Search Results - (((((((want OR wants) OR semantic) OR when) OR cantor) OR anne) OR blaney) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 49
- Data processing 42
- Machine learning 34
- Data mining 28
- artificial intelligence 26
- Mathematics 24
- Mathematical models 21
- Algorithms 20
- Artificial Intelligence 20
- algorithms 18
- Python (Computer program language) 17
- Technological innovations 17
- Data Mining 16
- methods 16
- Social aspects 15
- Application software 13
- Computer algorithms 13
- Computer networks 13
- Development 13
- Big data 12
- Neural networks (Computer science) 12
- Computer science 11
- Mathematical optimization 11
- History 10
- Machine Learning 10
- Management 10
- Computer simulation 9
- Diseases 9
- Electronic data processing 9
- Information technology 9
-
361
SMS communication : a linguistic approach
Published 2014Full text (MFA users only)
Electronic eBook -
362
Structural-functional studies in English grammar : in honor of Lachlan Mackenzie
Published 2007Table of Contents: “…Conclusion -- References -- Notes towards an incremental implementation of the Role and Reference Grammar semantics-to-syntax linking algorithm for English -- 1. …”
Full text (MFA users only)
Electronic eBook -
363
-
364
Robotics : science and systems III
Published 2008Table of Contents: “…Semantic Modeling of Places using Objects / Ananth Ranganathan and Frank Dellaert -- Design of a Bio-inspired Dynamical Vertical Climbing Robot / Jonathan E. …”
Full text (MFA users only)
Electronic eBook -
365
How to measure anything in cybersecurity risk
Published 2016Table of Contents: “…; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?…”
Full text (MFA users only)
Electronic eBook -
366
-
367
Statistical analysis techniques in particle physics : fits, density estimation and supervised learning
Published 2013Full text (MFA users only)
Electronic eBook -
368
Limits, Limits Everywhere : the Tools of Mathematical Analysis
Published 2012Table of Contents: “…Continued Fractions; 9.1 Euclid's Algorithm; 9.2 Rational and Irrational Numbers as Continued Fractions; 10. …”
Full text (MFA users only)
Electronic eBook -
369
Multiple Sclerosis : Clinician's Guide to Diagnosis and Treatment.
Published 2013Table of Contents: “…Long-Term Disease-Modifying Therapies; Issues with Long-Term Immune-Modulating Therapies; Choosing a Disease-Modifying Therapy; Ensuring Treatment Adherence and Compliance; When Do I Initiate Treatment With Disease-Modifying Therapies?…”
Full text (MFA users only)
Electronic eBook -
370
Robust statistics : theory and methods (with R)
Published 2018Full text (MFA users only)
Electronic eBook -
371
Microbiological sensors for the drinking water industry
Published 2018Full text (MFA users only)
Electronic eBook -
372
A Statistical approach to genetic epidemiology : concepts and applications, with an e-Learning Platform.
Published 2012Table of Contents: “…; 4.3 HOW SHOULD GENOTYPING ERRORS BE CHECKED IN POPULATION-BASED STUDIES USING THE HARDY-WEINBERG EQUILIBRIUM?; Algorithm 4.1.; Algorithm 4.2.; Algorithm 4.3.; 4.4 HOW CAN GENOTYPING ERRORS BE DETECTED IN HIGH-THROUGHPUT GENOTYPING STUDIES?…”
Full text (MFA users only)
Electronic eBook -
373
Modern development in materials, machinery and automation : selected, peer reviewed papers from the 2013 International Conference on Microtechnology and MEMS (ICMM 2013), May 22-23...
Published 2013Table of Contents: “…An Adaptive Intra-Frame Refresh Algorithm Based on Rate Distortion OptimizationA New Method for the Optimal Configuration of Ship-Based Aircraft Based on the Extended Backpack; Application of Bayesian for the Situation Assessment of Sea-Battlefield; The Application of Semantic Similarity in Text Classification; The Research of Clock Traffic Congestion Model and Synchronization Technology; Chapter 4: Product Design; Research on Motion Capture Instruments in Sports; A Study of Innovative Product Design for Drinking Cups; A Study of Customized Innovative Self-Portrait Product Design…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
374
Drones and other unmanned weapons systems under international law
Published 2018Full text (MFA users only)
Electronic eBook -
375
The Maudsley Prescribing Guidelines in Psychiatry
Published 2012Full text (MFA users only)
Electronic eBook -
376
Methodological and analytic frontiers in lexical research
Published 2012Table of Contents: “…Behavioral profiles: A fine-grained and quantitative approach in corpus-based lexical semantics (by Gries, Stefan Th.); 5. 5. Using a maze task to track lexical and sentence processing (by Forster, Kenneth I.); 6. 6. …”
Full text (MFA users only)
Electronic eBook -
377
Formal Synthesis of Safety Controller Code for Distributed Controllers.
Published 2012Table of Contents: “…7.3 Comparison8 Embedding Control Functions in IEC 61499 Function Blocks; 8.1 IEC 61499 Basic Function Blocks; 8.2 Transformation; 8.2.1 Interface; 8.2.2 Algorithms; 8.2.3 Execution Control Chart; 8.3 Use and extension; 9 Conclusions and Outlook; A Appendix.…”
Full text (MFA users only)
Electronic eBook -
378
-
379
XML for DB2 information integration
Published 2004Table of Contents: “…Shredding XML into relational tables -- 6.1 Shredding overview -- 6.1.1 What is shredding? -- 6.1.2 When should you use shredding? -- 6.2 Shredding using DB2 XML Extender -- 6.2.1 Shredding -- planning and design -- 6.2.2 Planning and design: hints and tips -- 6.2.3 Shredding: configuration and execution -- 6.3 Alternatives to shredding with DB2 XML Extender -- 6.3.1 Using the XML wrapper -- 6.3.2 Writing your own code -- 6.4 Shredding with XML Extender: a step-by-step example -- 6.4.1 Step 1 -- XML enabling of your database -- 6.4.2 Step 2 -- Creating the DAD file -- 6.4.3 Step 3 -- Enablement of the XML collection -- 6.4.4 Step 4 -- Decomposing the XML data into relational tables -- 6.4.5 Step 5 -- Checking the result using the SELECT statement -- Chapter 7. …”
Full text (MFA users only)
Electronic eBook -
380
Applied mechanics and industrial technologies : selected, peer reviewed papers from the 2012 International Conference on Applied Mechanics and Manufacturing Technology (AMMT 2012),...
Published 2013Table of Contents: “…An Assessment of Wet Compression Process in Gas Turbine Systems with an Analytical ModelingAssessment of Hole Quality and Thrust Force when Drilling CFRP/Al Stack Using Carbide Tools; Multi-Objective Optimization of Filament Wound Composite Pressure Vessels Based on Weight and Matrix Cracking/ Burst Pressure Using Imperialist Competitive Algorithm; In Situ Laser Build-Up Welding of Shipboard Crankshafts; Stress and Deformation Analysis for Caster Segment Based on ANSYS; Instable Crack Propagation Analysis with PDS-FEM; Reducing the Manufacturing Cost by Using Combination Die.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook