Search Results - (((((((want OR semantic) OR wantis) OR abantu) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 40
- Data processing 35
- Machine learning 30
- Data mining 23
- Mathematics 23
- artificial intelligence 18
- Mathematical models 17
- Technological innovations 17
- Algorithms 16
- Computer science 15
- algorithms 14
- Computer networks 13
- Management 13
- Python (Computer program language) 13
- Artificial Intelligence 12
- Big data 12
- Application software 11
- Data Mining 11
- Development 11
- Information technology 11
- Computer algorithms 10
- Neural networks (Computer science) 10
- methods 10
- Machine Learning 9
- Social aspects 9
- Computational linguistics 8
- Automatic control 7
- Computer security 7
- Electronic data processing 7
- Logic, Symbolic and mathematical 7
Search alternatives:
-
141
Differential algebra and related topics - proceedings of the international workshop.
Published 2002Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
Full text (MFA users only)
Electronic eBook -
142
-
143
Fast sequential Monte Carlo methods for counting and optimization
Published 2013Full text (MFA users only)
Electronic eBook -
144
Trends in Functional Programming.
Published 2007Table of Contents: “…Front Cover; Preliminary Pages; Contents; Preface; Proving Termination Using Dependent Types: The Case of Xor-Terms; Proving the Correctness of Algorithmic Debugging for Functional Programs; Systematic Synthesis of Functions; A Purely Functional Implementation of ROBDDs in Haskell; Efficient Interpretation by Transforming Data Types and Patterns to Functions; Object-Oriented Programming in Dependent Type Theory; A Sharing Analysis for SAFE; Memory Usage Improvement Using Runtime Alias Detection; A Model of Functional Programming with Dynamic Compilation and Optimization.…”
Full text (MFA users only)
Electronic eBook -
145
Language and logos : studies in theoretical and computational linguistics
Published 2010Table of Contents: “…CONTENTS -- Preface -- Part I Syntax -- A Spurious Genitive Puzzle in Polish -- Semantic Type Effects on Crossing Movement in German -- Me and Chomsky -- On the Typology of Verb Second -- Movement from Verb-Second Clauses Revisited -- Spurious Ambiguities and the Parentheticals Debate -- Part II Semantics -- On Squeamishness of the Royal Kind -- Information Structure of schon -- When- Clauses, Factive Verbs and Correlates -- The Proof Theory of Partial Variables -- Brentano's Apple -- How to Interpret Expletive Negation under bevor in German…”
Full text (MFA users only)
Electronic eBook -
146
-
147
Informatics for Health
Published 2017Table of Contents: “…An Automatic Approach for Analyzing Treatment Effectiveness Based on Medication Hierarchy -- The Myocardial Infarction Case Study -- Evaluation of Machine Learning Methods to Predict Coronary Artery Disease Using Metabolomic Data -- Dermatology Disease Prediction Based on Two Step Cascade Genetic Algorithm Optimization of ANFIS Parameters -- Querying EHRs with a Semantic and Entity-Oriented Query Language -- Evaluation of the Terminology Coverage in the French Corpus LiSSa -- Linked Data Applications Through Ontology Based Data Access in Clinical Research -- Epidemiological Models Lacking Process Noise Can Be Overconfident -- Disentangling Prognostic and Predictive Biomarkers Through Mutual Information -- IntegrIT -- Towards Utilizing the Swedish National Health Information Exchange Platform for Clinical Research -- Introducing a Method for Transformation of Paper-Based Research Data into Concept-Based Representation with openEHR -- The P̀EARL' Data Warehouse: Initial Challenges Faced with Semantic and Syntactic Interoperability -- Combining Different Privacy-Preserving Record Linkage Methods for Hospital Admission Data -- Application of Correspondence Analysis to Graphically Investigate Associations Between Foods and Eating Locations -- Data Driven Quality Improvement of Health Professions Education: Design and Development of CLUE -- An Interactive Curriculum Data Visualization Tool -- Developing Healthcare Data Analytics APPs with Open Data Science Tools -- Fast and Efficient Feature Engineering for Multi-Cohort Analysis of EHR Data -- Development and Evaluation of a Case-Based Retrieval Service -- Learning Differentially Expressed Gene Pairs in Microarray Data -- Developing a Manually Annotated Corpus of Clinical Letters for Breast Cancer Patients on Routine Follow-Up -- Automated Diagnosis Coding with Combined Text Representations.…”
Full text (MFA users only)
Electronic eBook -
148
Rediscovering mathematics : you do the math
Published 2011Full text (MFA users only)
Electronic eBook -
149
Advanced Methods and Technologies for Agent and Multi-Agent Systems.
Published 2013Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
Full text (MFA users only)
Electronic eBook -
150
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
151
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook -
152
-
153
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
154
Big Data and HPC.
Published 2018Table of Contents: “…Analysis and Design of IoT Based Physical Location Monitoring SystemAutonomous Task Scheduling for Fast Big Data Processing; Adaptive Resource Management for Distributed Data Analytics; HPC Challenges; High-Performance Massive Subgraph Counting Using Pipelined Adaptive-Group Communication; Final Parallel and Distributed Computing Assignment for Master Students: Description of the Properties and Parallel Structure of Algorithms; Parallel Motion Estimation Based on GPU and Combined GPU-CPU; GPU-Based Iterative Hill Climbing Algorithm to Solve Symmetric Traveling Salesman Problem.…”
Full text (MFA users only)
Electronic eBook -
155
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
156
Mastering D3.js.
Published 2014Table of Contents: “…Updating the datasetFixing the enter and exit transitions; Using the barcode chart; Creating a layout algorithm; The radial layout; Computing the angles; Using the layout; Summary; Chapter 3: Creating Visualizations without SVG; SVG support in the browser market; Visualizations without SVG; Loading and sorting the data; The force layout method; Setting the color and size; Creating a legend; Polyfilling; Feature detection; The canvg example; Using canvas and D3; Creating figures with canvas; Creating shapes; Integrating canvas and D3; Summary; Chapter 4: Creating a Color Picker with D3.…”
Full text (MFA users only)
Electronic eBook -
157
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook -
158
-
159
Informatics and technology in clinical care and public health
Published 2022Table of Contents: “…Intro -- Title Page -- Preface -- ICIMTH 2021 Scientific Programme Committee and Reviewers -- Contents -- Using Artificial Intelligence to Develop a Lexicon-Based African American Tweet Detection Algorithm to Inform Culturally Sensitive Twitter-Based Social Support Interventions for African American Dementia Caregivers -- A Comparison of Word Embeddings to Study Complications in Neurosurgery -- Gulf Cooperation Council Clinical Trials in the Pursuit of Medications for COVID-19…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
160
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook