Search Results - (((((((want OR wanta) OR semantic) OR when) OR cantor) OR anne) OR blaney) OR hints) algorithms.

  1. 41
  2. 42
  3. 43
  4. 44

    Naming and reference : the link of word to object by Nelson, R. J. (Raymond John), 1917-

    Published 1992
    Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
    Full text (MFA users only)
    Electronic eBook
  5. 45

    What to Do When Machines Do Everything : Five Ways Your Business Can Thrive in an Economy of Bots, AI, and Data. by Frank, Malcolm

    Published 2017
    Table of Contents: “…What to Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data; Contents; Preface; 1: When Machines Do Everything; Like It or Not, This Is Happening; Digital That Matters; Playing the New Game; But Will I Be Automated Away?…”
    Full text (MFA users only)
    Electronic eBook
  6. 46

    Automating open source intelligence : algorithms for OSINT

    Published 2016
    Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
    Full text (MFA users only)
    Electronic eBook
  7. 47
  8. 48

    Bayesian phylogenetics : methods, algorithms, and applications

    Published 2014
    Table of Contents: “…Front Cover; Contents; List of Figures; List of Tables; Preface; Editors; Contributors; Chapter 1: Bayesian phylogenetics: methods, computational algorithms, and applications; Chapter 2: Priors in Bayesian phylogenetics; Chapter 3: Inated density ratio (IDR) method for estimating marginal likelihoods in Bayesian phylogenetics; Chapter 4: Bayesian model selection in phylogenetics and genealogy-based population genetics; Chapter 5: Variable tree topology stepping-stone marginal likelihood estimation; Chapter 6: Consistency of marginal likelihood estimation when topology varies.…”
    Full text (MFA users only)
    Electronic eBook
  9. 49
  10. 50
  11. 51

    Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto. by Grimes, Roger A.

    Published 2019
    Table of Contents: “…59 -- Cryptography Basics 59 -- Encryption 59 -- Integrity Hashing 72 -- Cryptographic Uses 73 -- How Quantum Computers Can Break Cryptography 74 -- Cutting Time 74 -- Quantum Algorithms 76 -- What Quantum Can and Can’t Break 79 -- Still Theoretical 82 -- Summary 83 -- 4 When Will the Quantum Crypto Break Happen? …”
    Full text (MFA users only)
    Electronic eBook
  12. 52

    Turing's vision : the birth of computer science by Bernhardt, Chris

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  13. 53

    Adventures in Raspberry Pi by Philbin, Carrie Anne

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  14. 54

    Against all odds : historical women and new algorithms

    Published 2024
    Book
  15. 55

    Language production and interpretation : linguistics meets cognition by Zeevat, Henk, 1952-

    Published 2014
    Table of Contents: “…Provisional English; 2.3. The Production Algorithm; 2.3.1. Procedural Interpretation of the Constraints; 2.4. …”
    Full text (MFA users only)
    Electronic eBook
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60