Search Results - (((((((kent OR want) OR semantic) OR wint) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 40
- Data processing 35
- Machine learning 30
- Data mining 23
- Mathematics 23
- artificial intelligence 18
- Mathematical models 17
- Technological innovations 17
- Algorithms 16
- Computer science 15
- algorithms 14
- Computer networks 13
- Management 13
- Python (Computer program language) 13
- Artificial Intelligence 12
- Big data 12
- Application software 11
- Data Mining 11
- Development 11
- Information technology 11
- methods 11
- Computer algorithms 10
- Neural networks (Computer science) 10
- Machine Learning 9
- Social aspects 9
- Computational linguistics 8
- Automatic control 7
- Computer security 7
- Electronic data processing 7
- Logic, Symbolic and mathematical 7
Search alternatives:
- kent »
-
141
Multi-label dimensionality reduction
Published 2014Table of Contents: “…Cover; Series; Contents; Preface; Symbol Description; Chapter 1: Introduction; Chapter 2: Partial Least Squares; Chapter 3: Canonical Correlation Analysis; Chapter 4: Hypergraph Spectral Learning; Chapter 5: A Scalable Two-Stage Approach for Dimensionality Reduction; Chapter 6: A Shared-Subspace Learning Framework; Chapter 7: Joint Dimensionality Reduction and Classification; Chapter 8: Nonlinear Dimensionality Reduction: Algorithms and Applications; Appendix Proofs; References; Back Cover.…”
Full text (MFA users only)
Electronic eBook -
142
Handbook of Modal Logic.
Published 2006Table of Contents: “…13 Quantified Modal Logic13.1 Syntax and Semantics; 13.2 Constant Domain Tableaus; 13.3 Soundness and Completeness; 13.4 Variations; 14 Conclusion; Bibliography; Chapter 3 Complexity of Modal Logic; 1 Introduction; 1.1 Examples of decision problems in modal logic; 1.2 A simple and a hard problem; 1.3 The model checking problem; 1.4 The consequence problem; 1.5 A tiling logic; 2 Decision algorithms; 2.1 Selection of points; 2.2 Filtration; 2.3 Hintikka set elimination; 2.4 Hintikka set elimination without constraints; 2.5 Forcing exponentially deep paths; 2.6 Tree automata; 2.7 Pseudo-models.…”
Full text (MFA users only)
Electronic eBook -
143
Elements of quantum computation and quantum communication
Published 2013Table of Contents: “…; A brief history of quantum computation and quantum communication Basic Ideas of Classical and Quantum Computational Models and Complexity Classes; Elementary idea of complexity of an algorithm; Turing machine; Circuit model of computation; Computational complexity and related issues Mathematical Tools and Simple Quantum Mechanics Required for Quantum Computing; A little bit of algebra required for quantum computing; A little bit of quantum mechanics; A little more of algebra for quantum computing Quantum Gates and Quantum Circuits; Single qubit gates; Two qubit gates; Three qubit gates; A little more on quantum gates; Quantum circuits; Discussion Quantum Algorithms; Deutsch's algorithm; Deutsch.…”
Full text (MFA users only)
Electronic eBook -
144
-
145
Enterprise artificial intelligence transformation : a playbook for the next generation of business and technology leaders
Published 2020Table of Contents: “…Types of Uses for Machine Learning -- Types of Machine Learning Algorithms -- Supervised, Unsupervised, and Semisupervised Learning -- Making Data More Useful -- Semantic Reasoning -- Applications of AI -- PART II Artificial Intelligence in the Enterprise -- Chapter 3 AI in E-Commerce and Retail -- Digital Advertising -- Marketing and Customer Acquisition -- Cross-Selling, Up-Selling, and Loyalty -- Business-to-Business Customer Intelligence -- Dynamic Pricing and Supply Chain Optimization -- Digital Assistants and Customer Engagement -- Chapter 4 AI in Financial Services -- Anti-Money Laundering.…”
Full text (MFA users only)
Electronic eBook -
146
Differential algebra and related topics - proceedings of the international workshop.
Published 2002Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
Full text (MFA users only)
Electronic eBook -
147
-
148
Fast sequential Monte Carlo methods for counting and optimization
Published 2013Full text (MFA users only)
Electronic eBook -
149
Trends in Functional Programming.
Published 2007Table of Contents: “…Front Cover; Preliminary Pages; Contents; Preface; Proving Termination Using Dependent Types: The Case of Xor-Terms; Proving the Correctness of Algorithmic Debugging for Functional Programs; Systematic Synthesis of Functions; A Purely Functional Implementation of ROBDDs in Haskell; Efficient Interpretation by Transforming Data Types and Patterns to Functions; Object-Oriented Programming in Dependent Type Theory; A Sharing Analysis for SAFE; Memory Usage Improvement Using Runtime Alias Detection; A Model of Functional Programming with Dynamic Compilation and Optimization.…”
Full text (MFA users only)
Electronic eBook -
150
Language and logos : studies in theoretical and computational linguistics
Published 2010Table of Contents: “…CONTENTS -- Preface -- Part I Syntax -- A Spurious Genitive Puzzle in Polish -- Semantic Type Effects on Crossing Movement in German -- Me and Chomsky -- On the Typology of Verb Second -- Movement from Verb-Second Clauses Revisited -- Spurious Ambiguities and the Parentheticals Debate -- Part II Semantics -- On Squeamishness of the Royal Kind -- Information Structure of schon -- When- Clauses, Factive Verbs and Correlates -- The Proof Theory of Partial Variables -- Brentano's Apple -- How to Interpret Expletive Negation under bevor in German…”
Full text (MFA users only)
Electronic eBook -
151
-
152
Rediscovering mathematics : you do the math
Published 2011Full text (MFA users only)
Electronic eBook -
153
Advanced Methods and Technologies for Agent and Multi-Agent Systems.
Published 2013Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
Full text (MFA users only)
Electronic eBook -
154
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
155
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook -
156
-
157
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
158
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
159
Mastering D3.js.
Published 2014Table of Contents: “…Updating the datasetFixing the enter and exit transitions; Using the barcode chart; Creating a layout algorithm; The radial layout; Computing the angles; Using the layout; Summary; Chapter 3: Creating Visualizations without SVG; SVG support in the browser market; Visualizations without SVG; Loading and sorting the data; The force layout method; Setting the color and size; Creating a legend; Polyfilling; Feature detection; The canvg example; Using canvas and D3; Creating figures with canvas; Creating shapes; Integrating canvas and D3; Summary; Chapter 4: Creating a Color Picker with D3.…”
Full text (MFA users only)
Electronic eBook -
160
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook