Search Results - (((((((kant OR won) OR arte) OR carters) OR cantor) OR anne) OR zwarts) OR anti) algorithms.

Refine Results
  1. 1
  2. 2

    How to guard an art gallery and other discrete mathematical adventures by Michael, T. S., 1960-

    Published 2009
    Table of Contents: “…s Formula: Second Proof -- 2.8 Batting Averages and Lattice Points -- 2.9 Three Dimensions and N-largements -- 2.10 Notes and References -- 2.11 Problems -- 3 How to Guard an Art Gallery -- 3.1 The Sunflower Art Gallery -- 3.2 Art Gallery Problems -- 3.3 The Art Gallery Theorem -- 3.4 Colorful Consequences -- 3.5 Triangular and Chromatic Assumptions -- 3.6 Modern Art Galleries -- 3.7 Art Gallery Sketches -- 3.8 Right-Angled Art Galleries -- 3.9 Guarding the Guards -- 3.10 Three Dimensions and the Octoplex…”
    Full text (MFA users only)
    Electronic eBook
  3. 3
  4. 4

    The Human Algorithm by Solis, Brian

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  5. 5
  6. 6

    Open Data Structures : an Introduction. by Morin, Pat

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  7. 7
  8. 8

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Genome Sequencing Technology and Algorithms. by Kim, Sun

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  14. 14

    Graph algorithms and applications 3

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  15. 15

    Metaheuristic optimization for the design of automatic control laws by Sandou, Guillaume

    Published 2013
    Table of Contents: “…Motivations to use metaheuristic algorithms -- 1.3. Organization of the book -- Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  16. 16
  17. 17
  18. 18

    Algorithms, architectures and information systems security

    Published 2009
    Table of Contents: “…Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T.K. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 19
  20. 20