Search Results - (((((((kent OR canton) OR semantic) OR find) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 61
- Artificial intelligence 46
- Machine learning 36
- Mathematics 36
- Mathematical models 31
- Algorithms 28
- Data mining 28
- algorithms 27
- Computer networks 23
- artificial intelligence 22
- Computer algorithms 21
- Management 21
- Technological innovations 21
- methods 21
- Big data 19
- Computer science 19
- Information technology 17
- Research 16
- Artificial Intelligence 13
- Signal processing 13
- Bioinformatics 12
- Data Mining 12
- Digital techniques 12
- Mathematical optimization 12
- Social aspects 12
- Electronic data processing 11
- Image processing 11
- Python (Computer program language) 11
- R (Computer program language) 11
- Computer security 10
Search alternatives:
- kent »
-
261
Introduction to graph theory
Published 2009Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
Full text (MFA users only)
Electronic eBook -
262
Introduction to direction-of-arrival estimation
Published 2010Full text (MFA users only)
Electronic eBook -
263
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
264
High Performance Computing Systems and Applications & OSCAR Symposium.
Published 2003Table of Contents: “…""The Impact of Hyper-Threading on Communication Performance in HPC Clusters""""A Preliminary Feasibility Study of the LARPBS Optical Bus Parallel Model""; ""Efficient Broadcast on Computational Grids""; ""The Canadian Internetworked Scientific Supercomputer""; ""Distributed Beagle: An Environment for Parallel and Distributed Evolutionary Computations""; ""A Brief Introduction to UPC""; ""SCOJO -- Share-Based Job Coscheduling with Integrated Dynamic Resource Directory in Support Or Grid Scheduling""…”
Full text (MFA users only)
Electronic eBook -
265
Web-based learning : men and machines - proceedings of the first international conference on web-based learning in china (icwl 2002).
Published 2002Table of Contents: “…Patterns of Web Based Learning in the Semantic Web Era ; PART THREE Tools.…”
Full text (MFA users only)
Electronic eBook -
266
Internet+ and electronic business in China : innovation and applications
Published 2018Table of Contents: “…Emotional analysis of online reviews on e-business platforms -- Chapter 14. Semantic search of online reviews on e-business platforms -- Part IV. …”
Full text (MFA users only)
Electronic eBook -
267
The linguistic cerebellum
Published 2015Table of Contents: “…VOICE RECORDING MATERIALVOICE RECORDING SESSION; ANALYSIS ALGORITHM AND EFFECTS; SPINOCEREBELLAR ATAXIA DIAGNOSIS USING SPEECH ANALYSIS; ACOUSTIC FINDINGS IN CEREBELLAR PATIENTS; CONCLUSION; REFERENCES; 8 -- Cerebellum and Writing; INTRODUCTION; WRITING; AGRAPHIA; CEREBELLUM; DISCUSSION; CONCLUSION; REFERENCES; 9 -- The Role of the Cerebellum in Developmental Dyslexia; INTRODUCTION; IS THE CEREBELLUM PART OF THE READING NETWORK?…”
Full text (MFA users only)
Electronic eBook -
268
-
269
Technologies for Engineering Manufacturing Systems Control in Closed Loop.
Published 2013Table of Contents: “…Intro; 1 Introduction; 2 Basic Principles; 2.1 Technologies for studying Behavior; 2.2 Plants; 2.3 Controllers; 2.3.1 IEC 61131-3; 2.3.2 IEC 61499-1; 2.4 System Models; 2.4.1 Syntax; 2.4.2 Semantics; 2.5 Basics of Specifications; 2.5.1 Computation Tree Logic; 2.5.2 Extended Computation Tree Logic; 2.5.3 Timed Computation Tree Logic; 2.5.4 Symbolic Timing Diagrams; 2.6 Closed-Loop Composition; 2.7 Model Checking; 2.7.1 General Remarks; 2.7.2 Model Checking Algorithm; 2.8 Summary; 3 Formal Modeling of Plant, Controller, and the Closed Loop; 3.1 Demonstration Example; 3.2 Formal Plant Modeling.…”
Full text (MFA users only)
Electronic eBook -
270
Handbook of statistical analysis and data mining applications
Published 2009Table of Contents: “…Basic Algorithms -- Chapter 8: Advanced Algorithms -- Chapter 9. …”
Full text (MFA users only)
Electronic eBook -
271
Lead generation for dummies
Published 2014Table of Contents: “…Creating an Internal Blogging ProgramChapter 9: Creating Lasting Relationships Through Social Media; Sharing on Social Media; Getting the Most out of Facebook; Leveraging Twitter; Engaging Through LinkedIn; Building Your Google+ Presence; Getting Visual with Pinterest; Attracting Attention with SlideShare; Chapter 10: Getting Found Through Search Engine Optimization; Maximizing Different Traffic Sources; Knowing Your Search Engines; Making the Most out of Google Algorithm Updates; Choosing Your Keywords; Perfecting On-Page SEO; Utilizing Links in a Natural Way.…”
Full text (MFA users only)
Electronic eBook -
272
Computational intelligence in aerospace sciences
Published 2014Table of Contents: “…Coello Coello and Oliver Schütze ; Function landscapes and the difficulty of global optimization / Marco Locatelli ; Stochastic methods for single objective global optimization / Christian Lorenz Müller ; Uncertainty quantification in computational science / Gianluca Iaccarino ; Basic concepts of game theory for aerospace engineering applications / Lina Mallozzi -- Autonomy and robotics: Nonlinear state estimation algorithms for autonomous vehicles / Kumar Pakki Bharani Chandra and Da-Wei Gu ; Path planning algorithms in 2-D and 3-D obstacle-rich environments / Rosli Omar, Batu Pahat, Da-Wei Gu; Semantics of perception and action for symbolic reasoning in aerospace systems Sandor M. …”
Full text (MFA users only)
Electronic eBook -
273
Machine learning for the web
Published 2016Table of Contents: “…Multinomial Naive BayesGaussian Naive Bayes; Decision trees; Support vector machine; Kernel trick; A comparison of methods; Regression problem; Classification problem; Hidden Markov model; A Python example; Summary; Web Mining Techniques; Web structure mining; Web crawlers (or spiders); Indexer; Ranking -- PageRank algorithm; Web content mining; Parsing; Natural language processing; Information retrieval models; TF-IDF; Latent Semantic Analysis (LSA); Doc2Vec (word2vec); Word2vec -- continuous bag of words and skip-gram architectures; Mathematical description of the CBOW model.…”
Full text (MFA users only)
Electronic eBook -
274
Metaheuristic applications in structures and infrastructures
Published 2013Full text (MFA users only)
Electronic eBook -
275
Principles of Quantum Computation and Information, Volume I : Basic Concepts.
Published 2004Table of Contents: “…Quantum phase estimation. 3.13. Finding eigenvalues and eigenvectors. 3.14. Period finding and Shor's algorithm. 3.15. …”
Full text (MFA users only)
Electronic eBook -
276
Global optimization methods in geophysical inversion
Published 2013Table of Contents: “…5.6 Multimodal fitness functions, genetic drift, GA with sharing, and repeat (parallel) GA -- 5.7 Uncertainty estimates -- 5.8 Evolutionary programming -- a variant of GA -- 5.9 Summary -- 6 Other stochastic optimization methods -- 6.1 The neighborhood algorithm (NA) -- 6.1.1 Voronoi diagrams -- 6.1.2 Voronoi diagrams in SA and GA -- 6.1.3 Neighborhood sampling algorithm -- 6.2 Particle swarm optimization (PSO) -- 6.3 Simultaneous perturbation stochastic approximation (SPSA) -- 7 Geophysical applications of simulated annealing and genetic algorithms -- 7.1 1D seismic waveform inversion -- 7.1.1 Application of heat bath SA -- 7.1.2 Application of GAs -- 7.1.3 Real-data examples -- 7.1.4 Hybrid GA/LI inversion using different measures of fitness -- 7.1.5 Hybrid VFSA inversion using different strategies -- 7.2 Prestack migration velocity estimation -- 7.2.1 1D earth structure -- 7.2.2 2D earth structure -- 7.2.3 Multiple and simultaneous VFSA for imaging -- 7.3 Inversion of resistivity sounding data for 1D earth models -- 7.3.1 Exact parameterization -- 7.3.2 Overparameterization with smoothing -- 7.4 Inversion of resistivity profiling data for 2D earth models -- 7.4.1 Inversion of synthetic data -- 7.4.2 Inversion of field data -- 7.5 Inversion of magnetotelluric sounding data for 1D earth models -- 7.6 Stochastic reservoir modeling -- 7.7 Seismic deconvolution by mean field annealing (MFA) and Hopfield network -- 7.7.1 Synthetic example -- 7.7.2 Real-data example -- 7.8 Joint inversion -- 7.8.1 Joint travel time and gravity inversion -- 7.8.2 Time-lapse (4D) seismic and well production joint inversion -- 8 Uncertainty estimation -- 8.1 Methods of numerical integration -- 8.1.1 Grid search or enumeration -- 8.1.2 Monte Carlo integration -- 8.1.3 Importance sampling -- 8.1.4 Multiple MAP estimation -- 8.2 Simulated annealing: the Gibbs sampler.…”
Full text (MFA users only)
Electronic eBook -
277
Information Theory Meets Power Laws : Stochastic Processes and Language Models.
Published 2020Full text (MFA users only)
Electronic eBook -
278
Applied Parallel Computing.
Published 2012Table of Contents: “…Design of Algorithms; 5.1. Algorithm Models; 5.1.1. Master-slave; 5.1.2. …”
Full text (MFA users only)
Electronic eBook -
279
Eat, cook, grow : mixing human-computer interactions with human-food interactions
Published 2014Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
Full text (MFA users only)
Electronic eBook -
280
International e-Conference of Computer Science 2006
Published 2007Table of Contents: “…A Computational Algorithm to Obtain the Law of the Solvable Lie Algebra of n x n Upper-Triangular MatricesWeb Data Extraction using Semantic Generators -- Integrity-Enhanced Improvements for ISO 9001 registeredOrganizations -- A Ghost Bit Based Finite Field Arithmetic for FPGAs -- A Scalable Finite Field Multiplier with Interleaving Reduction -- Intelligent Tutoring Systems and Convex Geometries -- Towards Operational Content Infrastructure -- A Computational Fusion of Wavelets and Neural Networks in a Classifier for Biomedical Applications…”
Full text (MFA users only)
Electronic Conference Proceeding eBook