Search Results - (((((((kant OR wint) OR spanning) OR art) OR cantor) OR anne) OR carter) OR santis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 38
- Mathematical models 38
- Artificial intelligence 27
- Machine learning 24
- Mathematics 24
- Computer networks 17
- Mathematical optimization 15
- artificial intelligence 15
- Computer simulation 13
- Data mining 12
- Algorithms 11
- History 11
- Artificial Intelligence 10
- Bioinformatics 10
- Management 10
- Neural networks (Computer science) 10
- Security measures 10
- Digital techniques 9
- Philosophy 9
- Technological innovations 9
- algorithms 9
- methods 9
- Electronic data processing 8
- Information technology 8
- Machine Learning 8
- Social aspects 8
- Computational Biology 7
- Computational biology 7
- Computer algorithms 7
- Data Mining 7
Search alternatives:
- kant »
- wint »
- spanning »
-
1
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
2
Flowchart and Algorithm Basics : The Art of Programming.
Published 2020Full text (MFA users only)
Electronic eBook -
3
How to guard an art gallery and other discrete mathematical adventures
Published 2009Table of Contents: “…s Formula: Second Proof -- 2.8 Batting Averages and Lattice Points -- 2.9 Three Dimensions and N-largements -- 2.10 Notes and References -- 2.11 Problems -- 3 How to Guard an Art Gallery -- 3.1 The Sunflower Art Gallery -- 3.2 Art Gallery Problems -- 3.3 The Art Gallery Theorem -- 3.4 Colorful Consequences -- 3.5 Triangular and Chromatic Assumptions -- 3.6 Modern Art Galleries -- 3.7 Art Gallery Sketches -- 3.8 Right-Angled Art Galleries -- 3.9 Guarding the Guards -- 3.10 Three Dimensions and the Octoplex…”
Full text (MFA users only)
Electronic eBook -
4
Probability and Algorithms.
Published 1900Table of Contents: “…""PROBABILITY AND ALGORITHMS""; ""Copyright""; ""Preface""; ""Contents""; ""1. …”
Full text (MFA users only)
Electronic eBook -
5
-
6
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
7
-
8
-
9
Pathway modeling and algorithm research
Published 2011Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
10
An introduction to the analysis of algorithms
Published 2012Table of Contents: “…Notes -- 2. Greedy algorithms. 2.1. Minimum cost spanning trees. 2.2. Jobs with deadlines and profits. 2.3. …”
Full text (MFA users only)
Electronic eBook -
11
Structural geology algorithms : vectors and tensors
Published 2012Full text (MFA users only)
Electronic eBook -
12
Security of block ciphers : from algorithm design to hardware implementation
Published 2015Full text (MFA users only)
Electronic eBook -
13
Ensemble methods : foundations and algorithms.
Published 2012Full text (MFA users only)
Electronic eBook -
14
Genome Sequencing Technology and Algorithms.
Published 2007Full text (MFA users only)
Electronic eBook -
15
-
16
C# Data Structures and Algorithms : Explore the possibilities of C# for developing a variety of efficient applications.
Published 2018Table of Contents: “…InsertionRemoval; Example -- BST visualization; AVL trees; Implementation; Example -- keep the tree balanced; Red-black trees; Implementation; Example -- RBT-related features; Binary heaps; Implementation; Example -- heap sort; Binomial heaps; Fibonacci heaps; Summary; Chapter 6: Exploring Graphs; Concept of graphs; Applications; Representation; Adjacency list; Adjacency matrix; Implementation; Node; Edge; Graph; Example -- undirected and unweighted edges; Example -- directed and weighted edges; Traversal; Depth-first search; Breadth-first search; Minimum spanning tree; Kruskal's algorithm.…”
Full text (MFA users only)
Electronic eBook -
17
Network Routing : Algorithms, Protocols, and Architectures.
Published 2017Table of Contents: “…2.7.2 Distance Vector-Based Approach2.8 Shortest Widest Path and Widest Shortest Path; 2.9 Tree, Spanning Tree, and Steiner Tree Algorithms; 2.9.1 Spanning Tree: Breadth First Search and Depth First Search; 2.9.2 Minimum Spanning Tree; 2.9.3 Steiner Tree; 2.10 k-Shortest Paths Algorithm; 2.11 Summary; Further Lookup; Exercises; 3 Routing Protocols: Framework and Principles; 3.1 Routing Protocol, Routing Algorithm, and Routing Table; 3.2 Routing Information Representation and Protocol Messages; 3.3 Distance Vector Routing Protocol; 3.3.1 Conceptual Framework and Illustration.…”
Full text (MFA users only)
Electronic eBook -
18
Metaheuristic optimization for the design of automatic control laws
Published 2013Table of Contents: “…Identification problematic and brief state of the art 2.2. Problem statement and modeling -- 2.2.1. …”
Full text (MFA users only)
Electronic eBook -
19
Nearest-neighbor methods in learning and vision : theory and practice
Published 2005Full text (MFA users only)
Electronic eBook -
20
Algorithms, architectures and information systems security
Published 2009Table of Contents: “…Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T.K. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook