Search Results - (((((((want OR wantsa) OR semantic) OR wien) OR cantor) OR anne) OR blaney) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 35
- Data processing 28
- Machine learning 25
- Data mining 21
- artificial intelligence 16
- Mathematics 13
- Python (Computer program language) 13
- Artificial Intelligence 12
- Algorithms 11
- Data Mining 11
- Computer science 10
- Mathematical models 10
- Neural networks (Computer science) 10
- Technological innovations 10
- Machine Learning 9
- algorithms 9
- Application software 8
- Development 8
- methods 8
- Big data 7
- Computational linguistics 7
- Computer networks 7
- Pattern recognition systems 7
- Computer security 6
- Social aspects 6
- Computer algorithms 5
- Graph theory 5
- History 5
- Image processing 5
- Information technology 5
Search alternatives:
- wantsa »
- wien »
-
201
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
202
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook -
203
Handbook on soft computing for video surveillance
Published 2012Full text (MFA users only)
Electronic eBook -
204
Predictive Analytics For Dummies.
Published 2016Table of Contents: “…Recognizing Your Data TypesStructured and unstructured data; Static and streamed data; Identifying Data Categories; Attitudinal data; Behavioral data; Demographic data; Generating Predictive Analytics; Data-driven analytics; User-driven analytics; Connecting to Related Disciplines; Statistics; Data mining; Machine learning; Chapter 4 Complexities of Data; Finding Value in Your Data; Delving into your data; Data validity; Data variety; Constantly Changing Data; Data velocity; High volume of data; Complexities in Searching Your Data; Keyword-based search; Semantic-based search.…”
Full text (MFA users only)
Electronic eBook -
205
-
206
Machine learning for the web
Published 2016Table of Contents: “…Multinomial Naive BayesGaussian Naive Bayes; Decision trees; Support vector machine; Kernel trick; A comparison of methods; Regression problem; Classification problem; Hidden Markov model; A Python example; Summary; Web Mining Techniques; Web structure mining; Web crawlers (or spiders); Indexer; Ranking -- PageRank algorithm; Web content mining; Parsing; Natural language processing; Information retrieval models; TF-IDF; Latent Semantic Analysis (LSA); Doc2Vec (word2vec); Word2vec -- continuous bag of words and skip-gram architectures; Mathematical description of the CBOW model.…”
Full text (MFA users only)
Electronic eBook -
207
Introduction to graph and hypergraph theory
Published 2009Full text (MFA users only)
Electronic eBook -
208
Digital wealth : an automatic way to invest successfully
Published 2016Full text (MFA users only)
Electronic eBook -
209
Beyond artificial intelligence : from human consciousness to artificial consciousness
Published 2018Table of Contents: “…The morphological and semantic conformation of the psychic system; 1.13. …”
Full text (MFA users only)
Electronic eBook -
210
Computational phraseology
Published 2020Table of Contents: “…Monocollocable words : a type of language combinatory periphery / František Čermák -- Translation asymmetries of multiword expressions in machine translation : an analysis of the TED-MWE corpus / Johanna Monti, Mihael Arcan and Federico Sangati -- German constructional phrasemes and their Russian counterparts : a corpus-based study / Dmitrij Dobrovol'skij -- Computational phraseology and translation studies : from theoretical hypotheses to practical tools / Jean-Pierre Colson -- Computational extraction of formulaic sequences from corpora : two case studies of a new extraction algorithm / Alexander Wahl and Stefan Th. Gries -- Computational phraseology discovery in corpora with the MWETOOLKIT / Carlos Ramisch -- Multiword expressions in comparable corpora / Peter Ďurčo -- Collecting collocations from general and specialised corpora : a comparative analysis / Marie-Claude L'Homme and Daphnée Azoulay -- What matters more : the size of the corpora or their quality? …”
Full text (MFA users only)
Electronic eBook -
211
Screenplay and narrative theory : the screenplectics model of complex narrative systems
Published 2015Full text (MFA users only)
Electronic eBook -
212
Better living through economics
Published 2010Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
Full text (MFA users only)
Electronic eBook -
213
SMS communication : a linguistic approach
Published 2014Full text (MFA users only)
Electronic eBook -
214
Twelfth Scandinavian Conference on Artificial Intelligence : SCAI 2013
Published 2013Table of Contents: “…Traceable Uncertainty for Threat Evaluation in Air to Ground ScenariosKnowledge-Based Industrial Robotics; Probabilistic Inference in BN2T Models by Weighted Model Counting; Doctoral Symposium; On Programming Organization-Aware Agents; Enhancing Recall in Semantic Querying; Industrial Robot Skills; Learning Inverse Kinematics Problem in Changing Task Environment; Neural Network for Prediction of Glucose Concentration in Type 1 Diabetic Patients; Subject Index; Author Index…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
215
Structural-functional studies in English grammar : in honor of Lachlan Mackenzie
Published 2007Table of Contents: “…Conclusion -- References -- Notes towards an incremental implementation of the Role and Reference Grammar semantics-to-syntax linking algorithm for English -- 1. …”
Full text (MFA users only)
Electronic eBook -
216
-
217
Medical and Care Compunetics 2 : Medical and Care Compunetics 2.
Published 2005Table of Contents: “…Standardized Semantic Markup for Reference Terminologies, Thesauri and Coding Systems: Benefits for Distributed E-Health ApplicationsDevelopment of an Expert System for Classification of Medical Errors; Model of Good Practice Tools for Risk Reduction and Clinical Governance; Optimisation Issues of High Throughput Medical Data and Video Streaming Traffic in 3G Wireless Environments; A New Algorithm for Content-Based Region Query in Databases with Medical Images; Economic Impact of Telemedicine: A Survey.…”
Full text (MFA users only)
Electronic eBook -
218
Robotics : science and systems III
Published 2008Table of Contents: “…Semantic Modeling of Places using Objects / Ananth Ranganathan and Frank Dellaert -- Design of a Bio-inspired Dynamical Vertical Climbing Robot / Jonathan E. …”
Full text (MFA users only)
Electronic eBook -
219
-
220