Search Results - (((((((kant OR wants) OR semantic) OR want) OR cantor) OR anne) OR shared) OR hints) algorithms.

Search alternatives:

  1. 121

    Introduction to identity-based encryption by Martin, Luther

    Published 2008
    Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
    Full text (MFA users only)
    Electronic eBook
  2. 122

    Advanced Artificial Intelligence.

    Published 2011
    Table of Contents: “…Applications of temporal and spatial logic; 4.7.4. Randell algorithm; Exercises; Chapter 5 Case-Based Reasoning; 5.1 Overview; 5.2 Basic Notations; 5.3 Process Model; 5.4 Case Representation; 5.4.1 Semantic Memory Unit; 5.4.2 Memory Network; 5.5 Case Indexing; 5.6 Case Retrieval; 5.7 Similarity Relations in CBR; 5.7.1 Semantic similarity; 5.7.2 Structural similarity; 5.7.3 Goal's features; 5.7.4 Individual similarity; 5.7.5 Similarity assessment; 5.8 Case Reuse; 5.9 Case Retainion; 5.10 Instance-Based Learning.…”
    Full text (MFA users only)
    Electronic eBook
  3. 123

    Advances in Mechatronics and Control Engineering III : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Mechatronics and Control Engineering (ICMCE 2014...

    Published 2014
    Table of Contents: “…Advances in Mechatronics and Control Engineering III; Preface and Conference Organization; Table of Contents; Chapter 1: Artificial Intelligence, Algorithms and Computation Methods; A New Random Encryption Algorithm for Character Type Cipher; Exploiting Thread-Level Parallelism Based on Balancing Load for Speculative Multithreading; FNMF-ITWC Algorithm Applied to the Cancer Gene Expression Data; Fuzzy Set Based Clustering Algorithm of Web Text; MIMU Parameter Identification for Large Misalignment Angles Based on AFSA; Reduction of Risk Control Indicators of ERP System Based on Rough Set.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 124
  5. 125

    Papers from the first European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights '06)

    Published 2007
    Table of Contents: “…Cover; CONTENTS; EDITORIAL ADVISORY BOARD; The digital information war; Complementing DRM with digital watermarking: mark, search, retrieve; A class of non-linear asymptotic fingerprinting codes with 1-error; Verification algorithms for governed use of multimedia content; Toward semantics-aware management of intellectual property rights; DRM, law and technology: an American perspective; Clustering search results. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 126

    What Every Teacher Should Know About Effective Teaching Strategies. by Tileston, Donna E. Walker

    Published 1900
    Table of Contents: “…-- Why the Way We Teach is Important -- The Linguistic Modality -- The Nonlinguistic Modality -- The Affective Modality -- Semantic Memory -- Episodic Memory -- Procedural Memory -- Automatic Memory -- Emotional Memory -- Chapter 2 -- Choosing Effective Teaching Strategies for Beginning Activities -- Great Beginnings -- The Self-System…”
    Full text (MFA users only)
    Electronic eBook
  7. 127

    New autonomous systems by Cardon, Alain, 1946-, Itmi, Mhamed

    Published 2016
    Table of Contents: “…Intro -- Table of Contents -- Title -- Copyright -- Introduction -- List of Algorithms -- 1 Systems and their Design -- 1.1. Modeling systems -- 1.2. …”
    Full text (MFA users only)
    Electronic eBook
  8. 128

    3D Shape Analysis : Fundamentals, Theory and Applications. by Tabia, Hedi

    Published 2018
    Table of Contents: “…7.2 Problem Formulation7.3 Mathematical Tools; 7.4 Isometric Correspondence and Registration; 7.5 Nonisometric (Elastic) Correspondence and Registration; 7.6 Summary and Further Reading; 8 Semantic Correspondences; 8.1 Introduction; 8.2 Mathematical Formulation; 8.3 Graph Representation; 8.4 Energy Functions for Semantic Labeling; 8.5 Semantic Labeling; 8.6 Examples; 8.7 Summary and Further Reading; Part IV: Applications; 9 Examples of 3D Semantic Applications; 9.1 Introduction; 9.2 Semantics: Shape or Status; 9.3 Semantics: Class or Identity; 9.4 Semantics: Behavior; 9.5 Semantics: Position…”
    Full text (MFA users only)
    Electronic eBook
  9. 129

    Data Analytics in Bioinformatics : A Machine Learning Perspective. by Satpathy, Rabinarayan

    Published 2021
    Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
    Full text (MFA users only)
    Electronic eBook
  10. 130

    Cybernetic Intelligence

    Published 2005
    Table of Contents: “…Editorial advisory board; Preface; Editorial; Second-order cybernetics and enactive perception; Semantic category theory cognition and conceptual reference; Bipolar logic and probabilistic interpretation; Cooperative clans; Future reasoning machines: mind and body; Machine vision methods for autonomous micro-robotic systems; Optimisation enhancement using self-organising fuzzy control; Intelligent agents and distributed models for cooperative task support; Landscape classification and problem specific reasoning for genetic algorithms; Business cybernetics: a provocative suggestion.…”
    Full text (MFA users only)
    Electronic eBook
  11. 131

    The bitcoin big bang : how alternative currencies are about to change the world by Kelly, Brian, 1971-

    Published 2014
    Table of Contents: “…; What Is Cryptography?; Still Want to Be a Miner?; Do We Need Another Bitcoin?; 7 Nautiluscoin-0 to 1 Million in 60 Days; Creating the Coin; Did It Work?…”
    Full text (MFA users only)
    Electronic eBook
  12. 132

    Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals by Burkhardt, Joanna M.

    Published 2022
    Table of Contents: “…Words matter -- Propaganda -- Satire -- Advertising -- Public trust in journalism -- 7. Algorithms, Bots, Trolls, Cyborgs and Artificial Intelligence -- Algorithms -- Bots, trolls, cyborgs and other inauthentic activity -- 8. …”
    Full text (MFA users only)
    Electronic eBook
  13. 133

    Language engineering for lesser-studied languages

    Published 2009
    Table of Contents: “…Derzhanski -- Computational morphology for lesser-studied languages / Kemal Olfazer -- Practical syntastic processing of flexible word order languages with dynamic syntax / David Tugwell -- Computation field semantics : acquiring an ontological-semantic lexicon for a new language / Sergei Nirenburg and Marjorie McShane -- Applying machine translation for low- and middle-density languages / Stella Markantonatou [and others] -- Language resources for semitic languages : challenges and solutions / Shuly Wintner -- Low-density language strategies for Persian and Armenian / Karine Megerdoomian.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 134

    Theory of information : fundamentality, diversity and unification by Burgin, M. S. (Mark Semenovich)

    Published 2010
    Table of Contents: “…Algorithmic information theory based on recursive algorithms : recursive approach. 5.3. …”
    Full text (MFA users only)
    Electronic eBook
  15. 135

    Artificial Intelligence in Semiconductor Industry - Materials to Applications. by Wee, Hui-Ming

    Published 2021
    Table of Contents: “…Cover -- Guest editorial -- Efficient VLSI architecture for FIR filter design using modified differential evolution ant colony optimization algorithm -- Optimized DA-reconfigurable FIR filters for software defined radio channelizer applications -- Grid -- connected operation and performance of hybrid DG having PV and PEMFC -- High speed data encryption technique with optimized memory based RSA algorithm for communications -- A 10-bit 200 MS/s pipelined ADCwith parallel sampling and switched op-amp sharing technique…”
    Full text (MFA users only)
    Electronic eBook
  16. 136

    Agent-based computing

    Published 2010
    Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  17. 137

    Database technology for life sciences and medicine

    Published 2010
    Table of Contents: “…The DIANOVA framework. 4.4. Algorithms for realizing DIANOVA. 4.5. Extensions of DIANOVA. 4.6. …”
    Full text (MFA users only)
    Electronic eBook
  18. 138
  19. 139
  20. 140

    Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium

    Published 2006
    Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
    Full text (MFA users only)
    Electronic eBook