Search Results - (((((((want OR pants) OR canton) OR makant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 28
- Artificial intelligence 25
- Machine learning 25
- Data mining 17
- Mathematics 17
- Algorithms 15
- Mathematical models 15
- algorithms 14
- artificial intelligence 14
- Technological innovations 12
- Application software 11
- Computer networks 11
- Development 11
- Computer algorithms 10
- Management 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Information technology 9
- methods 9
- Social aspects 8
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
- Mathematical optimization 6
- Parallel processing (Electronic computers) 6
- Wireless communication systems 6
- Bioinformatics 5
Search alternatives:
-
161
Applications of digital signal processing to audio and acoustics
Published 2002Full text (MFA users only)
Electronic eBook -
162
Visible Business : Uncover the Blindspots and Engage the World's Female Economy.
Published 2017Table of Contents: “…Blind Spots; Contents; Foreword; About the Author; Acknowledgements; To my community; To my village; Preface; Introduction; Chapter 1 From history to herstory; The birth of business marketing; Things have changed -- or have they?; Women want more; The wo-man algorithm; Become conscious of the bias; From reject to results; Chapter 2 Are you blind?…”
Full text (MFA users only)
Electronic eBook -
163
Randomness through computation : some answers, more questions
Published 2011Full text (MFA users only)
Electronic eBook -
164
Getting Started with Greenplum for Big Data Analytics.
Published 2013Table of Contents: “…Greenplum Unified Analytics Platform (UAP) -- Big Data analytics -- platform requirements -- Greenplum Unified Analytics Platform (UAP) -- Core components -- Greenplum Database -- Hadoop (HD) -- Chorus -- Command Center -- Modules -- Database modules -- HD modules -- Data Integration Accelerator (DIA) modules -- Core architecture concepts -- Data warehousing -- Column-oriented databases -- Parallel versus distributed computing/processing -- Shared nothing, massive parallel processing (MPP) systems, and elastic scalability -- Shared disk data architecture -- Shared memory data architecture -- Shared nothing data architecture -- Data loading patterns -- Greenplum UAP components -- Greenplum Database -- The Greenplum Database physical architecture -- The Greenplum high-availability architecture -- High-speed data loading using external tables.…”
Full text (MFA users only)
Electronic eBook -
165
High Performance Computing Systems and Applications & OSCAR Symposium.
Published 2003Table of Contents: “…""Table of Contents / Table des matières""; ""Preface""; ""Préface""; ""Symposium Organizers / Comité organisateur""; ""Program Committee / Comité scientifique""; ""Part I: Applications / Partie I: applications""; ""Concurrent Computation and Time Complexity Bounds for Algebraic Fractals""; ""Fast Algorithm to Estimate Dense Disparity Fields""; ""Evolutionary Grids of Interacting Stellar Binaries Containing Neutron Star Accretors""; ""HYDRA-MPI: An Adaptive Particle-Particle, Particle-Mesh Code for Conducting Cosmological Simulations on MPP Architectures""…”
Full text (MFA users only)
Electronic eBook -
166
Architecture-aware optimization strategies in real-time image processing
Published 2017Full text (MFA users only)
Electronic eBook -
167
Machine Learning for Asset Management New Developments and Financial Applications
Published 2020Full text (MFA users only)
Electronic eBook -
168
Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow.
Published 2018Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
Full text (MFA users only)
Electronic eBook -
169
Cryptography 101 : From Theory to Practice.
Published 2021Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
Full text (MFA users only)
Electronic eBook -
170
Smart buildings, smart communities and demand response
Published 2021Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
Full text (MFA users only)
Electronic eBook -
171
Swift 2 design patterns : build robust and scalable iOS and Mac OS X game applications
Published 2015Full text (MFA users only)
Electronic eBook -
172
-
173
-
174
Two-degree-of-freedom control systems : the Youla Parameterization approach
Published 2015Full text (MFA users only)
Electronic eBook -
175
Computational models of argument : proceedings of COMMA 2014
Published 2014Table of Contents: “…Properties of Random VAFs and Implications for Efficient AlgorithmsResolution-Based Grounded Semantics Revisited -- Decomposing Abstract Dialectical Frameworks -- A Principled Approach to the Implementation of Argumentation Models -- Combining Paraconsistent Logic with Argumentation -- Probabilistic Argument Graphs for Argumentation Lotteries -- Enthymeme Construction in Dialogues Using Shared Knowledge -- Strategies in Dialogues: A Game-Theoretic Approach -- Argumentation Logic -- Splitting Abstract Dialectical Frameworks…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
176
Social sensing : building reliable systems on unreliable data
Published 2015Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
Full text (MFA users only)
Electronic eBook -
177
-
178
More and different : notes from a thoughtful curmudgeon
Published 2011Full text (MFA users only)
Electronic eBook -
179
Graph drawing and applications for software and knowledge engineers
Published 2002Full text (MFA users only)
Electronic eBook -
180
Solving transport problems : towards green logistics
Published 2019Full text (MFA users only)
Electronic eBook