Search Results - (((((((want OR win) OR semantic) OR arts) OR cantor) OR anne) OR maarten) OR santis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 51
- Artificial intelligence 48
- Mathematical models 42
- Machine learning 37
- Data mining 26
- Mathematics 26
- artificial intelligence 26
- Artificial Intelligence 18
- Computer networks 17
- Python (Computer program language) 17
- Data Mining 15
- Management 15
- Mathematical optimization 15
- Technological innovations 15
- Computer science 14
- Information technology 13
- Algorithms 12
- Big data 12
- Computer simulation 12
- Machine Learning 12
- Neural networks (Computer science) 12
- Social aspects 12
- Development 11
- Digital techniques 11
- History 11
- Security measures 11
- methods 11
- Application software 10
- Computational linguistics 10
- Decision making 10
Search alternatives:
- win »
- arts »
-
221
Numerical Methods for Eigenvalue Problems.
Published 2012Full text (MFA users only)
Electronic eBook -
222
International e-Conference of Computer Science 2006
Published 2007Table of Contents: “…A Computational Algorithm to Obtain the Law of the Solvable Lie Algebra of n x n Upper-Triangular MatricesWeb Data Extraction using Semantic Generators -- Integrity-Enhanced Improvements for ISO 9001 registeredOrganizations -- A Ghost Bit Based Finite Field Arithmetic for FPGAs -- A Scalable Finite Field Multiplier with Interleaving Reduction -- Intelligent Tutoring Systems and Convex Geometries -- Towards Operational Content Infrastructure -- A Computational Fusion of Wavelets and Neural Networks in a Classifier for Biomedical Applications…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
223
STAIRS 2010 : Proceedings of the Fifth Starting AI Researchers' Symposium.
Published 2010Table of Contents: “…; Generative Structure Learning for Markov Logic Networks; Learning Fuzzy Models of User Interests in a Semantic Information Retrieval System; Ontology-Based Document and Query Representation May Improve the Effectiveness of Information Retrieval.…”
Full text (MFA users only)
Electronic eBook -
224
Communicating process architectures 2009 : WoTUG-32
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
225
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
226
Logic and Discrete Mathematics : A Concise Introduction, Solutions Manual.
Published 2015Table of Contents: “…Valid and invalid propositional inferences -- 3.3 Semantic tableaux -- 3.4 Logical equivalences. Negating propositional formulae -- 3.5 Normal forms. …”
Full text (MFA users only)
Electronic eBook -
227
Logic and Discrete Mathematics : A Concise Introduction.
Published 2015Table of Contents: “…Valid and invalid propositional inferences -- 3.3 The concept and use of deductive systems -- 3.4 Semantic tableaux -- 3.5 Logical equivalences. Negating propositional formulae -- 3.6 Normal forms. …”
Full text (MFA users only)
Electronic eBook -
228
Anaphora Resolution.
Published 2014Table of Contents: “…2.1.2 Syntactic knowledge2.1.3 Semantic knowledge; 2.1.4 Discourse knowledge; 2.1.5 Real-world (common-sense) knowledge; 2.2 Anaphora resolution in practice; 2.2.1 Identification of anaphors; 2.2.1.1 Identification of anaphoric pronouns; 2.2.1.2 Identification of anaphoric noun phrases; 2.2.1.3 Tools and resources for the identification of anaphors; 2.2.2 Location of the candidates for antecedents; 2.2.2.1 The search scope of candidates for antecedent; 2.2.2.2 Tools and resources needed for the location of potential candidates; 2.2.3 The resolution algorithm: factors in anaphora resolution.…”
Full text (MFA users only)
Electronic eBook -
229
Enterprise AI for Dummies.
Published 2020Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Strong, Weak, General, and Narrow -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Exploring Practical AI and How It Works -- Chapter 1 Demystifying Artificial Intelligence -- Understanding the Demand for AI -- Converting big data into actionable information -- Relieving global cost pressure -- Accelerating product development and delivery -- Facilitating mass customization -- Identifying the Enabling Technology -- Processing -- Algorithms…”
Full text (MFA users only)
Electronic eBook -
230
Recent Advances in Natural Language Processing : Selected Papers from RANLP'95
Published 1997Table of Contents: “…An augmented Earley algorithm for repair; 5.1 String representations; 5.2 Augmentations to the standard algorithm; 5.3 The augmented algorithm; 5.4 Remarks; 6 Conclusion; REFERENCES; Parsing for Targeted Errors in Controlled Languages; Abstract; 1. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
231
-
232
Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs.
Published 2018Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
Full text (MFA users only)
Electronic eBook -
233
Behavioral formation : volatile design processes & the emergence of a strange specificity
Published 2021Table of Contents: “…Intro -- ACKNOWLEDGMENTS -- PREFACE -- INTRODUCTION -- BEHAVIORAL METHODOLOGIES -- FIBROUS ASSEMBLAGES -- FIBROUS TOWER -- POLYSCALAR TECTONICS -- MULTI-AGENT ALGORITHMS -- AGENTBODIES -- BABIY YAR MEMORIAL -- MANIFOLD SWARMS -- RMIT MACE -- BEHAVIORAL COMPOSITES -- COMPOSITE SWARM -- COMPOSITE WING -- RMIT MEETING PAVILION -- AGENTBODY PROTOTYPES -- NGV PAVILION -- STRIATED POLYMERS -- VOLATILITY -- AGENCY OF STRUCTURE -- STRANGE FEEDBACK -- YEOSU PAVILION -- NATIONAL ART MUSEUM OF CHINA -- STRANGE SPECIFICITY -- PAINTERLY FORMATION -- STIGMERGIC ROBOTICS -- CATALOG OF PROJECTS -- GLOSSARY OF TERMS -- BIBLIOGRAPHY.…”
Full text (MFA users only)
Electronic eBook -
234
Tales of Literacy for the 21st Century : the Literary Agenda.
Published 2016Table of Contents: “…; Deep reading and what comes next; A first algorithm for what comes next; Notes; 7: A Tale of Hope for Non-Literate Children.…”
Full text (MFA users only)
Electronic eBook -
235
Principles of Quantum Computation and Information, Volume I : Basic Concepts.
Published 2004Full text (MFA users only)
Electronic eBook -
236
-
237
Challenges and opportunities of HealthGrids : proceedings of Healthgrid 2006
Published 2006Table of Contents: “…Early Diagnosis of Alzheimer's Disease Using a Grid Implementation of Statistical Parametric Mapping AnalysisUsing the Grid to Analyze the Pharmacokinetic Modelling After Contrast Administration in Dynamic MRI; Medical Image Registration Algorithms Assessment: Bronze Standard Application Enactment on Grids Using the MOTEUR Workflow Engine; Ethical, Legal and Privacy Issues on HealthGrids; The Ban on Processing Medical Data in European Law: Consent and Alternative Solutions to Legitimate Processing of Medical Data in HealthGrid.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
238
-
239
Spatial capture-recapture
Published 2013Table of Contents: “…3.3 Characterizing Posterior Distributions by MCMC Simulation3.3.1 What goes on under the MCMC hood; 3.3.2 Rules for constructing full conditional distributions; 3.3.3 Metropolis-Hastings algorithm; 3.4 Bayesian Analysis Using the BUGS Language; 3.4.1 Linear regression in WinBUGS; 3.5 Practical Bayesian Analysis and MCMC; 3.5.1 Choice of prior distributions; 3.5.2 Convergence and so forth; 3.5.3 Bayesian confidence intervals; 3.5.4 Estimating functions of parameters; 3.6 Poisson GLMs; 3.6.1 North American breeding bird survey data; 3.6.2 Poisson GLM in WinBUGS.…”
Full text (MFA users only)
Electronic eBook -
240
Iaeng transactions on electrical engineering. Vol. 1, Special issue of the International Multiconference of Engineers and Computer Scientists 2012
Published 2013Table of Contents: “…Pawar -- Web services for chronic pain monitoring / Nuno Goncalo Coelho Costa Pombo, Pedro Jose Guerra de Araujo and Joaquim Manuel Vieira da Silva Viana -- Parallel binomial American option pricing on CPU-GPU hybrid platform / Nan Zhang, Chi-Un Lei and Ka Lok Man -- The subsystem grouping scheme using use case dependency graph and domain-specific semantic model for large complex systems / Nanchaya Khrueahong and Wiwat Vatanawood -- MOBM: a methodology for building practical domain ontologies from database information / Minyoung Ra [and others] -- A trial of the dynamic weighted sum method for multi-objective optimization / Hong Zhang -- A multi-agent platform to manage distributed and heterogeneous knowledge by using semantic web / Inaya Lahoud [and others] -- An intelligent train marshaling based on the processing time considering group layout of freight cars / Yoichi Hirashima -- A web-based multilingual intelligent tutor system based on Jackson's learning styles profiler and expert systems / H. …”
Full text (MFA users only)
Electronic eBook