Search Results - (((((((kant OR wwanton) OR ken) OR arte) OR cantor) OR anne) OR carter) OR wwanton) algorithms.

Refine Results
  1. 1
  2. 2

    How to guard an art gallery and other discrete mathematical adventures by Michael, T. S., 1960-

    Published 2009
    Table of Contents: “…s Formula: Second Proof -- 2.8 Batting Averages and Lattice Points -- 2.9 Three Dimensions and N-largements -- 2.10 Notes and References -- 2.11 Problems -- 3 How to Guard an Art Gallery -- 3.1 The Sunflower Art Gallery -- 3.2 Art Gallery Problems -- 3.3 The Art Gallery Theorem -- 3.4 Colorful Consequences -- 3.5 Triangular and Chromatic Assumptions -- 3.6 Modern Art Galleries -- 3.7 Art Gallery Sketches -- 3.8 Right-Angled Art Galleries -- 3.9 Guarding the Guards -- 3.10 Three Dimensions and the Octoplex…”
    Full text (MFA users only)
    Electronic eBook
  3. 3
  4. 4
  5. 5

    The Human Algorithm by Solis, Brian

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  6. 6
  7. 7

    Open Data Structures : an Introduction. by Morin, Pat

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  8. 8
  9. 9

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  10. 10
  11. 11
  12. 12

    Genome Sequencing Technology and Algorithms. by Kim, Sun

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  13. 13

    Graph algorithms and applications 3

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  14. 14

    Metaheuristic optimization for the design of automatic control laws by Sandou, Guillaume

    Published 2013
    Table of Contents: “…Motivations to use metaheuristic algorithms -- 1.3. Organization of the book -- Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  15. 15
  16. 16

    Algorithms, architectures and information systems security

    Published 2009
    Table of Contents: “…Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T.K. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 17
  18. 18
  19. 19
  20. 20

    Evolutionary algorithms for mobile ad hoc networks

    Published 2014
    Table of Contents: “…3 SURVEY ON OPTIMIZATION PROBLEMS FOR MOBILE AD HOC NETWORKS3.1 TAXONOMY OF THE OPTIMIZATION PROCESS; 3.2 STATE OF THE ART; 3.3 CONCLUSION; REFERENCES; 4 MOBILE NETWORKS SIMULATION; 4.1 SIGNAL PROPAGATION MODELING; 4.2 STATE OF THE ART OF NETWORK SIMULATORS; 4.3 MOBILITY SIMULATION; 4.4 CONCLUSION; REFERENCES; PART II: PROBLEMS OPTIMIZATION; 5 PROPOSED OPTIMIZATION FRAMEWORK; 5.1 ARCHITECTURE; 5.2 OPTIMIZATION ALGORITHMS; 5.3 SIMULATORS; 5.4 EXPERIMENTAL SETUP; 5.5 CONCLUSION; REFERENCES; 6 BROADCASTING PROTOCOL; 6.1 THE PROBLEM; 6.2 EXPERIMENTS; 6.3 ANALYSIS OF RESULTS; 6.4 CONCLUSION.…”
    Full text (MFA users only)
    Electronic eBook