Search Results - (((((((kent OR want) OR semantic) OR arts) OR cantor) OR anne) OR maarten) OR mantis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 49
- Artificial intelligence 44
- Mathematical models 40
- Machine learning 36
- Mathematics 27
- Data mining 26
- artificial intelligence 22
- Computer networks 17
- Artificial Intelligence 16
- Data Mining 15
- Mathematical optimization 15
- Python (Computer program language) 15
- Computer science 14
- Technological innovations 13
- Computer simulation 12
- Machine Learning 12
- Management 12
- Neural networks (Computer science) 12
- Algorithms 11
- Big data 11
- Development 11
- History 11
- Security measures 11
- methods 11
- Application software 10
- Computational linguistics 10
- Digital techniques 10
- Electronic data processing 10
- Information technology 10
- Philosophy 10
Search alternatives:
- kent »
-
541
Multiscale Modeling In Solid Mechanics : Computational Approaches.
Published 2009Full text (MFA users only)
Electronic eBook -
542
Transitions from Digital Communications to Quantum Communications : Concepts and Prospects.
Published 2016Full text (MFA users only)
Electronic eBook -
543
-
544
Future internet services and service architectures
Published 2011Full text (MFA users only)
Electronic eBook -
545
Uncommon sense : investment wisdom since the stock market's dawn
Published 2015Table of Contents: “…-- NOTES -- 8 ARE COMPUTERS THE ANSWER? -- ALGORITHMS -- HIGH FREQUENCY TRADING -- THOMAS PETERFFY -- THINGS HAVEN'T ALWAYS BEEN SO FAST -- HOW FAST CAN IT GET? …”
Full text (MFA users only)
Electronic eBook -
546
-
547
Military Operations Research : Quantitative Decision Making
Published 1997Full text (MFA users only)
Electronic eBook -
548
-
549
Cloud computing and virtualization
Published 2018Table of Contents: “…5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References.…”
Full text (MFA users only)
Electronic eBook -
550
Yttrium : compounds, production and applications
Published 2011Table of Contents: “…Spot Size ; 4.4. Fluence ; 4.5. Algorithm ; 5. DEFINITION OF VASCULAR PATHOLOGY ; 6. …”
Full text (MFA users only)
Electronic eBook -
551
The structure of amorphous materials using molecular dynamics
Published 2023Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
Full text (MFA users only)
Electronic eBook -
552
Coder to developer : tools and strategies for delivering your software
Published 2004Full text (MFA users only)
Electronic eBook -
553
RFID systems : research trends and challenges
Published 2010Full text (MFA users only)
Electronic eBook -
554
-
555
Fuzzy Multiple Attribute Decision Making : Methods and Applications
Published 1992Full text (MFA users only)
Electronic eBook -
556
Swift 2 design patterns : build robust and scalable iOS and Mac OS X game applications
Published 2015Full text (MFA users only)
Electronic eBook -
557
Linearization and efficiency enhancement techniques for silicon power amplifiers : from RF to mmW
Published 2015Full text (MFA users only)
Electronic eBook -
558
Scala Machine Learning Projects : Build real-world machine learning and deep learning projects with Scala.
Published 2018Table of Contents: “…-- Project structure -- Running the Scala Play web app -- Summary -- Chapter 4: Population-Scale Clustering and Ethnicity Prediction -- Population scale clustering and geographic ethnicity -- Machine learning for genetic variants -- 1000 Genomes Projects dataset description -- Algorithms, tools, and techniques -- H2O and Sparkling water -- ADAM for large-scale genomics data processing -- Unsupervised machine learning -- Population genomics and clustering -- How does K-means work? …”
Full text (MFA users only)
Electronic eBook -
559
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
560
Memory Allocation Problems in Embedded Systems : Optimization Methods.
Published 2013Table of Contents: “…Memory management for decreasing power consumption; 1.3. State of the art in optimization techniques for memory management and data assignment; 1.3.1. …”
Full text (MFA users only)
Electronic eBook