Search Results - (((((((kent OR canton) OR semantic) OR find) OR cantor) OR anne) OR share) OR hints) algorithms.

Search alternatives:

  1. 261

    Introduction to graph theory by Voloshin, Vitaly I. (Vitaly Ivanovich), 1954-

    Published 2009
    Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
    Full text (MFA users only)
    Electronic eBook
  2. 262

    Introduction to direction-of-arrival estimation by Chen, Zhizhang

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  3. 263

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  4. 264

    High Performance Computing Systems and Applications & OSCAR Symposium. by International Symposium on High Performance Computing Systems and Applications (17th : 2003 : Sherbrooke, Quebec)

    Published 2003
    Table of Contents: “…""The Impact of Hyper-Threading on Communication Performance in HPC Clusters""""A Preliminary Feasibility Study of the LARPBS Optical Bus Parallel Model""; ""Efficient Broadcast on Computational Grids""; ""The Canadian Internetworked Scientific Supercomputer""; ""Distributed Beagle: An Environment for Parallel and Distributed Evolutionary Computations""; ""A Brief Introduction to UPC""; ""SCOJO -- Share-Based Job Coscheduling with Integrated Dynamic Resource Directory in Support Or Grid Scheduling""…”
    Full text (MFA users only)
    Electronic eBook
  5. 265

    Web-based learning : men and machines - proceedings of the first international conference on web-based learning in china (icwl 2002). by REGGIE, KWAN

    Published 2002
    Table of Contents: “…Patterns of Web Based Learning in the Semantic Web Era ; PART THREE Tools.…”
    Full text (MFA users only)
    Electronic eBook
  6. 266

    Internet+ and electronic business in China : innovation and applications

    Published 2018
    Table of Contents: “…Emotional analysis of online reviews on e-business platforms -- Chapter 14. Semantic search of online reviews on e-business platforms -- Part IV. …”
    Full text (MFA users only)
    Electronic eBook
  7. 267

    The linguistic cerebellum

    Published 2015
    Table of Contents: “…VOICE RECORDING MATERIALVOICE RECORDING SESSION; ANALYSIS ALGORITHM AND EFFECTS; SPINOCEREBELLAR ATAXIA DIAGNOSIS USING SPEECH ANALYSIS; ACOUSTIC FINDINGS IN CEREBELLAR PATIENTS; CONCLUSION; REFERENCES; 8 -- Cerebellum and Writing; INTRODUCTION; WRITING; AGRAPHIA; CEREBELLUM; DISCUSSION; CONCLUSION; REFERENCES; 9 -- The Role of the Cerebellum in Developmental Dyslexia; INTRODUCTION; IS THE CEREBELLUM PART OF THE READING NETWORK?…”
    Full text (MFA users only)
    Electronic eBook
  8. 268

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  9. 269

    Technologies for Engineering Manufacturing Systems Control in Closed Loop. by Preuße, Sebastian

    Published 2013
    Table of Contents: “…Intro; 1 Introduction; 2 Basic Principles; 2.1 Technologies for studying Behavior; 2.2 Plants; 2.3 Controllers; 2.3.1 IEC 61131-3; 2.3.2 IEC 61499-1; 2.4 System Models; 2.4.1 Syntax; 2.4.2 Semantics; 2.5 Basics of Specifications; 2.5.1 Computation Tree Logic; 2.5.2 Extended Computation Tree Logic; 2.5.3 Timed Computation Tree Logic; 2.5.4 Symbolic Timing Diagrams; 2.6 Closed-Loop Composition; 2.7 Model Checking; 2.7.1 General Remarks; 2.7.2 Model Checking Algorithm; 2.8 Summary; 3 Formal Modeling of Plant, Controller, and the Closed Loop; 3.1 Demonstration Example; 3.2 Formal Plant Modeling.…”
    Full text (MFA users only)
    Electronic eBook
  10. 270

    Handbook of statistical analysis and data mining applications by Nisbet, Robert

    Published 2009
    Table of Contents: “…Basic Algorithms -- Chapter 8: Advanced Algorithms -- Chapter 9. …”
    Full text (MFA users only)
    Electronic eBook
  11. 271

    Lead generation for dummies by Rothman, Dayna

    Published 2014
    Table of Contents: “…Creating an Internal Blogging ProgramChapter 9: Creating Lasting Relationships Through Social Media; Sharing on Social Media; Getting the Most out of Facebook; Leveraging Twitter; Engaging Through LinkedIn; Building Your Google+ Presence; Getting Visual with Pinterest; Attracting Attention with SlideShare; Chapter 10: Getting Found Through Search Engine Optimization; Maximizing Different Traffic Sources; Knowing Your Search Engines; Making the Most out of Google Algorithm Updates; Choosing Your Keywords; Perfecting On-Page SEO; Utilizing Links in a Natural Way.…”
    Full text (MFA users only)
    Electronic eBook
  12. 272

    Computational intelligence in aerospace sciences

    Published 2014
    Table of Contents: “…Coello Coello and Oliver Schütze ; Function landscapes and the difficulty of global optimization / Marco Locatelli ; Stochastic methods for single objective global optimization / Christian Lorenz Müller ; Uncertainty quantification in computational science / Gianluca Iaccarino ; Basic concepts of game theory for aerospace engineering applications / Lina Mallozzi -- Autonomy and robotics: Nonlinear state estimation algorithms for autonomous vehicles / Kumar Pakki Bharani Chandra and Da-Wei Gu ; Path planning algorithms in 2-D and 3-D obstacle-rich environments / Rosli Omar, Batu Pahat, Da-Wei Gu; Semantics of perception and action for symbolic reasoning in aerospace systems Sandor M. …”
    Full text (MFA users only)
    Electronic eBook
  13. 273

    Machine learning for the web by Isoni, Andrea

    Published 2016
    Table of Contents: “…Multinomial Naive BayesGaussian Naive Bayes; Decision trees; Support vector machine; Kernel trick; A comparison of methods; Regression problem; Classification problem; Hidden Markov model; A Python example; Summary; Web Mining Techniques; Web structure mining; Web crawlers (or spiders); Indexer; Ranking -- PageRank algorithm; Web content mining; Parsing; Natural language processing; Information retrieval models; TF-IDF; Latent Semantic Analysis (LSA); Doc2Vec (word2vec); Word2vec -- continuous bag of words and skip-gram architectures; Mathematical description of the CBOW model.…”
    Full text (MFA users only)
    Electronic eBook
  14. 274

    Metaheuristic applications in structures and infrastructures

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  15. 275

    Principles of Quantum Computation and Information, Volume I : Basic Concepts. by Casati, Giulio, Strini, Giuliano

    Published 2004
    Table of Contents: “…Quantum phase estimation. 3.13. Finding eigenvalues and eigenvectors. 3.14. Period finding and Shor's algorithm. 3.15. …”
    Full text (MFA users only)
    Electronic eBook
  16. 276

    Global optimization methods in geophysical inversion by Sen, Mrinal K.

    Published 2013
    Table of Contents: “…5.6 Multimodal fitness functions, genetic drift, GA with sharing, and repeat (parallel) GA -- 5.7 Uncertainty estimates -- 5.8 Evolutionary programming -- a variant of GA -- 5.9 Summary -- 6 Other stochastic optimization methods -- 6.1 The neighborhood algorithm (NA) -- 6.1.1 Voronoi diagrams -- 6.1.2 Voronoi diagrams in SA and GA -- 6.1.3 Neighborhood sampling algorithm -- 6.2 Particle swarm optimization (PSO) -- 6.3 Simultaneous perturbation stochastic approximation (SPSA) -- 7 Geophysical applications of simulated annealing and genetic algorithms -- 7.1 1D seismic waveform inversion -- 7.1.1 Application of heat bath SA -- 7.1.2 Application of GAs -- 7.1.3 Real-data examples -- 7.1.4 Hybrid GA/LI inversion using different measures of fitness -- 7.1.5 Hybrid VFSA inversion using different strategies -- 7.2 Prestack migration velocity estimation -- 7.2.1 1D earth structure -- 7.2.2 2D earth structure -- 7.2.3 Multiple and simultaneous VFSA for imaging -- 7.3 Inversion of resistivity sounding data for 1D earth models -- 7.3.1 Exact parameterization -- 7.3.2 Overparameterization with smoothing -- 7.4 Inversion of resistivity profiling data for 2D earth models -- 7.4.1 Inversion of synthetic data -- 7.4.2 Inversion of field data -- 7.5 Inversion of magnetotelluric sounding data for 1D earth models -- 7.6 Stochastic reservoir modeling -- 7.7 Seismic deconvolution by mean field annealing (MFA) and Hopfield network -- 7.7.1 Synthetic example -- 7.7.2 Real-data example -- 7.8 Joint inversion -- 7.8.1 Joint travel time and gravity inversion -- 7.8.2 Time-lapse (4D) seismic and well production joint inversion -- 8 Uncertainty estimation -- 8.1 Methods of numerical integration -- 8.1.1 Grid search or enumeration -- 8.1.2 Monte Carlo integration -- 8.1.3 Importance sampling -- 8.1.4 Multiple MAP estimation -- 8.2 Simulated annealing: the Gibbs sampler.…”
    Full text (MFA users only)
    Electronic eBook
  17. 277
  18. 278

    Applied Parallel Computing. by Deng, Yuefan

    Published 2012
    Table of Contents: “…Design of Algorithms; 5.1. Algorithm Models; 5.1.1. Master-slave; 5.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  19. 279

    Eat, cook, grow : mixing human-computer interactions with human-food interactions

    Published 2014
    Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
    Full text (MFA users only)
    Electronic eBook
  20. 280

    International e-Conference of Computer Science 2006

    Published 2007
    Table of Contents: “…A Computational Algorithm to Obtain the Law of the Solvable Lie Algebra of n x n Upper-Triangular MatricesWeb Data Extraction using Semantic Generators -- Integrity-Enhanced Improvements for ISO 9001 registeredOrganizations -- A Ghost Bit Based Finite Field Arithmetic for FPGAs -- A Scalable Finite Field Multiplier with Interleaving Reduction -- Intelligent Tutoring Systems and Convex Geometries -- Towards Operational Content Infrastructure -- A Computational Fusion of Wavelets and Neural Networks in a Classifier for Biomedical Applications…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook