Search Results - (((((((want OR wanta) OR semantic) OR when) OR cantor) OR anne) OR blaney) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 49
- Data processing 42
- Machine learning 34
- Data mining 28
- artificial intelligence 26
- Mathematics 24
- Mathematical models 21
- Algorithms 20
- Artificial Intelligence 20
- algorithms 18
- Python (Computer program language) 17
- Technological innovations 17
- Data Mining 16
- methods 16
- Social aspects 15
- Application software 13
- Computer algorithms 13
- Computer networks 13
- Development 13
- Big data 12
- Neural networks (Computer science) 12
- Computer science 11
- Mathematical optimization 11
- History 10
- Machine Learning 10
- Management 10
- Computer simulation 9
- Diseases 9
- Electronic data processing 9
- Information technology 9
Search alternatives:
-
41
An Investigation into Authentication Security of GSM algorithm for Mobile Banking.
Published 2014Full text (MFA users only)
Electronic eBook -
42
Entity information life cycle for big data : master data management and information integration
Published 2015Full text (MFA users only)
Electronic eBook -
43
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
44
Naming and reference : the link of word to object
Published 1992Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
Full text (MFA users only)
Electronic eBook -
45
What to Do When Machines Do Everything : Five Ways Your Business Can Thrive in an Economy of Bots, AI, and Data.
Published 2017Table of Contents: “…What to Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data; Contents; Preface; 1: When Machines Do Everything; Like It or Not, This Is Happening; Digital That Matters; Playing the New Game; But Will I Be Automated Away?…”
Full text (MFA users only)
Electronic eBook -
46
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
Full text (MFA users only)
Electronic eBook -
47
A guide to creating a successful algorithmic trading strategy
Published 2016Full text (MFA users only)
Electronic eBook -
48
Bayesian phylogenetics : methods, algorithms, and applications
Published 2014Table of Contents: “…Front Cover; Contents; List of Figures; List of Tables; Preface; Editors; Contributors; Chapter 1: Bayesian phylogenetics: methods, computational algorithms, and applications; Chapter 2: Priors in Bayesian phylogenetics; Chapter 3: Inated density ratio (IDR) method for estimating marginal likelihoods in Bayesian phylogenetics; Chapter 4: Bayesian model selection in phylogenetics and genealogy-based population genetics; Chapter 5: Variable tree topology stepping-stone marginal likelihood estimation; Chapter 6: Consistency of marginal likelihood estimation when topology varies.…”
Full text (MFA users only)
Electronic eBook -
49
-
50
Mastering machine learning with R : advanced prediction, algorithms, and learning methods with R 3.x
Published 2017Full text (MFA users only)
Electronic eBook -
51
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto.
Published 2019Table of Contents: “…59 -- Cryptography Basics 59 -- Encryption 59 -- Integrity Hashing 72 -- Cryptographic Uses 73 -- How Quantum Computers Can Break Cryptography 74 -- Cutting Time 74 -- Quantum Algorithms 76 -- What Quantum Can and Can’t Break 79 -- Still Theoretical 82 -- Summary 83 -- 4 When Will the Quantum Crypto Break Happen? …”
Full text (MFA users only)
Electronic eBook -
52
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
53
-
54
-
55
Language production and interpretation : linguistics meets cognition
Published 2014Table of Contents: “…Provisional English; 2.3. The Production Algorithm; 2.3.1. Procedural Interpretation of the Constraints; 2.4. …”
Full text (MFA users only)
Electronic eBook -
56
-
57
Heuristics in analytics : a practical perspective of what influences our analytical world
Published 2014Full text (MFA users only)
Electronic eBook -
58
Intelligence emerging : adaptivity and search in evolving neural systems
Published 2015Full text (MFA users only)
Electronic eBook -
59
-
60
Foundations of Probabilistic Logic Programming : Languages, Semantics, Inference and Learning.
Published 2018Full text (MFA users only)
Electronic eBook