Search Results - (((((((want OR mantis) OR wants) OR alter) OR cantor) OR anne) OR when) OR wanting) algorithms.

Search alternatives:

  1. 21

    Digital Video and HD : Algorithms and Interfaces. by Poynton, Charles

    Published 2012
    Table of Contents: “…Picture rendering; Surround effect; Tone scale alteration; Incorporation of rendering; Rendering in desktop computing.…”
    Full text (MFA users only)
    Electronic eBook
  2. 22
  3. 23
  4. 24

    Data Structure and Algorithms Using C++ : A Practical Implementation. by Mohanty, Sachi Nandan

    Published 2021
    Table of Contents: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- 1 Introduction to Data Structure -- 1.1 Definition and Use of Data Structure -- 1.2 Types of Data Structure -- Linear Data Structures -- Non-Linear Data Structure -- Operations Performed in Data Structure -- 1.3 Algorithm -- Steps Required to Develop an Algorithm -- Mathematical Notations and Functions -- Algorithemic Notations -- 1.4 Complexity of an Algorithm -- Space Complexity -- Time Complexity -- Best Case -- Worst Case -- Average Case -- 1.5 Efficiency of an Algorithm…”
    Full text (MFA users only)
    Electronic eBook
  5. 25

    Algorithmic Graph Theory and Perfect Graphs. by Rheinboldt, Werner

    Published 2014
    Table of Contents: “…The Design of Efficient Algorithms; 1. The Complexity of Computer Algorithms; 2. …”
    Full text (MFA users only)
    Electronic eBook
  6. 26
  7. 27
  8. 28
  9. 29

    We are data : algorithms and the making of our digital selves by Cheney-Lippold, John

    Published 2017
    Table of Contents: “…-- Privacy: wanted dead or alive -- Conclusion: ghosts in the machine.…”
    Full text (MFA users only)
    Electronic eBook
  10. 30
  11. 31
  12. 32

    What to Do When Machines Do Everything : Five Ways Your Business Can Thrive in an Economy of Bots, AI, and Data. by Frank, Malcolm

    Published 2017
    Table of Contents: “…What to Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data; Contents; Preface; 1: When Machines Do Everything; Like It or Not, This Is Happening; Digital That Matters; Playing the New Game; But Will I Be Automated Away?…”
    Full text (MFA users only)
    Electronic eBook
  13. 33
  14. 34

    Automating open source intelligence : algorithms for OSINT

    Published 2016
    Table of Contents: “…Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.…”
    Full text (MFA users only)
    Electronic eBook
  15. 35

    Bayesian phylogenetics : methods, algorithms, and applications

    Published 2014
    Table of Contents: “…Front Cover; Contents; List of Figures; List of Tables; Preface; Editors; Contributors; Chapter 1: Bayesian phylogenetics: methods, computational algorithms, and applications; Chapter 2: Priors in Bayesian phylogenetics; Chapter 3: Inated density ratio (IDR) method for estimating marginal likelihoods in Bayesian phylogenetics; Chapter 4: Bayesian model selection in phylogenetics and genealogy-based population genetics; Chapter 5: Variable tree topology stepping-stone marginal likelihood estimation; Chapter 6: Consistency of marginal likelihood estimation when topology varies.…”
    Full text (MFA users only)
    Electronic eBook
  16. 36
  17. 37

    Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto. by Grimes, Roger A.

    Published 2019
    Table of Contents: “…59 -- Cryptography Basics 59 -- Encryption 59 -- Integrity Hashing 72 -- Cryptographic Uses 73 -- How Quantum Computers Can Break Cryptography 74 -- Cutting Time 74 -- Quantum Algorithms 76 -- What Quantum Can and Can’t Break 79 -- Still Theoretical 82 -- Summary 83 -- 4 When Will the Quantum Crypto Break Happen? …”
    Full text (MFA users only)
    Electronic eBook
  18. 38

    Turing's vision : the birth of computer science by Bernhardt, Chris

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  19. 39

    Adventures in Raspberry Pi by Philbin, Carrie Anne

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  20. 40

    Against all odds : historical women and new algorithms

    Published 2024
    Book