Search Results - (((((((want OR canton) OR mkantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.

Search alternatives:

  1. 201

    Handbook of operations research in natural resources

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  2. 202

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  3. 203
  4. 204

    Data mining techniques : for marketing, sales, and customer relationship management by Berry, Michael J. A.

    Published 2004
    Table of Contents: “…-- The virtuous cycle of data mining -- Data mining methodology and best practices -- Data mining applications in marketing and customer relationship management -- The lure of statistics : data mining using familiar tools -- Decision trees -- Artificial neural networks -- Nearest neighbor approaches : memory-based reasoning and collaborative filtering -- Market basket analysis and association rules -- Link analysis -- Automatic cluster detection -- Knowing when to worry : hazard functions and survival analysis in marketing -- Genetic algorithms -- Data mining throughout the customer life cycle -- Data warehousing, OLAP, and data mining -- Building the data mining environment -- Preparing data for mining -- Putting data mining to work.…”
    Full text (MFA users only)
    Electronic eBook
  5. 205

    Explorations in Computing : an Introduction to Computer Science. by Conery, John S.

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  6. 206

    Space division multiple access for wireless local area networks by Vandenameele, Patrick

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  7. 207

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook
  8. 208

    R High Performance Programming. by Lim, Aloysius

    Published 2015
    Table of Contents: “…Data parallelism versus task parallelismImplementing data parallel algorithms; Implementing task parallel algorithms; Running the same task on workers in a cluster; Running different tasks on workers in a cluster; Executing tasks in parallel on a cluster of computers; Shared memory versus distributed memory parallelism; Optimizing parallel performance; Summary; Chapter 9: Offloading Data Processing to Database Systems; Extracting data into R versus processing data in a database; Preprocessing data in a relational database using SQL; Converting R expressions into SQL; Using dplyr…”
    Full text (MFA users only)
    Electronic eBook
  9. 209

    Revolutionary routines : the habits of social transformation by Pedwell, Carolyn

    Published 2021
    Full text (MFA users only)
    Electronic eBook
  10. 210
  11. 211
  12. 212

    Creating E-Learning Games with Unity. by Horachek, David

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  13. 213

    Materials Science and Intelligent Technologies Applications : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Key Engineering Materials and Computer Sc...

    Published 2014
    Table of Contents: “…Automatic Badminton Action Recognition Using RGB-D SensorKinect-Based Badminton Action Analysis System; A Review of Hot Topic Detection and Tracking Technology; Study on the Improvement of TFIDF Algorithm in Data Mining; A New Protocol for Secure Distributed Multiplication of Two Polynomial Shared Values; Human Posture Recognition Based on DAG-SVMS; The Design and Implementation of Astronomical Multi-Catalog Storage and Cross-Match Based on Hadoop; The Multi-Scale Hough Transform Lane Detection Method Based on the Algorithm of Otsu and Canny; Design of Heart Sound Analyzer.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 214

    The bitcoin big bang : how alternative currencies are about to change the world by Kelly, Brian, 1971-

    Published 2014
    Table of Contents: “…; What Is Cryptography?; Still Want to Be a Miner?; Do We Need Another Bitcoin?; 7 Nautiluscoin-0 to 1 Million in 60 Days; Creating the Coin; Did It Work?…”
    Full text (MFA users only)
    Electronic eBook
  15. 215

    Ethnic studies in academic and research libraries

    Published 2021
    Table of Contents: “…"Build it and they will come" -- Fostering transformation -- The value of integrating African American archives into undergraduate studies -- Improving representation on Wikipedia -- Returning to where it all began and connecting the dots -- Collaborative and active engagement at the Hemispheric University -- Librarians and leaders -- Crafting contemporary indigenous studies collections in the age of algorithms -- Building a Vietnamese language collection with the Vietnamese diaspora community -- Engaging with ethnic studies librarians -- For when they arrive -- BIPOC voices speak -- Supporting faculty in indigenizing curriculum and pedagogy -- Student-driven collecting efforts and initiatives -- Making spaces for ethnic studies -- Modeling Black literature -- A perspective on Asian American studies and librarianship -- Holdings in the archives are closer than they appear -- Reclaiming the Asian American history narrative -- Connecting graduate library and information studies students with ethnic studies archives.…”
    Full text (MFA users only)
    Electronic eBook
  16. 216

    Wireless sensor systems for extreme environments : space, underwater, underground and industrial

    Published 2017
    Table of Contents: “…Chapter 4 On Improving Connectivity-based Localization in Wireless Sensor Networks4.1 Introduction; 4.2 Connectivity-based Localization in One-hop Networks; 4.2.1 The Centroid Algorithm; 4.2.2 Improved Centroid Algorithms; 4.3 Connectivity-based Localization in Multi-hop Networks; 4.3.1 The DV-hop Algorithm; 4.3.2 Mathematics of Hop-count-based Localization; 4.4 On Improving Connectivity-based Localization; 4.4.1 Improvements by Adjusting Correction Factor; 4.4.2 Improvements by Exploiting Neighborhood Information; 4.5 Summary; References.…”
    Full text (MFA users only)
    Electronic eBook
  17. 217
  18. 218

    Data clustering in C++ : an object-oriented approach by Gan, Guojun, 1979-

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  19. 219

    OIPE 2012

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  20. 220

    Parallel computing : technology trends

    Published 2020
    Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook