Search Results - (((((((want OR santis) OR wants) OR hands) OR cantor) OR anne) OR file) OR wsanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 96
- Mathematical models 71
- Mathematics 59
- Machine learning 54
- Artificial intelligence 48
- Algorithms 46
- algorithms 39
- methods 38
- artificial intelligence 36
- Data mining 34
- Python (Computer program language) 29
- Artificial Intelligence 26
- Computer networks 25
- Development 24
- Signal processing 24
- Digital techniques 22
- Application software 21
- Computer algorithms 21
- Data Mining 20
- Image processing 19
- Mathematical optimization 18
- Technological innovations 18
- Computer science 17
- Computer security 17
- Computer simulation 17
- Diseases 17
- Neural networks (Computer science) 16
- Computational Biology 15
- Research 15
- Statistical methods 15
Search alternatives:
-
1
-
2
Optimization of Computer Networks : Modeling and Algorithms: a Hands-On Approach.
Published 2016Full text (MFA users only)
Electronic eBook -
3
-
4
Data Clustering : Algorithms and Applications.
Published 2013Full text (MFA users only)
Electronic eBook -
5
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
6
Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
Published 2018Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
Full text (MFA users only)
Electronic eBook -
7
Algorithmic trading : winning strategies and their rationale
Published 2013Full text (MFA users only)
Electronic eBook -
8
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
9
-
10
-
11
Bioinformatics algorithms : techniques and applications
Published 2008Full text (MFA users only)
Electronic eBook -
12
-
13
The rise of the algorithms : how YouTube and TikTok conquered the world
Published 2024Full text (MFA users only)
Electronic eBook -
14
-
15
-
16
-
17
Jewels of stringology : text algorithms.
Published 2002Table of Contents: “…Stringology. 1.1. Text file facilities. 1.2. Dictionaries. 1.3. Data compression. 1.4. …”
Full text (MFA users only)
Electronic eBook -
18
-
19
Algorithms for worst-case design and applications to risk management
Published 2002Full text (MFA users only)
Electronic eBook -
20
Stabilisation and Motion Control of Unstable Objects
Published 2015Full text (MFA users only)
Electronic eBook