Search Results - (((((((kant OR want) OR semantic) OR when) OR cantor) OR anne) OR blaney) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 49
- Data processing 43
- Machine learning 35
- Data mining 28
- artificial intelligence 26
- Mathematics 24
- Mathematical models 21
- Algorithms 20
- Artificial Intelligence 20
- Technological innovations 18
- algorithms 18
- Python (Computer program language) 17
- Data Mining 16
- methods 16
- Social aspects 15
- Application software 13
- Computer algorithms 13
- Computer networks 13
- Development 13
- Big data 12
- Neural networks (Computer science) 12
- Computer science 11
- Mathematical optimization 11
- History 10
- Machine Learning 10
- Management 10
- Computer simulation 9
- Diseases 9
- Electronic data processing 9
- Information technology 9
Search alternatives:
- kant »
-
281
From text to political positions : text analysis across disciplines
Published 2014Table of Contents: “…Conditional probabilities and associative framing ; Semantic network analysis.…”
Full text (MFA users only)
Electronic eBook -
282
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
283
Challenges in information technology management
Published 2008Table of Contents: “…Improved data mining algorithms for frequent patterns with composite items / Ke Wang, James N.K. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
284
Meeting security challenges through data analytics and decision support
Published 2016Table of Contents: “…Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
285
Fuzzy systems and data mining II : proceedings of FSDM 2016
Published 2016Table of Contents: “…Adaptive Fuzzy Sliding-Mode Control of Robot and SimulationHesitant Bipolar Fuzzy Set and Its Application in Decision Making; Chance Constrained Twin Support Vector Machine for Uncertain Pattern Classification; Set-Theoretic Kripke-Style Semantics for Monoidal T-Norm (Based) Logics; Data Mining; Dynamic Itemset Mining Under Multiple Support Thresholds; Deep Learning with Large Scale Dataset for Credit Card Data Analysis; Probabilistic Frequent Itemset Mining Algorithm over Uncertain Databases with Sampling; Priority Guaranteed and Energy Efficient Routing in Data Center Networks.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
286
-
287
Bladder Cancer : diagnosis and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
288
-
289
-
290
Two-degree-of-freedom control systems : the Youla Parameterization approach
Published 2015Full text (MFA users only)
Electronic eBook -
291
-
292
Statistical learning from a regression perspective
Published 2008Full text (MFA users only)
Electronic eBook -
293
Computing the homology of the lambda algebra
Published 1985Table of Contents: “…Corollaries to the structure formulas""; ""2.6. Tri-grading when p is odd""; ""2.7. The endomorphism Î?""; ""2.8. …”
Full text (MFA users only)
Electronic eBook -
294
Cystic Tumors of the Pancreas : Diagnosis and Treatment
Published 2016Full text (MFA users only)
Electronic eBook -
295
Atlas of AI : power, politics, and the planetary costs of artificial intelligence
Published 2021Full text (MFA users only)
Electronic eBook -
296
Foundations of decision-making agents : logic, probability and modality
Published 2008Table of Contents: “…Complexity of inference algorithms. 6.9. Acquisition of probabilities. 6.10. …”
Full text (MFA users only)
Electronic eBook -
297
Database technology for life sciences and medicine
Published 2010Full text (MFA users only)
Electronic eBook -
298
Graph drawing and applications for software and knowledge engineers
Published 2002Full text (MFA users only)
Electronic eBook -
299
-
300
Artificial Neural Network Applications for Software Reliability Prediction.
Published 2017Full text (MFA users only)
Electronic eBook