Search Results - (((((((want OR casts) OR frantic) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 30
- Machine learning 26
- Artificial intelligence 25
- Mathematics 19
- Data mining 18
- Algorithms 15
- Mathematical models 14
- Technological innovations 14
- algorithms 14
- artificial intelligence 14
- Computer networks 12
- Information technology 12
- Application software 11
- Development 11
- Management 11
- Python (Computer program language) 11
- methods 11
- Computer algorithms 10
- Neural networks (Computer science) 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Materials 9
- Engineering 8
- Manufacturing processes 8
- Materials science 8
- Social aspects 8
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
Search alternatives:
-
141
Revolutionary routines : the habits of social transformation
Published 2021Full text (MFA users only)
Electronic eBook -
142
Principles of Quantum Computation and Information, Volume I : Basic Concepts.
Published 2004Full text (MFA users only)
Electronic eBook -
143
-
144
-
145
Delphi High Performance : Build fast Delphi applications using concurrency, parallel programming and memory management.
Published 2018Table of Contents: “…; Different types of speed; Algorithm complexity; Big O and Delphi data structures; Data structures in practice; Mr. …”
Full text (MFA users only)
Electronic eBook -
146
Materials Science and Intelligent Technologies Applications : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Key Engineering Materials and Computer Sc...
Published 2014Table of Contents: “…Automatic Badminton Action Recognition Using RGB-D SensorKinect-Based Badminton Action Analysis System; A Review of Hot Topic Detection and Tracking Technology; Study on the Improvement of TFIDF Algorithm in Data Mining; A New Protocol for Secure Distributed Multiplication of Two Polynomial Shared Values; Human Posture Recognition Based on DAG-SVMS; The Design and Implementation of Astronomical Multi-Catalog Storage and Cross-Match Based on Hadoop; The Multi-Scale Hough Transform Lane Detection Method Based on the Algorithm of Otsu and Canny; Design of Heart Sound Analyzer.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
147
The bitcoin big bang : how alternative currencies are about to change the world
Published 2014Table of Contents: “…; What Is Cryptography?; Still Want to Be a Miner?; Do We Need Another Bitcoin?; 7 Nautiluscoin-0 to 1 Million in 60 Days; Creating the Coin; Did It Work?…”
Full text (MFA users only)
Electronic eBook -
148
Building Machine Learning Systems with Python.
Published 2013Full text (MFA users only)
Electronic eBook -
149
Ranking the Liveability of the World's Major Cities : the Global Liveable Cities Index (GLCI).
Published 2012Full text (MFA users only)
Electronic eBook -
150
Data clustering in C++ : an object-oriented approach
Published 2011Full text (MFA users only)
Electronic eBook -
151
Handbook for pandemic and mass-casualty planning and response
Published 2012Table of Contents: “…Burn Injuries during Mass-Casualty IncidentsBlast Injuries; Section 3: Communication and Information Sharing; Information Sharing in Practice and for Practice: Mass-Casualty Cases; Communication between Emergency Medical Services and Media during Mass-Casualty Events in Croatia; Just-in-Time Information; Collaboration Topologies for Interdisciplinary and Interlevel Information Exchange; Networks and Their Role in Counteracting Contemporary Global Threats: A New Model; Architecture of R & D Project Management Systems at Medical Institutions; Lessons Learned; Lessons Learned; Subject Index…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
152
Parallel computing : technology trends
Published 2020Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
153
High performance computing on complex environments
Published 2014Table of Contents: “…Chapter 4: Parallel Algorithms for Parabolic Problems on Graphs in Neuroscience4.1 Introduction; 4.2 Formulation of the Discrete Model; 4.3 Parallel Algorithms; 4.4 Computational Results; 4.5 Conclusions; Acknowledgments; References; Part III: Communication and Storage Considerations in High-Performance Computing; Chapter 5: An Overview of Topology Mapping Algorithms and Techniques in High-Performance Computing; 5.1 Introduction; 5.2 General Overview; 5.3 Formalization of the Problem; 5.4 Algorithmic Strategies for Topology Mapping; 5.5 Mapping Enforcement Techniques; 5.6 Survey of Solutions.…”
Full text (MFA users only)
Electronic eBook -
154
Iterative learning control for multi-agent systems coordination
Published 2017Full text (MFA users only)
Electronic eBook -
155
Communicating process architectures 2002.
Published 2002Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
Full text (MFA users only)
Electronic eBook -
156
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
Full text (MFA users only)
Electronic eBook -
157
Advances in time series forecasting. Volume 2
Published 2017Table of Contents: “…INTRODUCTION -- CLASSICAL TIME SERIES FORECASTING MODELS -- ARTIFICIAL NEURAL NETWORKS FOR FORECASTING TIME SERIES -- A NEW ARTIFICIAL NEURAL NETWORK WITH DETERMINISTIC COMPONENTS -- APPLICATIONS -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Fuzzy Time Series Approach Based on Genetic Algorithm with Single Analysis Process -- Ozge Cagcag Yolcu* -- INTRODUCTION -- FUZZY TIME SERIES -- RELATED METHODS -- Genetic Algorithm (GA) -- Single Multiplicative Neuron Model -- PROPOSED METHOD -- APPLICATIONS -- CONCLUSION AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Forecasting Stock Exchanges with Fuzzy Time Series Approach Based on Markov Chain Transition Matrix -- Cagdas Hakan Aladag1,* and Hilal Guney2 -- INTRODUCTION -- FUZZY TIME SERIES -- TSAUR 'S FUZZY TIME SERIES MARKOV CHAIN MODEL -- THE IMPLEMENTATION -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A New High Order Multivariate Fuzzy Time Series Forecasting Model -- Ufuk Yolcu* -- INTRODUCTION -- RELATED METHODOLOGY -- The Fuzzy C-Means (FCM) Clustering Method -- Single Multiplicative Neuron Model Artificial Neural Network (SMN-ANN) -- Fuzzy Time Series -- THE PROPOSED METHOD -- APPLICATIONS -- CONCLUSIONS AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Fuzzy Functions Approach for Time Series Forecasting -- Ali Z. …”
Full text (MFA users only)
Electronic eBook -
158
Stochastic Models in Reliability Engineering.
Published 2020Table of Contents: “…4.3.1 Run and Phrase -- 4.3.2 Multi-State Compression Algorithm -- 4.4 Proposed Multi-State Inference Algorithm -- 4.4.1 Rules for Calculating Intermediate Variables -- 4.4.2 Proposed Multi-State Inference Algorithm -- 4.5 Case Study -- 4.5.1 Case Background -- 4.5.2 Calculation and Analysis -- 4.6 Summary -- Appendix A -- Appendix B -- References -- Chapter 5 Reliability Analysis of Demand-Based Warm Standby System with Multi-State Common Bus -- 5.1 Introduction -- 5.2 Model Description for a DBWSS with Multi-State Common Bus Performance Sharing…”
Full text (MFA users only)
Electronic eBook -
159
Materials Science and Engineering Technology : Selected, peer reviewed papers from the 2014 International Conference on Materials Science and Engineering Technology (MSET 2014), Ju...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
160
PRINCIPLES OF QUANTUM ARTIFICIAL INTELLIGENCE.
Published 2013Table of Contents: “…Computation; 2.1 Entscheidungsproblem; 2.1.1 Cantor's diagonal argument; 2.1.2 Reductio ad absurdum; 2.2 Complexity Theory; 2.2.1 Decision problems; 2.2.2 P and NP; 2.3 Church-Turing Thesis; 2.3.1 Church-Turing-Deutsch principle; 2.4 Computers; 2.4.1 Analog computers; 2.4.2 Digital computers; 2.4.3 Von Neumann architecture; 3. …”
Full text (MFA users only)
Electronic eBook