Search Results - (((((((kent OR want) OR semantic) OR wint) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 40
- Data processing 35
- Machine learning 30
- Data mining 23
- Mathematics 23
- artificial intelligence 18
- Mathematical models 17
- Technological innovations 17
- Algorithms 16
- Computer science 15
- algorithms 14
- Computer networks 13
- Management 13
- Python (Computer program language) 13
- Artificial Intelligence 12
- Big data 12
- Application software 11
- Data Mining 11
- Development 11
- Information technology 11
- methods 11
- Computer algorithms 10
- Neural networks (Computer science) 10
- Machine Learning 9
- Social aspects 9
- Computational linguistics 8
- Automatic control 7
- Computer security 7
- Electronic data processing 7
- Logic, Symbolic and mathematical 7
Search alternatives:
- kent »
-
21
Introduction to programming : learn to program in Java with data structures, algorithms, and logic
Published 2018Full text (MFA users only)
Electronic eBook -
22
Learning OWL class expressions
Published 2010Table of Contents: “…Refinement Operator Based OWL Learning Algorithms; OCEL (OWL Class Expression Learner); Redundancy Elimination; Creating a Full Learning Algorithm; ELTL (EL Tree Learner)…”
Full text (MFA users only)
Electronic eBook -
23
Natural language processing : semantic aspects
Published 2014Full text (MFA users only)
Electronic eBook -
24
-
25
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
26
-
27
-
28
Sharing economy and big data analytics
Published 2020Table of Contents: “…The Sharing Economy or the Emergence of a New Business Model. …”
Full text (MFA users only)
Electronic eBook -
29
Deep Learning for the Earth Sciences : A Comprehensive Approach to Remote Sensing, Climate Science and Geosciences.
Published 2021Table of Contents: “…6.1.4 Evaluation Metrics -- 6.1.4.1 Precision-Recall Curve -- 6.1.4.2 Average Precision and Mean Average Precision -- 6.1.5 Applications -- 6.2 Preliminaries on Object Detection with Deep Models -- 6.2.1 Two-stage Algorithms -- 6.2.1.1 R-CNNs -- 6.2.1.2 R-FCN -- 6.2.2 One-stage Algorithms -- 6.2.2.1 YOLO -- 6.2.2.2 SSD -- 6.3 Object Detection in Optical RS Images -- 6.3.1 Related Works -- 6.3.1.1 Scale Variance -- 6.3.1.2 Orientation Variance -- 6.3.1.3 Oriented Object Detection -- 6.3.1.4 Detecting in Large-size Images -- 6.3.2 Datasets and Benchmark -- 6.3.2.1 DOTA -- 6.3.2.2 VisDrone…”
Full text (MFA users only)
Electronic eBook -
30
Uberland : how algorithms are rewriting the rules of work
Published 2018Table of Contents: “…Introduction : using an app to go to work-Uber as a symbol of the new economy -- Workers as digital pawns : how Uber uses the sharing economy to exploit everyone -- Motivations to drive : how Uber creates jobs for many at the expense of a few -- Grandiose promises : how Uber proposes entrepreneurship to the masses -- The shady middleman : how Uber plays broker to line its pockets -- Behind the curtain : how Uber rules drivers with algorithms -- In the big leagues : how Uber plays ball -- Conclusion : the new age of Uber-how technology consumption rewrote the rules of work -- Appendix 1. methodology : how I studied Uber -- Appendix 2. ridehailing beyond Uber : meet Lyft, the younger twin.…”
Full text (MFA users only)
Electronic eBook -
31
Fundamentals of grid computing : theory, algorithms and technologies
Published 2010Table of Contents: “…Cover; Title; Copyright; Contents; List of Figures; List of Tables; Foreword; Preface; Chapter 1: Grid computing overview; Chapter 2: Synchronization protocols for sharing resources in grid environments; Chapter 3: Data replication in grid environments; Chapter 4: Data management in grids; Chapter 5: Future of grids resources management; Chapter 6: Fault-tolerance and availability awareness in computational grids; Chapter 7: Fault tolerance for distributed scheduling in grids; Chapter 8: Broadcasting for grids; Chapter 9: Load balancing algorithms for dynamic networks.…”
Full text (MFA users only)
Electronic eBook -
32
Romance syntax, semantics and L2 acquisition : selected papers from the 30th Linguistic Symposium on Romance Languages : Gainesville, Florida, February 2000
Published 2001Table of Contents: “…ROMANCE SYNTAX, SEMANTICS AND L2 ACQUISITION -- Editorial page -- Title page -- Copyright page -- Acknowledgements -- Table of contents -- CONTRIBUTORS -- Dedication -- ROMANCE SYNTAX, SEMANTICS, AND L2 ACQUISITION -- 0. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
33
-
34
We are data : algorithms and the making of our digital selves
Published 2017Table of Contents: “…-- Privacy: wanted dead or alive -- Conclusion: ghosts in the machine.…”
Full text (MFA users only)
Electronic eBook -
35
Algorithmic problems of group theory, their complexity, and applications to cryptography
Published 2015Table of Contents: “…Formal Definition -- 3. Shamirâ€?s Secret Sharing Scheme -- 4. Secret Sharing Using Non-commutative Groups -- 5. …”
Full text (MFA users only)
Electronic eBook -
36
Entity information life cycle for big data : master data management and information integration
Published 2015Table of Contents: “…CLUSTER-TO-CLUSTER CLASSIFICATIONSELECTING AN APPROPRIATE ALGORITHM; CONCLUDING REMARKS; Chapter 9 -- Blocking; BLOCKING; BLOCKING BY MATCH KEY; DYNAMIC BLOCKING VERSUS PRERESOLUTION BLOCKING; BLOCKING PRECISION AND RECALL; MATCH KEY BLOCKING FOR BOOLEAN RULES; MATCH KEY BLOCKING FOR SCORING RULES; CONCLUDING REMARKS; Chapter 10 -- CSRUD for Big Data; LARGE-SCALE ER FOR MDM; THE TRANSITIVE CLOSURE PROBLEM; DISTRIBUTED, MULTIPLE-INDEX, RECORD-BASED RESOLUTION; AN ITERATIVE, NONRECURSIVE ALGORITHM FOR TRANSITIVE CLOSURE; ITERATION PHASE: SUCCESSIVE CLOSURE BY REFERENCE IDENTIFIER.…”
Full text (MFA users only)
Electronic eBook -
37
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
38
Parallel Scientific Computing.
Published 2015Table of Contents: “…Performance analysis -- 3 Parallel Algorithm Concepts -- 3.1. Parallel algorithms for recurrences -- 3.2. …”
Full text (MFA users only)
Electronic eBook -
39
Naming and reference : the link of word to object
Published 1992Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
Full text (MFA users only)
Electronic eBook -
40
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
Full text (MFA users only)
Electronic eBook