Search Results - (((((((want OR kdantis) OR wantis) OR markant) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 28
- Artificial intelligence 25
- Machine learning 25
- Data mining 17
- Mathematics 17
- Algorithms 15
- Mathematical models 14
- algorithms 14
- artificial intelligence 14
- Technological innovations 12
- Application software 11
- Computer networks 11
- Development 11
- Computer algorithms 10
- Management 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Information technology 9
- methods 9
- Social aspects 8
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
- Mathematical optimization 6
- Parallel processing (Electronic computers) 6
- Wireless communication systems 6
- Bioinformatics 5
Search alternatives:
-
321
Digital information ecosystems : smart press
Published 2019Table of Contents: “…The problem of revenue sharing between media and social networks; 6.2. The social network eco-system; 6.2.1. …”
Full text (MFA users only)
Electronic eBook -
322
Advanced security solutions for multimedia
Published 2021Full text (MFA users only)
Electronic eBook -
323
IP multicast with applications to IPTV and mobile DVB-H
Published 2008Table of Contents: “…Cover -- TOC36;CONTENTS -- Preface -- About the Author -- CH36;1 INTRODUCTION TO IP MULTICAST -- 146;1 Introduction -- 146;2 Why Multicast Protocols are Wanted47;Needed -- 146;3 Basic Multicast Protocols and Concepts -- 146;4 IPTV and DVB45;H Applications -- 146;5 Course of Investigation -- Appendix 146;A58; Multicast IETF Request for Comments -- Appendix 146;B58; Multicast Bibliography -- References -- CH36;2 MULTICAST ADDRESSING FOR PAYLOAD -- 246;1 IP Multicast Addresses -- 246;146;1 Limited Scope Addresses -- 246;146;2 GLOP Addressing -- 246;146;3 Generic IPv4 Addressing -- 246;2 Layer 2 Multicast Addresses -- 246;246;1 Ethernet MAC Address Mapping -- 246;3 MPEG45;Layer Addresses -- References -- CH36;3 MULTICAST PAYLOAD FORWARDING -- 346;1 Multicasting on a LAN Segment -- 346;2 Multicasting between Network Segments -- 346;3 Multicast Distribution Trees -- 346;4 Multicast Forwarding58; Reverse Path Forwarding -- 346;5 Multicast Forwarding58; Center45;Based Tree Algorithm -- 346;6 Implementing IP Multicast in a Network -- References -- CH36;4 DYNAMIC HOST REGISTRATION8212;INTERNET GROUP MANAGEMENT PROTOCOL -- 446;1 IGMP Messages -- 446;2 IGMPv3 Messages -- 446;3 IGMP Operation -- Appendix 446;A58; Protocol Details for IGMPv2 -- 446;A46;1 Overview -- 446;A46;2 Protocol Description -- 446;A46;3 Receiver 40;Host41; State Diagram -- 446;A46;4 Router State Diagram -- Appendix 446;B58; IGMP Snooping Switches -- Appendix 446;C58; Example of Router Configurations -- References -- CH36;5 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; PROTOCOL INDEPENDENT MULTICAST -- 546;1 Introduction to PIM -- 546;2 PIM SM Details -- 546;246;1 Approach -- 546;246;2 PIM SM Protocol Overview -- 546;246;3 Detailed Protocol Description -- 546;246;4 Packet Formats -- References -- CH36;6 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; CORE45;BASED TREES -- 646;1 Motivation -- 646;2 Basic Operation -- 646;3 CBT Components and Functions -- 646;346;1 CBT Control Message Retransmission Strategy -- 646;346;2 Nonmember Sending -- 646;4 Core Router Discovery -- 646;5 Protocol Specification Details -- 646;546;1 CBT HELLO Protocol -- 646;546;2 JOIN_REQUEST Processing -- 646;546;3 JOIN_ACK Processing -- 646;546;4 QUIT_NOTIFICATION Processing -- 646;546;5 ECHO_REQUEST Processing -- 646;546;6 ECHO_REPLY Processing -- 646;546;7 FLUSH_TREE Processing -- 646;546;8 Nonmember Sending -- 646;546;9 Timers and Default Values -- 646;546;10 CBT Packet Formats and Message Types -- 646;546;11 Core Router Discovery -- 646;6 CBT Version 3 -- 646;646;1 The First Step58; Joining the Tree -- 646;646;2 Transient State -- 646;646;3 Getting 34;On Tree34; -- 646;646;4 Pruning and Prune State -- 646;646;5 The Forwarding Cache -- 646;646;6 Packet Forwarding -- 646;646;7 The 34;Keepalive34; Protocol -- 646;646;8 Control Message Precedence and Forwarding Criteria -- 646;646;9 Broadcast LANs -- 646;646;10 The 34;all45;cbt45;routers34; Group -- 646;646;11 Nonmember Sending -- References -- CH36;7 MULTICAST ROUTING8212;DENSE45;MODE PROTOCOLS58; PIM DM.…”
Full text (MFA users only)
Electronic eBook -
324
Security, Privacy and Reliability in Computer Communications and Networks.
Published 2016Table of Contents: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN INNOVATION AND CHANGE IN EDUCATION -- CROSS-CULTURAL PERSPECTIVE -- Title Page -- Security, Privacy and Reliability in Computer Communications and Networks -- Copyright Page -- Contents -- Preface -- Acknowledgments -- List of Contributors -- List of Figures -- List of Tables -- List of Algorithms -- List of Abbreviations -- PART I -- Privacy -- Chapter 1 -- Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Ad Hoc Networks -- Abstract -- 1.1 Introduction -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures -- 1.2.1 Anonymity Definition and Assessment -- 1.2.2 Antitraffic Analysis Measures -- 1.3 System Assumptions and Attack Model -- 1.3.1 Network Model -- 1.3.2 Adversary Model -- 1.3.3 Evidence Theory and Belief Metric -- 1.4 Distributed Beamforming to Increase the BS Anonymity -- 1.4.1 Overview of the DiBAN Protocol -- 1.4.2 DiBAN Illustrative Example -- 1.4.3 DiBAN Energy Analysis -- 1.5 Distributed Beamforming Relay Selection Approach -- 1.6 Validation Experiments -- 1.6.1 Simulation Environment -- 1.6.2 Simulation Results -- 1.7 Conclusions and FutureWork -- Appendix I: Numerical Evidence Theory Belief Calculation Example -- References -- Chapter 2 -- A Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication -- Abstract -- 2.1 Introduction -- 2.2 Related Works -- 2.3 System Model and Preliminaries -- 2.3.1 Network Model -- 2.3.2 Attack Model -- 2.3.3 Security Requirements -- 2.4 The Proposed PETS Scheme -- 2.4.1 Scheme Overview -- 2.4.2 System Initiation -- 2.4.3 Vehicle-RSU Key Agreement -- 2.4.4 Traffic Information Collection and Aggregation -- 2.4.5 Traffic Jam Message Propagation -- 2.5 Security Analysis -- 2.6 Performance Evaluation -- 2.6.1 Traffic Information Sending/Collection Overhead.…”
Full text (MFA users only)
Electronic eBook -
325
SCADA Security : Machine Learning Concepts for Intrusion Detection and Prevention.
Published 2020Table of Contents: “…6.3.1 Learning of Most-Representative Data Sets -- 6.3.2 Decision-Making Model -- 6.4 EXPERIMENTAL SETUP -- 6.4.1 Choice of Parameters -- 6.4.2 The Candidate Classifiers -- 6.5 RESULTS AND DISCUSSION -- 6.5.1 Integrating GATUD into SDAD -- 6.5.2 Integrating GATUD into the Clustering-based Method -- 6.6 CONCLUSION -- CHAPTER 7 Threshold Password-Authenticated Secret Sharing Protocolss -- 7.1 MOTIVATION -- 7.2 EXISTING SOLUTIONS -- 7.3 DEFINITION OF SECURITY -- 7.4 TPASS PROTOCOLS -- 7.4.1 Protocol-Based on Two-Phase Commitment -- 7.4.2 Protocol Based on Zero-Knowledge Proof -- 7.4.3 Correctness…”
Full text (MFA users only)
Electronic eBook -
326
Anesthesia student survival guide : a case-based approach
Published 2016Full text (MFA users only)
Electronic eBook -
327
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book -
328
-
329
XML for DB2 information integration
Published 2004Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
Full text (MFA users only)
Electronic eBook -
330
Fog and fogonomics : challenges and practices of fog computing, communication, networking, strategy, and economics
Published 2020Table of Contents: “…3.3.1.2 Computation Task Models 68 -- 3.3.1.3 Quality of Experience 71 -- 3.3.2 Computation Offloading Game 71 -- 3.3.2.1 Game Formulation 71 -- 3.3.2.2 Algorithm Development 74 -- 3.3.2.3 Price of Anarchy 74 -- 3.3.2.4 Performance Evaluation 75 -- 3.4 Conclusion 80 -- References 80 -- 4 Pricing Tradeoffs for Data Analytics in Fog-Cloud Scenarios 83 /Yichen Ruan, Liang Zheng, Maria Gorlatova, Mung Chiang, and Carlee Joe-Wong -- 4.1 Introduction: Economics and Fog Computing 83 -- 4.1.1 Fog Application Pricing 85 -- 4.1.2 Incentivizing Fog Resources 86 -- 4.1.3 A Fogonomics Research Agenda 86 -- 4.2 Fog Pricing Today 87 -- 4.2.1 Pricing Network Resources 87 -- 4.2.2 Pricing Computing Resources 89 -- 4.2.3 Pricing and Architecture Trade-offs 89 -- 4.3 Typical Fog Architectures 90 -- 4.3.1 Fog Applications 90 -- 4.3.2 The Cloud-to-Things Continuum 90 -- 4.4 A Case Study: Distributed Data Processing 92 -- 4.4.1 A Temperature Sensor Testbed 92 -- 4.4.2 Latency, Cost, and Risk 95 -- 4.4.3 System Trade-off: Fog or Cloud 98 -- 4.5 Future Research Directions 101 -- 4.6 Conclusion 102 -- Acknowledgments 102 -- References 103 -- 5 Quantitative and Qualitative Economic Benefits of Fog 107 /Joe Weinman -- 5.1 Characteristics of Fog Computing Solutions 108 -- 5.2 Strategic Value 109 -- 5.2.1 Information Excellence 110 -- 5.2.2 Solution Leadership 110 -- 5.2.3 Collective Intimacy 110 -- 5.2.4 Accelerated Innovation 111 -- 5.3 Bandwidth, Latency, and Response Time 111 -- 5.3.1 Network Latency 113 -- 5.3.2 Server Latency 114 -- 5.3.3 Balancing Consolidation and Dispersion to Minimize Total Latency 114 -- 5.3.4 Data Traffic Volume 115 -- 5.3.5 Nodes and Interconnections 116 -- 5.4 Capacity, Utilization, Cost, and Resource Allocation 117 -- 5.4.1 Capacity Requirements 117 -- 5.4.2 Capacity Utilization 118 -- 5.4.3 Unit Cost of Delivered Resources 119 -- 5.4.4 Resource Allocation, Sharing, and Scheduling 120 -- 5.5 Information Value and Service Quality 120 -- 5.5.1 Precision and Accuracy 120.…”
Full text (MFA users only)
Electronic eBook -
331
Big data analytics : turning big data into big money
Published 2013Full text (MFA users only)
Electronic eBook -
332
IBM TotalStorage : SAN product, design, and optimization guide
Published 2005Table of Contents: “…-- 1.1.2 The Internet brings increased risks -- 1.1.3 Planning for business continuity -- 1.2 Using a SAN for business continuance -- 1.2.1 SANs and business continuance -- 1.3 SAN business benefits -- 1.3.1 Storage consolidation and sharing of resources -- 1.3.2 Data sharing -- 1.3.3 Nondisruptive scalability for growth -- 1.3.4 Improved backup and recovery -- 1.3.5 High performance -- 1.3.6 High availability server clustering -- 1.3.7 Improved disaster tolerance -- 1.3.8 Allow selection of best of breed storage -- 1.3.9 Ease of data migration -- 1.3.10 Reduced total costs of ownership -- 1.3.11 Storage resources match e-business enterprise needs -- Chapter 2. …”
Full text (MFA users only)
Electronic eBook -
333
Reconfigurable computing : the theory and practice of FPGA-based computation
Published 2008Full text (MFA users only)
Electronic eBook -
334
Fuzzy Multiple Attribute Decision Making : Methods and Applications
Published 1992Full text (MFA users only)
Electronic eBook -
335
Technologies for sustainable development : proceedings of the 7th Nirma University International Conference on Engineering (NUiCONE 2019), November 21-22, 2019, Ahmedabad, India
Published 2020Full text (MFA users only)
Electronic Conference Proceeding eBook -
336
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
337
-
338
Medical and Care Compunetics 2 : Medical and Care Compunetics 2.
Published 2005Full text (MFA users only)
Electronic eBook -
339
-
340
Machine learning and cognitive computing for mobile communications and wireless networks
Published 2020Table of Contents: “…KNN and SVM Models for Wireless 60 3.4.2 Bayesian Learning for Cognitive Radio 60 3.4.3 Deep Learning in Wireless Network 61 3.4.4 Deep Reinforcement Learning in Wireless Network 62 3.4.5 Traffic Engineering and Routing 63 3.4.6 Resource Sharing and Scheduling 64 3.4.7 Power Control and Data Collection 64 3.5 Conclusion 65 References 66 4 Cognitive Computing for Smart Communication 73; Poonam Sharma,…”
Full text (MFA users only)
Electronic eBook