Search Results - (((((((want OR hwants) OR wanting) OR makant) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 141

    R High Performance Programming. by Lim, Aloysius

    Published 2015
    Table of Contents: “…Data parallelism versus task parallelismImplementing data parallel algorithms; Implementing task parallel algorithms; Running the same task on workers in a cluster; Running different tasks on workers in a cluster; Executing tasks in parallel on a cluster of computers; Shared memory versus distributed memory parallelism; Optimizing parallel performance; Summary; Chapter 9: Offloading Data Processing to Database Systems; Extracting data into R versus processing data in a database; Preprocessing data in a relational database using SQL; Converting R expressions into SQL; Using dplyr…”
    Full text (MFA users only)
    Electronic eBook
  2. 142

    Integrated and collaborative product development environment : technologies and implementations by Li, W. D.

    Published 2006
    Table of Contents: “…Intelligent Optimisation of Process Planning; 5.1 Intelligent Optimisation Strategies for CAPP Systems; 5.2 Knowledge Representation of Process Plans; 5.2.1 Process plan representation; 5.2.2 Machining cost criteria for process plans; 5.2.3 Precedence constraints; 5.3 A Hybrid GA/SA-based Optimisation Method; 5.3.1 Overview of the algorithm; 5.3.2 Genetic algorithm -- phase 1; 5.3.3 Simulated annealing algorithm -- phase 2; 5.3.4 Constraint handling algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  3. 143
  4. 144

    Experiencing architecture in the nineteenth century : buildings and society in the modern age

    Published 2019
    Table of Contents: “…'The pressing public want of the age': The arrival of the grand hotel'Bitter competition in the London hotel world': The problem of publicity; 'A wealthy man's private mansion': The assurance of exclusivity; The 'spirit of the time': Cosmopolitanism and heterosociability; Conclusion; Chapter 10: 'The fullest fountain of advancing civilization': Experiencing Anthony Trollope's House of Commons, 1852-82; Experiences of Parliament; Progressive architecture; A political theatre; Conclusion: Reading experiences.…”
    Full text (MFA users only)
    Electronic eBook
  5. 145

    Delphi High Performance : Build fast Delphi applications using concurrency, parallel programming and memory management. by Gabrijelčič, Primož

    Published 2018
    Table of Contents: “…; Different types of speed; Algorithm complexity; Big O and Delphi data structures; Data structures in practice; Mr. …”
    Full text (MFA users only)
    Electronic eBook
  6. 146

    Materials Science and Intelligent Technologies Applications : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Key Engineering Materials and Computer Sc...

    Published 2014
    Table of Contents: “…Automatic Badminton Action Recognition Using RGB-D SensorKinect-Based Badminton Action Analysis System; A Review of Hot Topic Detection and Tracking Technology; Study on the Improvement of TFIDF Algorithm in Data Mining; A New Protocol for Secure Distributed Multiplication of Two Polynomial Shared Values; Human Posture Recognition Based on DAG-SVMS; The Design and Implementation of Astronomical Multi-Catalog Storage and Cross-Match Based on Hadoop; The Multi-Scale Hough Transform Lane Detection Method Based on the Algorithm of Otsu and Canny; Design of Heart Sound Analyzer.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 147
  8. 148

    Comprehensive Ruby Programming. by Hudgens, Jordan

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  9. 149

    Handbook for pandemic and mass-casualty planning and response

    Published 2012
    Table of Contents: “…Burn Injuries during Mass-Casualty IncidentsBlast Injuries; Section 3: Communication and Information Sharing; Information Sharing in Practice and for Practice: Mass-Casualty Cases; Communication between Emergency Medical Services and Media during Mass-Casualty Events in Croatia; Just-in-Time Information; Collaboration Topologies for Interdisciplinary and Interlevel Information Exchange; Networks and Their Role in Counteracting Contemporary Global Threats: A New Model; Architecture of R & D Project Management Systems at Medical Institutions; Lessons Learned; Lessons Learned; Subject Index…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 150

    Parallel computing : technology trends

    Published 2020
    Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  11. 151

    High performance computing on complex environments by Jeannot, Emmanuel

    Published 2014
    Table of Contents: “…Chapter 4: Parallel Algorithms for Parabolic Problems on Graphs in Neuroscience4.1 Introduction; 4.2 Formulation of the Discrete Model; 4.3 Parallel Algorithms; 4.4 Computational Results; 4.5 Conclusions; Acknowledgments; References; Part III: Communication and Storage Considerations in High-Performance Computing; Chapter 5: An Overview of Topology Mapping Algorithms and Techniques in High-Performance Computing; 5.1 Introduction; 5.2 General Overview; 5.3 Formalization of the Problem; 5.4 Algorithmic Strategies for Topology Mapping; 5.5 Mapping Enforcement Techniques; 5.6 Survey of Solutions.…”
    Full text (MFA users only)
    Electronic eBook
  12. 152

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
    Full text (MFA users only)
    Electronic eBook
  13. 153
  14. 154

    Business Hack : the Wealth Dragon Way to Build a Successful Business in the Digital Age. by Lee, John

    Published 2018
    Table of Contents: “…Out with the Old, in with the NewThe AI Revolution; Think Laterally; Who Wants to Live Forever?; Who's the Expert Now?; Which Future?…”
    Full text (MFA users only)
    Electronic eBook
  15. 155
  16. 156

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  17. 157
  18. 158

    Advances in time series forecasting. Volume 2

    Published 2017
    Table of Contents: “…INTRODUCTION -- CLASSICAL TIME SERIES FORECASTING MODELS -- ARTIFICIAL NEURAL NETWORKS FOR FORECASTING TIME SERIES -- A NEW ARTIFICIAL NEURAL NETWORK WITH DETERMINISTIC COMPONENTS -- APPLICATIONS -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Fuzzy Time Series Approach Based on Genetic Algorithm with Single Analysis Process -- Ozge Cagcag Yolcu* -- INTRODUCTION -- FUZZY TIME SERIES -- RELATED METHODS -- Genetic Algorithm (GA) -- Single Multiplicative Neuron Model -- PROPOSED METHOD -- APPLICATIONS -- CONCLUSION AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Forecasting Stock Exchanges with Fuzzy Time Series Approach Based on Markov Chain Transition Matrix -- Cagdas Hakan Aladag1,* and Hilal Guney2 -- INTRODUCTION -- FUZZY TIME SERIES -- TSAUR 'S FUZZY TIME SERIES MARKOV CHAIN MODEL -- THE IMPLEMENTATION -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A New High Order Multivariate Fuzzy Time Series Forecasting Model -- Ufuk Yolcu* -- INTRODUCTION -- RELATED METHODOLOGY -- The Fuzzy C-Means (FCM) Clustering Method -- Single Multiplicative Neuron Model Artificial Neural Network (SMN-ANN) -- Fuzzy Time Series -- THE PROPOSED METHOD -- APPLICATIONS -- CONCLUSIONS AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Fuzzy Functions Approach for Time Series Forecasting -- Ali Z. …”
    Full text (MFA users only)
    Electronic eBook
  19. 159

    Stochastic Models in Reliability Engineering. by Cui, Lirong

    Published 2020
    Table of Contents: “…4.3.1 Run and Phrase -- 4.3.2 Multi-State Compression Algorithm -- 4.4 Proposed Multi-State Inference Algorithm -- 4.4.1 Rules for Calculating Intermediate Variables -- 4.4.2 Proposed Multi-State Inference Algorithm -- 4.5 Case Study -- 4.5.1 Case Background -- 4.5.2 Calculation and Analysis -- 4.6 Summary -- Appendix A -- Appendix B -- References -- Chapter 5 Reliability Analysis of Demand-Based Warm Standby System with Multi-State Common Bus -- 5.1 Introduction -- 5.2 Model Description for a DBWSS with Multi-State Common Bus Performance Sharing…”
    Full text (MFA users only)
    Electronic eBook
  20. 160

    PRINCIPLES OF QUANTUM ARTIFICIAL INTELLIGENCE. by Wichert, Andreas

    Published 2013
    Table of Contents: “…Computation; 2.1 Entscheidungsproblem; 2.1.1 Cantor's diagonal argument; 2.1.2 Reductio ad absurdum; 2.2 Complexity Theory; 2.2.1 Decision problems; 2.2.2 P and NP; 2.3 Church-Turing Thesis; 2.3.1 Church-Turing-Deutsch principle; 2.4 Computers; 2.4.1 Analog computers; 2.4.2 Digital computers; 2.4.3 Von Neumann architecture; 3. …”
    Full text (MFA users only)
    Electronic eBook