Search Results - (((((((want OR hands) OR jantii) OR make) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 74
- Machine learning 67
- Mathematical models 65
- Artificial intelligence 64
- Mathematics 48
- artificial intelligence 39
- Data mining 38
- Decision making 38
- Algorithms 33
- algorithms 30
- Python (Computer program language) 29
- methods 28
- Technological innovations 25
- Artificial Intelligence 23
- Computer algorithms 22
- Social aspects 22
- Computer networks 21
- Application software 20
- Big data 20
- Development 20
- Mathematical optimization 20
- Data Mining 19
- Management 18
- decision making 18
- Diseases 16
- Information technology 16
- Machine Learning 16
- Neural networks (Computer science) 16
- Signal processing 16
- Computer science 15
Search alternatives:
- jantii »
- share »
-
1
-
2
Optimization of Computer Networks : Modeling and Algorithms: a Hands-On Approach.
Published 2016Table of Contents: “…7.1 Introduction -- 7.2 Node Location Problems -- 7.3 Full Topology Design Problems -- 7.4 Multilayer Network Design -- 7.5 Notes and Sources -- 7.6 Exercises -- References -- Part Two: Algorithms -- Chapter 8: Gradient Algorithms in Network Design -- 8.1 Introduction -- 8.2 Convergence Rates -- 8.3 Projected Gradient Methods -- 8.4 Asynchronous and Distributed Algorithm Implementations -- 8.5 Non-Smooth Functions -- 8.6 Stochastic Gradient Methods -- 8.7 Stopping Criteria -- 8.8 Algorithm Design Hints -- 8.9 Notes and Sources -- 8.10 Exercises -- References…”
Full text (MFA users only)
Electronic eBook -
3
Obstetric clinical algorithms : management and evidence
Published 2010Subjects: “…Obstetrics Decision making.…”
Full text (MFA users only)
Electronic eBook -
4
-
5
Making Surveillance Public : Why You Should Be More Woke about AI and Algorithms.
Published 2024Full text (MFA users only)
Electronic eBook -
6
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
7
Theory and Algorithms for Cooperative Systems.
Published 2004Full text (MFA users only)
Electronic eBook -
8
-
9
Algorithmic Puzzles.
Published 2011Table of Contents: “…-- General strategies for algorithm design -- Analysis techniques -- Easier puzzles (#1 to #50) -- Puzzles of medium difficulty (#51 to #110) -- Harder puzzles (#111 to #150) -- Hints -- Solutions -- References -- Design stragety and analysis index.…”
Full text (MFA users only)
Electronic eBook -
10
Algorithms for Dummies.
Published 2022Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Algorithms -- Chapter 1 Introducing Algorithms -- Describing Algorithms -- The right way to make toast: Defining algorithm uses -- Finding algorithms everywhere -- Using Computers to Solve Problems -- Getting the most out of modern CPUs and GPUs -- Working with special-purpose chips -- Networks: Sharing is more than caring -- Leveraging available data…”
Full text (MFA users only)
Electronic eBook -
11
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
12
-
13
The rise of the algorithms : how YouTube and TikTok conquered the world
Published 2024Full text (MFA users only)
Electronic eBook -
14
-
15
-
16
-
17
-
18
Algorithms for worst-case design and applications to risk management
Published 2002Full text (MFA users only)
Electronic eBook -
19
Handbook of Satisfiability : Handbook of Satisfiability.
Published 2009Subjects: “…Decision making Congresses.…”
Full text (MFA users only)
Electronic eBook -
20
Introduction to cryptography
Published 2018Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
Full text (MFA users only)
Electronic eBook