Neural networks (Computer science) 12
- Research 12
- History 10
- Computer science 9
- Computer simulation 9
- Diseases 9
Search alternatives:
- kant »
- mantis »
- share »
-
201
Space division multiple access for wireless local area networks
Published 2002Full text (MFA users only)
Electronic eBook -
202
Advanced reliability modeling : proceedings of the 2004 Asian International Workshop (AIWARM 2004) : Hiroshima, Japan, 26-27 August 2004
Published 2005Full text (MFA users only)
Electronic Conference Proceeding eBook -
203
Experiencing architecture in the nineteenth century : buildings and society in the modern age
Published 2019Table of Contents: “…'The pressing public want of the age': The arrival of the grand hotel'Bitter competition in the London hotel world': The problem of publicity; 'A wealthy man's private mansion': The assurance of exclusivity; The 'spirit of the time': Cosmopolitanism and heterosociability; Conclusion; Chapter 10: 'The fullest fountain of advancing civilization': Experiencing Anthony Trollope's House of Commons, 1852-82; Experiences of Parliament; Progressive architecture; A political theatre; Conclusion: Reading experiences.…”
Full text (MFA users only)
Electronic eBook -
204
Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs.
Published 2018Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
Full text (MFA users only)
Electronic eBook -
205
Emerging engineering approaches and applications : selected, peer reviewed papers from the 2011 International Conference on Information Engineering for Mechanics and Materials, Aug...
Published 2011Full text (MFA users only)
Electronic Conference Proceeding eBook -
206
Handbook of operations research in natural resources
Published 2007Full text (MFA users only)
Electronic eBook -
207
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
208
Principles of Quantum Computation and Information, Volume I : Basic Concepts.
Published 2004Full text (MFA users only)
Electronic eBook -
209
-
210
-
211
Uncommon sense : investment wisdom since the stock market's dawn
Published 2015Table of Contents: “…-- RELATING BOOK VALUE PER SHARE TO MARKET PRICE -- WHAT IS A LOW P/B RATIO TELLING US? …”
Full text (MFA users only)
Electronic eBook -
212
The bitcoin big bang : how alternative currencies are about to change the world
Published 2014Table of Contents: “…; What Is Cryptography?; Still Want to Be a Miner?; Do We Need Another Bitcoin?; 7 Nautiluscoin-0 to 1 Million in 60 Days; Creating the Coin; Did It Work?…”
Full text (MFA users only)
Electronic eBook -
213
Big Data and HPC.
Published 2018Table of Contents: “…Reliability-Aware Voltage Scaling of Multicore Processors in Dark Silicon EraTime Collection: An Abstraction for Shared Objects in Parallel Programming; Parallel and Distributed Analysis of Microarray Data; Extracting Distributed Architecture from Source Code Using an Evolutionary Approach; An Architectural Approach to Grid Provisioning; Subject Index; Author Index.…”
Full text (MFA users only)
Electronic eBook -
214
Ethnic studies in academic and research libraries
Published 2021Table of Contents: “…"Build it and they will come" -- Fostering transformation -- The value of integrating African American archives into undergraduate studies -- Improving representation on Wikipedia -- Returning to where it all began and connecting the dots -- Collaborative and active engagement at the Hemispheric University -- Librarians and leaders -- Crafting contemporary indigenous studies collections in the age of algorithms -- Building a Vietnamese language collection with the Vietnamese diaspora community -- Engaging with ethnic studies librarians -- For when they arrive -- BIPOC voices speak -- Supporting faculty in indigenizing curriculum and pedagogy -- Student-driven collecting efforts and initiatives -- Making spaces for ethnic studies -- Modeling Black literature -- A perspective on Asian American studies and librarianship -- Holdings in the archives are closer than they appear -- Reclaiming the Asian American history narrative -- Connecting graduate library and information studies students with ethnic studies archives.…”
Full text (MFA users only)
Electronic eBook -
215
Wireless sensor systems for extreme environments : space, underwater, underground and industrial
Published 2017Table of Contents: “…Chapter 4 On Improving Connectivity-based Localization in Wireless Sensor Networks4.1 Introduction; 4.2 Connectivity-based Localization in One-hop Networks; 4.2.1 The Centroid Algorithm; 4.2.2 Improved Centroid Algorithms; 4.3 Connectivity-based Localization in Multi-hop Networks; 4.3.1 The DV-hop Algorithm; 4.3.2 Mathematics of Hop-count-based Localization; 4.4 On Improving Connectivity-based Localization; 4.4.1 Improvements by Adjusting Correction Factor; 4.4.2 Improvements by Exploiting Neighborhood Information; 4.5 Summary; References.…”
Full text (MFA users only)
Electronic eBook -
216
Ranking the Liveability of the World's Major Cities : the Global Liveable Cities Index (GLCI).
Published 2012Full text (MFA users only)
Electronic eBook -
217
Data clustering in C++ : an object-oriented approach
Published 2011Full text (MFA users only)
Electronic eBook -
218
CUDA programming : a developer's guide to parallel computing with GPUs
Published 2013Table of Contents: “…ALGORITHMIC ISSUESFINDING AND AVOIDING ERRORS; DEVELOPING FOR FUTURE GPUS; FURTHER RESOURCES; CONCLUSION; References; Index.…”
Full text (MFA users only)
Electronic eBook -
219
-
220