Search Results - (((((((want OR manthe) OR find) OR mantis) OR cantor) OR anne) OR halted) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 47
- Machine learning 34
- Artificial intelligence 29
- Data mining 27
- Mathematical models 25
- Mathematics 23
- algorithms 20
- artificial intelligence 20
- methods 20
- Algorithms 18
- Python (Computer program language) 16
- Computer algorithms 15
- Research 15
- Computer networks 14
- Artificial Intelligence 12
- Data Mining 12
- Management 12
- Neural networks (Computer science) 12
- R (Computer program language) 12
- Development 11
- Diseases 11
- Mathematical optimization 11
- Social aspects 11
- Application software 10
- Big data 10
- Bioinformatics 10
- Digital techniques 10
- Image processing 10
- Signal processing 10
- Statistical methods 10
Search alternatives:
- manthe »
- find »
- mantis »
- halted »
- granting »
-
181
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
182
Introduction to direction-of-arrival estimation
Published 2010Full text (MFA users only)
Electronic eBook -
183
Numerical Methods for Eigenvalue Problems.
Published 2012Full text (MFA users only)
Electronic eBook -
184
-
185
Handbook of statistical analysis and data mining applications
Published 2009Table of Contents: “…Basic Algorithms -- Chapter 8: Advanced Algorithms -- Chapter 9. …”
Full text (MFA users only)
Electronic eBook -
186
-
187
Oracle SOA Suite 11g Performance Cookbook.
Published 2013Table of Contents: “…Viewing the memory used using JRMC for JRockitViewing the memory used using VisualVM for HotSpot; Setting the size of the thread stack; Chapter 5: JVM Garbage Collection Tuning; Introduction; Setting the new size; Setting the survivor ratio; Choosing a garbage collection algorithm in HotSpot; Choosing a garbage collection algorithm in JRockit; Turning on verbose garbage collection; Tuning to reduce the number of full garbage collections; Disabling the RMI garbage collector; Disabling explicit GC; Chapter 6: Platform Tuning; Introduction; Tuning global transaction timeouts.…”
Full text (MFA users only)
Electronic eBook -
188
Metaheuristic applications in structures and infrastructures
Published 2013Full text (MFA users only)
Electronic eBook -
189
Sentient Enterprise The Evolution of Business Decision-making.
Published 2017Full text (MFA users only)
Electronic eBook -
190
Role mining in business : taming role-based access control administration
Published 2012Table of Contents: “…Problem formalization. 7.3. Finding optimal role-sets. 7.4. Finding sub-optimal role-sets. 7.5. …”
Full text (MFA users only)
Electronic eBook -
191
Creating E-Learning Games with Unity.
Published 2014Table of Contents: “…; Summary; Chapter 3: Mission One -- Find the Facts; Finding the facts; Designing games to maximize fun…”
Full text (MFA users only)
Electronic eBook -
192
Social sensing : building reliable systems on unreliable data
Published 2015Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
Full text (MFA users only)
Electronic eBook -
193
Knowledge discovery for business information systems
Published 2001Table of Contents: “…An Entropy Measure for Continuous and Nominal Data Types -- 4. Algorithm to Find Important Variables -- 5. Experimental Studies -- 6. …”
Full text (MFA users only)
Electronic eBook -
194
Fuzzy neural network theory and application
Published 2004Table of Contents: “…4.2.2 Calculus of V -- / functions4.2.3 Error function; 4.2.4 Partial derivatives of error function; 4.2.5 Learning algorithm and simulation; S4.3 Conjugate gradient algorithm for fuzzy weights; 4.3.1 Fuzzy CG algorithm and convergence; 4.3.2 GA for finding optimal learning constant; 4.3.3 Simulation examples; S4.4 Universal approximation to fuzzy valued functions; 4.4.1 Fuzzy valued Bernstein polynomial; 4.4.2 Four-layer regular feedforward FNN; 4.4.3 An example; S4.5 Approximation analysis of regular FNN; 4.5.1 Closure fuzzy mapping; 4.5.2 Learning algorithm.…”
Full text (MFA users only)
Electronic eBook -
195
DSP software development techniques for embedded and real-time systems
Published 2006Full text (MFA users only)
Electronic eBook -
196
-
197
Discrete Mathematics for Computer Science : An Example-Based Introduction.
Published 2021Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Algorithms -- 1.1. WHAT ARE ALGORITHMS? -- 1.2. CONTROL STRUCTURES -- 1.3. …”
Full text (MFA users only)
Electronic eBook -
198
Introduction to Mathematical Optimization : From Linear Programming to Metaheuristics.
Published 2007Table of Contents: “…Norms and Hessian Matrices""; ""2.1 Vector and Matrix Norms""; ""2.2 Eigenvalues and Eigenvectors""; ""2.3 Spectral Radius of Matrices""; ""2.4 Hessian Matrix""; ""2.5 Convexity""; ""3. Root-Finding Algorithms""; ""3.1 Simple Iterations""; ""3.2 Bisection Method""; ""3.3 Newtonâ€?…”
Full text (MFA users only)
Electronic eBook -
199
Parallel computing : technology trends
Published 2020Table of Contents: “…Mitigating Performance and Progress Variability in Iterative Asynchronous Algorithms -- Learning-Based Load Balancing for Massively Parallel Simulations of Hot Fusion Plasmas…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
200
Mathematical morphology and its applications to image and signal processing
Published 2000Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook