Search Results - (((((((kant OR wind) OR semantic) OR art) OR cantor) OR anne) OR maarten) OR mantis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 42
- Artificial intelligence 40
- Mathematical models 40
- Mathematics 28
- Machine learning 27
- Data mining 19
- Technological innovations 19
- artificial intelligence 19
- Mathematical optimization 15
- Computer networks 14
- Artificial Intelligence 13
- Computer science 13
- Management 13
- Data Mining 12
- History 12
- Computer simulation 11
- Automatic control 10
- Big data 10
- Bioinformatics 10
- Computational linguistics 10
- Information technology 10
- Neural networks (Computer science) 10
- Philosophy 10
- Security measures 10
- Algorithms 9
- Digital techniques 9
- Machine Learning 9
- Social aspects 9
- Computational Biology 8
- Decision making 8
Search alternatives:
-
221
Insect media : an archaeology of animals and technology
Published 2010Table of Contents: “…Introduction: insects in the age of technology -- Nineteenth-century insect technics the uncanny affects of insects -- Genesis of form: insect architecture and swarms -- Technics of nature and temporality: Uexküll's ethology -- Metamorphosis, intensity, and devouring space: elements for an insect game theory -- Intermezzo -- Animal ensembles, robotic affects: bees, milieus, and individuation -- Biomorphs and boids: swarming algorithms -- Sexual selection in the biodigital: teknolust and the weird life of SRAs -- Epilogue insect media as an art of transmutation.…”
Full text (MFA users only)
Electronic eBook -
222
An Eulerian Discontinuous Galerkin Method for the Numerical Simulation of Interfacial Transport.
Published 2017Table of Contents: “…List of Figures; Nomenclature; List of Tables; Nomenclature; 1 Introduction; 2 Equations of the Physical Model; 3 State of the Art of Numerical Methods; 4 An Introduction to DG Methods; 5 New Conservation Laws of SurfaceTransport Equations; 6 Exact Solutions to the Interfacial Surfactant Transport Equation; 7 A Narrow Band Method for the Eulerian Approach; 8 The Eulerian DG Algorithm and Numerical Results; 9 Conclusion; A Appendix.…”
Full text (MFA users only)
Electronic eBook -
223
-
224
Optimization in polymer processing
Published 2011Table of Contents: “…INTRODUCTION ; 2. STATE-OF-THE-ART ; 3. OPTIMIZATION METHODOLOGY.…”
Full text (MFA users only)
Electronic eBook -
225
Information Theory Meets Power Laws : Stochastic Processes and Language Models.
Published 2020Full text (MFA users only)
Electronic eBook -
226
International e-Conference of Computer Science 2006
Published 2007Table of Contents: “…A Computational Algorithm to Obtain the Law of the Solvable Lie Algebra of n x n Upper-Triangular MatricesWeb Data Extraction using Semantic Generators -- Integrity-Enhanced Improvements for ISO 9001 registeredOrganizations -- A Ghost Bit Based Finite Field Arithmetic for FPGAs -- A Scalable Finite Field Multiplier with Interleaving Reduction -- Intelligent Tutoring Systems and Convex Geometries -- Towards Operational Content Infrastructure -- A Computational Fusion of Wavelets and Neural Networks in a Classifier for Biomedical Applications…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
227
STAIRS 2010 : Proceedings of the Fifth Starting AI Researchers' Symposium.
Published 2010Table of Contents: “…; Generative Structure Learning for Markov Logic Networks; Learning Fuzzy Models of User Interests in a Semantic Information Retrieval System; Ontology-Based Document and Query Representation May Improve the Effectiveness of Information Retrieval.…”
Full text (MFA users only)
Electronic eBook -
228
Communicating process architectures 2009 : WoTUG-32
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
229
Mechanics and control engineering. III : selected, peer reviewed papers from the 2014 3rd International Conference on Mechanics and Control Engineering (ICMCE 2014), October 26-28,...
Published 2015Table of Contents: “…Demonstrate for Rotating C-Shape Magnetic Refrigeration near Room TemperatureChapter 3: Power Engineering; Control Techniques to Directly Parallel Line-Side Converters for Wind Energy System; Dynamic Behavior of Flexible Drive Train Models and Back-to-Back Converter for DFIG Wind Turbines during Voltage Sags; Study on the Prior Information Credibility Test in Low-Voltage Switchgear Reliability Assessment; A Dispatch Algorithm for Smart Grid with Wind Generation; The Application Research of HVDC & FACTS to Suppress the Power System Low-Frequency Oscillation.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
230
Towards human-UAV physical interaction and fully actuated aerial vehicles
Published 2018Full text (MFA users only)
Electronic eBook -
231
Gradience in grammar : generative perspectives
Published 2006Table of Contents: “…Frisch and Adrienne Stearns -- Intermediate syntactic variants in a dialect : standard speech repertoire and relative acceptability / Leonie Cornips -- Gradedness and optionality in mature and developing grammars / Antonella Sorace -- Decomposing gradience : quantitative versus qualitative distinctions / Matthias Schlesewsky, Ina Bornkessel, and Brian McElree -- Gradient perception of intonation / Caroline Féry and Ruben Stoel -- Prototypicality judgements as inverted perception / Paul Boersma -- Modelling productivity with the gradual learning algorithm : the problem of accidentally exceptionless generalizations / Adam Albright and Bruce Hayes -- Gradedness as relative efficiency in the processing of syntax and semantics / John A. …”
Full text (MFA users only)
Electronic eBook -
232
Modelling for coastal hydraulics and engineering
Published 2010Full text (MFA users only)
Electronic eBook -
233
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
234
Digital signal processing with kernel methods
Published 2018Full text (MFA users only)
Electronic eBook -
235
Logic and Discrete Mathematics : A Concise Introduction, Solutions Manual.
Published 2015Table of Contents: “…Valid and invalid propositional inferences -- 3.3 Semantic tableaux -- 3.4 Logical equivalences. Negating propositional formulae -- 3.5 Normal forms. …”
Full text (MFA users only)
Electronic eBook -
236
Logic and Discrete Mathematics : A Concise Introduction.
Published 2015Table of Contents: “…Valid and invalid propositional inferences -- 3.3 The concept and use of deductive systems -- 3.4 Semantic tableaux -- 3.5 Logical equivalences. Negating propositional formulae -- 3.6 Normal forms. …”
Full text (MFA users only)
Electronic eBook -
237
Anaphora Resolution.
Published 2014Table of Contents: “…2.1.2 Syntactic knowledge2.1.3 Semantic knowledge; 2.1.4 Discourse knowledge; 2.1.5 Real-world (common-sense) knowledge; 2.2 Anaphora resolution in practice; 2.2.1 Identification of anaphors; 2.2.1.1 Identification of anaphoric pronouns; 2.2.1.2 Identification of anaphoric noun phrases; 2.2.1.3 Tools and resources for the identification of anaphors; 2.2.2 Location of the candidates for antecedents; 2.2.2.1 The search scope of candidates for antecedent; 2.2.2.2 Tools and resources needed for the location of potential candidates; 2.2.3 The resolution algorithm: factors in anaphora resolution.…”
Full text (MFA users only)
Electronic eBook -
238
Enterprise AI for Dummies.
Published 2020Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Strong, Weak, General, and Narrow -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Exploring Practical AI and How It Works -- Chapter 1 Demystifying Artificial Intelligence -- Understanding the Demand for AI -- Converting big data into actionable information -- Relieving global cost pressure -- Accelerating product development and delivery -- Facilitating mass customization -- Identifying the Enabling Technology -- Processing -- Algorithms…”
Full text (MFA users only)
Electronic eBook -
239
Recent Advances in Natural Language Processing : Selected Papers from RANLP'95
Published 1997Table of Contents: “…An augmented Earley algorithm for repair; 5.1 String representations; 5.2 Augmentations to the standard algorithm; 5.3 The augmented algorithm; 5.4 Remarks; 6 Conclusion; REFERENCES; Parsing for Targeted Errors in Controlled Languages; Abstract; 1. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
240
Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs.
Published 2018Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
Full text (MFA users only)
Electronic eBook