Search Results - (((((((kant OR wanting) OR span) OR mantis) OR cantor) OR anne) OR carter) OR granting) algorithms.

  1. 81

    Fundamentals of Matrix Analysis with Applications. by Saff, Edward Barry

    Published 2015
    Table of Contents: “…Fixed-Point Methods -- PART II INTRODUCTION: THE STRUCTURE OF GENERAL SOLUTIONS TO LINEAR ALGEBRAIC EQUATIONS -- Chapter 3 Vector Spaces -- 3.1 General Spaces, Subspaces, and Spans -- 3.2 Linear Dependence -- 3.3 Bases, Dimension, and Rank -- 3.4 Summary -- Chapter 4 Orthogonality -- 4.1 Orthogonal Vectors and the Gram-Schmidt Algorithm -- 4.2 Orthogonal Matrices -- 4.3 Least Squares -- 4.4 Function Spaces…”
    Full text (MFA users only)
    Electronic eBook
  2. 82
  3. 83

    Computational ecology : graphs, networks and agent-based modeling by Zhang, Wenjun

    Published 2012
    Table of Contents: “…Trees and planar graphs -- 5. Algorithms of graphs -- 6. Directed graphs -- Part II. …”
    Full text (MFA users only)
    Electronic eBook
  4. 84

    Effective Amazon Machine Learning. by Perrier, Alexis

    Published 2017
    Table of Contents: “…Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Introduction to Machine Learning and Predictive Analytics; Introducing Amazon Machine Learning; Machine Learning as a Service; Leveraging full AWS integration; Comparing performances; Engineering data versus model variety; Amazon's expertise and the gradient descent algorithm; Pricing; Understanding predictive analytics; Building the simplest predictive analytics algorithm; Regression versus classification.…”
    Full text (MFA users only)
    Electronic eBook
  5. 85

    Pattern discovery in biomolecular data : tools, techniques, and applications

    Published 1999
    Table of Contents: “…Discovering patterns in DNA sequences by the algorithmic significance method / Aleksandar Milosavljevic -- Assembling blocks / Jorja G. …”
    Full text (MFA users only)
    Electronic eBook
  6. 86

    The Method of Fundamental Solutions. by LI, Zi-Cai

    Published 2023
    Full text (MFA users only)
    Electronic eBook
  7. 87

    Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium

    Published 2006
    Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
    Full text (MFA users only)
    Electronic eBook
  8. 88

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  9. 89

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  10. 90
  11. 91

    Principles of data integration by Doan, AnHai

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  12. 92

    Computational number theory : proceedings of the Colloquium on Computational Number Theory held at Kossuth Lajos University, Debrecen (Hungary), September 4-9, 1989

    Published 1991
    Table of Contents: “…On the solution of the diophantine equation Gn = P(x) with sieve algorithmOn Thue equations associated with certain quartic number fields; KANT -- a tool for computations in algebraic number fields; SIMATH -- a computer algebra system…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 93

    Generalized Network Design Problems : Modeling and Optimization. by Pop, Petrică C.

    Published 2012
    Table of Contents: “…Preface; 1 Introduction; 1.1 Combinatorial optimization and integer programming; 1.2 Complexity theory; 1.3 Heuristic and relaxation methods; 1.4 Generalized network design problems; 2 The Generalized Minimum Spanning Tree Problem (GMSTP); 2.1 Definition and complexity of the GMSTP; 2.2 An exact algorithm for the GMSTP; 2.3 Mathematical models of the GMSTP; 2.3.1 Formulations based on tree properties; 2.3.2 Formulations based on arborescence properties; 2.3.3 Flow based formulations; 2.3.4 A model based on Steiner tree properties; 2.3.5 Local-global formulation of the GMSTP.…”
    Full text (MFA users only)
    Electronic eBook
  14. 94
  15. 95
  16. 96

    Anaphora Resolution. by Mitkov, Ruslan

    Published 2014
    Table of Contents: “…4.1 Early work in anaphora resolution4.2 Student; 4.3 Shrdlu; 4.4 Lunar; 4.5 Hobbs's naïve approach; 4.5.1 The algorithm; 4.5.2 Evaluation of Hobbs' s algorithm; 4.6 The BFP algorithm; 4.7 Carter's shallow processing approach; 4.8 Rich and LuperFoy's distributed architecture; 4.9 Carbonell and Brown's multi-strategy approach; 4.10 Other work; 4.11 Summary; Chapter Five: The present: knowledge-poor and corpus-based approaches in the 1990s and beyond; 5.1 Main trends in recent anaphora resolution research; 5.2 Collocation patterns-based approach; 5.3 Lappin and Leass's algorithm; 5.3.1 Overview.…”
    Full text (MFA users only)
    Electronic eBook
  17. 97

    F♯ for Machine Learning Essentials. by Mukherjee, Sudipta

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  18. 98

    Optical networks and components : fundamentals and advances. Volume II, Advances in optical networks and components by Sahu, Partha Pratim (Writer on optical networks)

    Published 2020
    Table of Contents: “…3.2.4 Analysis of ILP -- 3.3 Routing -- 3.3.1 Routing Algorithms -- 3.3.1.1 Dijkstra's Algorithm -- 3.3.1.2 Bellman-Ford Algorithm -- 3.3.2 Routing Approaches -- 3.3.2.1 Fixed Routing -- 3.3.2.2 Fixed-Alternate Routing -- 3.3.2.3 Flooding -- 3.3.2.4 Adaptive Routing -- 3.3.2.5 Fault-Tolerant Routing -- 3.3.2.6 Randomized Routing -- 3.4 WA Subproblem (Heuristics) -- 3.4.1 Wavelength Search Algorithm -- 3.4.1.1 Exhaustive Search -- 3.4.1.2 Tabu Search -- 3.4.1.3 Simulated Annealing -- 3.4.1.4 Genetic Algorithms -- 3.4.2 WA Heuristics -- 3.4.2.1 Random WA (R) -- 3.4.2.2 First-Fit (FF) Approach…”
    Full text (MFA users only)
    Electronic eBook
  19. 99

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook
  20. 100

    Introduction to graph theory by Voloshin, Vitaly I. (Vitaly Ivanovich), 1954-

    Published 2009
    Table of Contents: “…Trees and Distance; 2.3. Minimum Spanning Tree; 2.4. Bipartite Graphs; Chapter 3Chordal Graphs; 3.1. …”
    Full text (MFA users only)
    Electronic eBook