Search Results - (((((((want OR kkanto) OR mantis) OR arts) OR cantor) OR anne) OR wint) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Mathematical models 37
- Machine learning 35
- Artificial intelligence 32
- Mathematics 22
- Data mining 20
- artificial intelligence 19
- Computer networks 16
- Mathematical optimization 15
- Artificial Intelligence 14
- Development 12
- Neural networks (Computer science) 12
- Python (Computer program language) 12
- Security measures 12
- Algorithms 11
- Application software 11
- Computer simulation 11
- Data Mining 11
- History 11
- Machine Learning 11
- Digital techniques 10
- Electronic data processing 10
- Management 10
- Social aspects 10
- algorithms 10
- Philosophy 9
- Technological innovations 9
- methods 9
- Bioinformatics 8
- Diseases 8
Search alternatives:
- mantis »
- arts »
- wint »
- granting »
-
1
Responsible Data Science : transparency and fairness in algorithms
Published 2021Full text (MFA users only)
Electronic eBook -
2
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
3
How to guard an art gallery and other discrete mathematical adventures
Published 2009Table of Contents: “…s Formula: Second Proof -- 2.8 Batting Averages and Lattice Points -- 2.9 Three Dimensions and N-largements -- 2.10 Notes and References -- 2.11 Problems -- 3 How to Guard an Art Gallery -- 3.1 The Sunflower Art Gallery -- 3.2 Art Gallery Problems -- 3.3 The Art Gallery Theorem -- 3.4 Colorful Consequences -- 3.5 Triangular and Chromatic Assumptions -- 3.6 Modern Art Galleries -- 3.7 Art Gallery Sketches -- 3.8 Right-Angled Art Galleries -- 3.9 Guarding the Guards -- 3.10 Three Dimensions and the Octoplex…”
Full text (MFA users only)
Electronic eBook -
4
Flowchart and Algorithm Basics : The Art of Programming.
Published 2020Full text (MFA users only)
Electronic eBook -
5
-
6
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
7
-
8
-
9
Pathway modeling and algorithm research
Published 2011Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
10
An Introduction to Algorithmic Trading : Basic to Advanced Strategies.
Published 2011Table of Contents: “…Introduction to trading algorithms. History ; All about trading algorithms you ever wanted to know ... ; Algos defined and explained ; Who uses and provides algos ; Why have they become mainstream so quickly? …”
Full text (MFA users only)
Electronic eBook -
11
Structural geology algorithms : vectors and tensors
Published 2012Full text (MFA users only)
Electronic eBook -
12
Ensemble methods : foundations and algorithms.
Published 2012Full text (MFA users only)
Electronic eBook -
13
Genome Sequencing Technology and Algorithms.
Published 2007Full text (MFA users only)
Electronic eBook -
14
-
15
Metaheuristic optimization for the design of automatic control laws
Published 2013Table of Contents: “…Motivations to use metaheuristic algorithms -- 1.3. Organization of the book -- Chapter 2. …”
Full text (MFA users only)
Electronic eBook -
16
Introduction to programming : learn to program in Java with data structures, algorithms, and logic
Published 2018Full text (MFA users only)
Electronic eBook -
17
Nearest-neighbor methods in learning and vision : theory and practice
Published 2005Full text (MFA users only)
Electronic eBook -
18
Data Structure and Algorithms Using C++ : A Practical Implementation.
Published 2021Table of Contents: “…4.8 Inline Member Function -- 4.9 Friend Function -- 4.9.1 Simple Friend Function -- 4.9.2 Friend With Inline Substitution -- 4.9.3 Granting Friendship to Another Class (Friend Class) -- 4.9.4 More Than One Class Having the Same Friend Function -- 4.10 Static Data Member and Member Functions -- 4.11 Constructor and Destructor -- 4.11.1 Constructor -- 4.11.2 Destructor -- 4.12 Dynamic Memory Allocation -- 4.13 This Pointer -- 4.14 Class Within Class -- 4.15 Questions -- 5 Stack -- 5.1 STACK -- 5.2 Operations Performed With STACK -- 5.3 ALGORITHMS -- 5.4 Applications of STACK…”
Full text (MFA users only)
Electronic eBook -
19
-
20
Algorithms, architectures and information systems security
Published 2009Table of Contents: “…Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T.K. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook