Search Results - (((((((kent OR want) OR semantic) OR wint) OR cantor) OR anne) OR share) OR hints) algorithms.

Search alternatives:

  1. 21
  2. 22

    Learning OWL class expressions by Lehmann, Jens, 1982-

    Published 2010
    Table of Contents: “…Refinement Operator Based OWL Learning Algorithms; OCEL (OWL Class Expression Learner); Redundancy Elimination; Creating a Full Learning Algorithm; ELTL (EL Tree Learner)…”
    Full text (MFA users only)
    Electronic eBook
  3. 23
  4. 24
  5. 25
  6. 26

    Learning Neo4j 3.x - Second Edition. by Baton, Jerome

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  7. 27
  8. 28

    Sharing economy and big data analytics by Sedkaoui, Soraya, Khelfaoui, Mounia

    Published 2020
    Table of Contents: “…The Sharing Economy or the Emergence of a New Business Model. …”
    Full text (MFA users only)
    Electronic eBook
  9. 29

    Deep Learning for the Earth Sciences : A Comprehensive Approach to Remote Sensing, Climate Science and Geosciences. by Camps-Valls, Gustau

    Published 2021
    Table of Contents: “…6.1.4 Evaluation Metrics -- 6.1.4.1 Precision-Recall Curve -- 6.1.4.2 Average Precision and Mean Average Precision -- 6.1.5 Applications -- 6.2 Preliminaries on Object Detection with Deep Models -- 6.2.1 Two-stage Algorithms -- 6.2.1.1 R-CNNs -- 6.2.1.2 R-FCN -- 6.2.2 One-stage Algorithms -- 6.2.2.1 YOLO -- 6.2.2.2 SSD -- 6.3 Object Detection in Optical RS Images -- 6.3.1 Related Works -- 6.3.1.1 Scale Variance -- 6.3.1.2 Orientation Variance -- 6.3.1.3 Oriented Object Detection -- 6.3.1.4 Detecting in Large-size Images -- 6.3.2 Datasets and Benchmark -- 6.3.2.1 DOTA -- 6.3.2.2 VisDrone…”
    Full text (MFA users only)
    Electronic eBook
  10. 30

    Uberland : how algorithms are rewriting the rules of work by Rosenblat, Alex, 1987-

    Published 2018
    Table of Contents: “…Introduction : using an app to go to work-Uber as a symbol of the new economy -- Workers as digital pawns : how Uber uses the sharing economy to exploit everyone -- Motivations to drive : how Uber creates jobs for many at the expense of a few -- Grandiose promises : how Uber proposes entrepreneurship to the masses -- The shady middleman : how Uber plays broker to line its pockets -- Behind the curtain : how Uber rules drivers with algorithms -- In the big leagues : how Uber plays ball -- Conclusion : the new age of Uber-how technology consumption rewrote the rules of work -- Appendix 1. methodology : how I studied Uber -- Appendix 2. ridehailing beyond Uber : meet Lyft, the younger twin.…”
    Full text (MFA users only)
    Electronic eBook
  11. 31

    Fundamentals of grid computing : theory, algorithms and technologies

    Published 2010
    Table of Contents: “…Cover; Title; Copyright; Contents; List of Figures; List of Tables; Foreword; Preface; Chapter 1: Grid computing overview; Chapter 2: Synchronization protocols for sharing resources in grid environments; Chapter 3: Data replication in grid environments; Chapter 4: Data management in grids; Chapter 5: Future of grids resources management; Chapter 6: Fault-tolerance and availability awareness in computational grids; Chapter 7: Fault tolerance for distributed scheduling in grids; Chapter 8: Broadcasting for grids; Chapter 9: Load balancing algorithms for dynamic networks.…”
    Full text (MFA users only)
    Electronic eBook
  12. 32

    Romance syntax, semantics and L2 acquisition : selected papers from the 30th Linguistic Symposium on Romance Languages : Gainesville, Florida, February 2000

    Published 2001
    Table of Contents: “…ROMANCE SYNTAX, SEMANTICS AND L2 ACQUISITION -- Editorial page -- Title page -- Copyright page -- Acknowledgements -- Table of contents -- CONTRIBUTORS -- Dedication -- ROMANCE SYNTAX, SEMANTICS, AND L2 ACQUISITION -- 0. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 33

    What Is Thought? by Baum, Eric B., 1957-

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  14. 34

    We are data : algorithms and the making of our digital selves by Cheney-Lippold, John

    Published 2017
    Table of Contents: “…-- Privacy: wanted dead or alive -- Conclusion: ghosts in the machine.…”
    Full text (MFA users only)
    Electronic eBook
  15. 35

    Algorithmic problems of group theory, their complexity, and applications to cryptography

    Published 2015
    Table of Contents: “…Formal Definition -- 3. Shamirâ€?s Secret Sharing Scheme -- 4. Secret Sharing Using Non-commutative Groups -- 5. …”
    Full text (MFA users only)
    Electronic eBook
  16. 36

    Entity information life cycle for big data : master data management and information integration by Talburt, John R., Zhou, Yinle, 1986-

    Published 2015
    Table of Contents: “…CLUSTER-TO-CLUSTER CLASSIFICATIONSELECTING AN APPROPRIATE ALGORITHM; CONCLUDING REMARKS; Chapter 9 -- Blocking; BLOCKING; BLOCKING BY MATCH KEY; DYNAMIC BLOCKING VERSUS PRERESOLUTION BLOCKING; BLOCKING PRECISION AND RECALL; MATCH KEY BLOCKING FOR BOOLEAN RULES; MATCH KEY BLOCKING FOR SCORING RULES; CONCLUDING REMARKS; Chapter 10 -- CSRUD for Big Data; LARGE-SCALE ER FOR MDM; THE TRANSITIVE CLOSURE PROBLEM; DISTRIBUTED, MULTIPLE-INDEX, RECORD-BASED RESOLUTION; AN ITERATIVE, NONRECURSIVE ALGORITHM FOR TRANSITIVE CLOSURE; ITERATION PHASE: SUCCESSIVE CLOSURE BY REFERENCE IDENTIFIER.…”
    Full text (MFA users only)
    Electronic eBook
  17. 37
  18. 38

    Parallel Scientific Computing. by Magoulès, F. (Frédéric)

    Published 2015
    Table of Contents: “…Performance analysis -- 3 Parallel Algorithm Concepts -- 3.1. Parallel algorithms for recurrences -- 3.2. …”
    Full text (MFA users only)
    Electronic eBook
  19. 39

    Naming and reference : the link of word to object by Nelson, R. J. (Raymond John), 1917-

    Published 1992
    Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
    Full text (MFA users only)
    Electronic eBook
  20. 40

    Automating open source intelligence : algorithms for OSINT

    Published 2016
    Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
    Full text (MFA users only)
    Electronic eBook