Search Results - (((((((want OR manthe) OR find) OR mantis) OR cantor) OR anne) OR halted) OR granting) algorithms.

  1. 181

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  2. 182

    Introduction to direction-of-arrival estimation by Chen, Zhizhang

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  3. 183

    Numerical Methods for Eigenvalue Problems. by Börm, Steffen

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  4. 184

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  5. 185

    Handbook of statistical analysis and data mining applications by Nisbet, Robert

    Published 2009
    Table of Contents: “…Basic Algorithms -- Chapter 8: Advanced Algorithms -- Chapter 9. …”
    Full text (MFA users only)
    Electronic eBook
  6. 186

    Mastering Scala machine learning by Kozlov, Alexander

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  7. 187

    Oracle SOA Suite 11g Performance Cookbook. by Brasier, Matthew

    Published 2013
    Table of Contents: “…Viewing the memory used using JRMC for JRockitViewing the memory used using VisualVM for HotSpot; Setting the size of the thread stack; Chapter 5: JVM Garbage Collection Tuning; Introduction; Setting the new size; Setting the survivor ratio; Choosing a garbage collection algorithm in HotSpot; Choosing a garbage collection algorithm in JRockit; Turning on verbose garbage collection; Tuning to reduce the number of full garbage collections; Disabling the RMI garbage collector; Disabling explicit GC; Chapter 6: Platform Tuning; Introduction; Tuning global transaction timeouts.…”
    Full text (MFA users only)
    Electronic eBook
  8. 188
  9. 189
  10. 190

    Role mining in business : taming role-based access control administration by Colantonio, Alessandro

    Published 2012
    Table of Contents: “…Problem formalization. 7.3. Finding optimal role-sets. 7.4. Finding sub-optimal role-sets. 7.5. …”
    Full text (MFA users only)
    Electronic eBook
  11. 191

    Creating E-Learning Games with Unity. by Horachek, David

    Published 2014
    Table of Contents: “…; Summary; Chapter 3: Mission One -- Find the Facts; Finding the facts; Designing games to maximize fun…”
    Full text (MFA users only)
    Electronic eBook
  12. 192

    Social sensing : building reliable systems on unreliable data by Wang, Dong, Abdelzaher, Tarek, Kaplan, Lance

    Published 2015
    Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
    Full text (MFA users only)
    Electronic eBook
  13. 193

    Knowledge discovery for business information systems

    Published 2001
    Table of Contents: “…An Entropy Measure for Continuous and Nominal Data Types -- 4. Algorithm to Find Important Variables -- 5. Experimental Studies -- 6. …”
    Full text (MFA users only)
    Electronic eBook
  14. 194

    Fuzzy neural network theory and application by Liu, Puyin

    Published 2004
    Table of Contents: “…4.2.2 Calculus of V -- / functions4.2.3 Error function; 4.2.4 Partial derivatives of error function; 4.2.5 Learning algorithm and simulation; S4.3 Conjugate gradient algorithm for fuzzy weights; 4.3.1 Fuzzy CG algorithm and convergence; 4.3.2 GA for finding optimal learning constant; 4.3.3 Simulation examples; S4.4 Universal approximation to fuzzy valued functions; 4.4.1 Fuzzy valued Bernstein polynomial; 4.4.2 Four-layer regular feedforward FNN; 4.4.3 An example; S4.5 Approximation analysis of regular FNN; 4.5.1 Closure fuzzy mapping; 4.5.2 Learning algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  15. 195
  16. 196
  17. 197

    Discrete Mathematics for Computer Science : An Example-Based Introduction. by Fortney, Jon Pierre

    Published 2021
    Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Algorithms -- 1.1. WHAT ARE ALGORITHMS? -- 1.2. CONTROL STRUCTURES -- 1.3. …”
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Introduction to Mathematical Optimization : From Linear Programming to Metaheuristics. by Yang, Xin-She

    Published 2007
    Table of Contents: “…Norms and Hessian Matrices""; ""2.1 Vector and Matrix Norms""; ""2.2 Eigenvalues and Eigenvectors""; ""2.3 Spectral Radius of Matrices""; ""2.4 Hessian Matrix""; ""2.5 Convexity""; ""3. Root-Finding Algorithms""; ""3.1 Simple Iterations""; ""3.2 Bisection Method""; ""3.3 Newtonâ€?…”
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Parallel computing : technology trends

    Published 2020
    Table of Contents: “…Mitigating Performance and Progress Variability in Iterative Asynchronous Algorithms -- Learning-Based Load Balancing for Massively Parallel Simulations of Hot Fusion Plasmas…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  20. 200

    Mathematical morphology and its applications to image and signal processing

    Published 2000
    Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook