Search Results - (((((((want OR granting) OR span) OR wants) OR cantor) OR anne) OR carter) OR panting) algorithms.

Refine Results
  1. 1
  2. 2
  3. 3

    Probability and Algorithms. by Staff, National Research Council

    Published 1900
    Table of Contents: “…""PROBABILITY AND ALGORITHMS""; ""Copyright""; ""Preface""; ""Contents""; ""1. …”
    Full text (MFA users only)
    Electronic eBook
  4. 4
  5. 5

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  6. 6

    An Introduction to Algorithmic Trading : Basic to Advanced Strategies. by Leshik, Edward, Cralle, Jane

    Published 2011
    Table of Contents: “…Introduction to trading algorithms. History ; All about trading algorithms you ever wanted to know ... ; Algos defined and explained ; Who uses and provides algos ; Why have they become mainstream so quickly? …”
    Full text (MFA users only)
    Electronic eBook
  7. 7

    An introduction to the analysis of algorithms by Soltys, Michael, 1971-

    Published 2012
    Table of Contents: “…Notes -- 2. Greedy algorithms. 2.1. Minimum cost spanning trees. 2.2. Jobs with deadlines and profits. 2.3. …”
    Full text (MFA users only)
    Electronic eBook
  8. 8
  9. 9

    C# Data Structures and Algorithms : Explore the possibilities of C# for developing a variety of efficient applications. by Jamro, Marcin

    Published 2018
    Table of Contents: “…InsertionRemoval; Example -- BST visualization; AVL trees; Implementation; Example -- keep the tree balanced; Red-black trees; Implementation; Example -- RBT-related features; Binary heaps; Implementation; Example -- heap sort; Binomial heaps; Fibonacci heaps; Summary; Chapter 6: Exploring Graphs; Concept of graphs; Applications; Representation; Adjacency list; Adjacency matrix; Implementation; Node; Edge; Graph; Example -- undirected and unweighted edges; Example -- directed and weighted edges; Traversal; Depth-first search; Breadth-first search; Minimum spanning tree; Kruskal's algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  10. 10

    Graph algorithms and applications 3

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  11. 11

    Network Routing : Algorithms, Protocols, and Architectures. by Medhi, Deep

    Published 2017
    Table of Contents: “…2.7.2 Distance Vector-Based Approach2.8 Shortest Widest Path and Widest Shortest Path; 2.9 Tree, Spanning Tree, and Steiner Tree Algorithms; 2.9.1 Spanning Tree: Breadth First Search and Depth First Search; 2.9.2 Minimum Spanning Tree; 2.9.3 Steiner Tree; 2.10 k-Shortest Paths Algorithm; 2.11 Summary; Further Lookup; Exercises; 3 Routing Protocols: Framework and Principles; 3.1 Routing Protocol, Routing Algorithm, and Routing Table; 3.2 Routing Information Representation and Protocol Messages; 3.3 Distance Vector Routing Protocol; 3.3.1 Conceptual Framework and Illustration.…”
    Full text (MFA users only)
    Electronic eBook
  12. 12
  13. 13
  14. 14

    Data Structure and Algorithms Using C++ : A Practical Implementation. by Mohanty, Sachi Nandan

    Published 2021
    Table of Contents: “…4.8 Inline Member Function -- 4.9 Friend Function -- 4.9.1 Simple Friend Function -- 4.9.2 Friend With Inline Substitution -- 4.9.3 Granting Friendship to Another Class (Friend Class) -- 4.9.4 More Than One Class Having the Same Friend Function -- 4.10 Static Data Member and Member Functions -- 4.11 Constructor and Destructor -- 4.11.1 Constructor -- 4.11.2 Destructor -- 4.12 Dynamic Memory Allocation -- 4.13 This Pointer -- 4.14 Class Within Class -- 4.15 Questions -- 5 Stack -- 5.1 STACK -- 5.2 Operations Performed With STACK -- 5.3 ALGORITHMS -- 5.4 Applications of STACK…”
    Full text (MFA users only)
    Electronic eBook
  15. 15
  16. 16
  17. 17

    We are data : algorithms and the making of our digital selves by Cheney-Lippold, John

    Published 2017
    Table of Contents: “…-- Privacy: wanted dead or alive -- Conclusion: ghosts in the machine.…”
    Full text (MFA users only)
    Electronic eBook
  18. 18
  19. 19
  20. 20