Search Results - (((((((want OR wkant) OR mantis) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 48
- Artificial intelligence 40
- Mathematics 36
- Machine learning 34
- Mathematical models 34
- Algorithms 24
- artificial intelligence 24
- Data mining 21
- algorithms 21
- Social aspects 19
- Artificial Intelligence 17
- Computer networks 17
- Mathematical optimization 17
- Technological innovations 17
- methods 17
- History 16
- Python (Computer program language) 16
- Application software 14
- Computer algorithms 14
- Development 14
- Statistical methods 13
- Data Mining 12
- Digital techniques 12
- Image processing 12
- Neural networks (Computer science) 12
- Research 12
- Automation 10
- Big data 10
- Electronic data processing 10
- Engineering 10
Search alternatives:
- wkant »
- mantis »
-
281
What Every Teacher Should Know About Effective Teaching Strategies.
Published 1900Table of Contents: “…Procedural MemoryAutomatic Memory -- Emotional Memory -- Chapter 4 -- Procedural Knowledge: Teaching Strategies That Work -- Helping Students Construct Models -- Teaching Procedural Knowledge That Requires Algorithms -- Strategies to Help Construct Models -- Shaping Procedural Knowledge -- Internalizing Procedural Knowledge -- The Metacognitive System -- Chapter 5 -- Graphic Organizers: Strategies for Thinking -- Graphic Organizers -- Chapter 6 -- Using Verbal Strategies in the Classroom -- Brainstorming -- Socratic Questioning -- Quaker Dialogues…”
Full text (MFA users only)
Electronic eBook -
282
Features and processing in agreement
Published 2018Table of Contents: “…1st/2nd vs. 3rd person: Person underspecification and context-dependencePronoun representation and interpretive anchors; The featural makeup of pronouns; Summary; Chapter Five; When disagreement is grammatical: Unagreement; Unagreement processing and the role of interpretive anchors; Unagreeing, null and overt subjects; Summary; Chapter Six; From feature bundles to feature an; Representations, algorithms and neuroanatomical bases of agreement; Relation to existing sentence comprehension models; Conclusion; Notes; Bibliography; Index…”
Full text (MFA users only)
Electronic eBook -
283
Reservoir engineering in modern oilfields : vertical, deviated, horizontal, and multilateral well systems
Published 2016Table of Contents: “…Stratigraphic grids, drilling dome-shaped structures.…”
Full text (MFA users only)
Electronic eBook -
284
Regression Analysis : Theory, Methods, and Applications
Published 1990Table of Contents: “…Random Variables -- B.1.2 Correlated Random Variables -- B.1.3 Sample Statistics -- B.1.4 Linear Combinations of Random Variables -- B.2 Random Vectors -- B.3 The Multivariate Normal Distribution -- B.4 The Chi-Square Distributions -- B.5 The F and t Distributions -- B.6 Jacobian of Transformations -- B.7 Multiple Correlation -- Problems -- C Nonlinear Least Squares -- C.1 Gauss-Newton Type Algorithms -- C.1.1 The Gauss-Newton Procedure -- C.1.2 Step Halving -- C.1.3 Starting Values and Derivatives -- C.1.4 Marquardt Procedure -- C.2 Some Other Algorithms -- C.2.1 Steepest Descent Method -- C.2.2 Quasi-Newton Algorithms -- C.2.3 The Simplex Method -- C.2.4 Weighting -- C.3 Pitfalls -- C.4 Bias, Confidence Regions and Measures of Fit -- C.5 Examples -- Problems -- Tables -- References -- Author Index.…”
Full text (MFA users only)
Electronic eBook -
285
Machine Learning for Asset Management New Developments and Financial Applications
Published 2020Full text (MFA users only)
Electronic eBook -
286
Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow.
Published 2018Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
Full text (MFA users only)
Electronic eBook -
287
Curves and Surfaces for CAGD : a Practical Guide.
Published 2001Table of Contents: “…Coons Patches; Chapter 23. Shape; Chapter 24. Evaluation of Some Methods; App.…”
Full text (MFA users only)
Electronic eBook -
288
Hands-On Automated Machine Learning : a beginner's guide to building automated machine learning systems using AutoML and Python.
Published 2018Table of Contents: “…; Why use AutoML and how does it help?; When do you automate ML?; What will you learn?; Core components of AutoML systems; Automated feature preprocessing; Automated algorithm selection; Hyperparameter optimization; Building prototype subsystems for each component; Putting it all together as an end-to-end AutoML system; Overview of AutoML libraries; Featuretools; Auto-sklearn; MLBox; TPOT; Summary.…”
Full text (MFA users only)
Electronic eBook -
289
Novel Trends in Production Devices and Systems II : Special Topic Volume with Invited Peer Reviewed Papers Only
Published 2014Table of Contents: “…Input Control in Production System by Simulation OptimizationThe Options of Using Data Mining Methods in Process Control; Synographical Approach to Dynamical Systems Analysis; Optimization of Technical System by Using FTA and Genetic Algorithm; Improving the Sustainability and Effectiveness of the Inventory Management in Manufacturing Company; Improving the Quality of Manufacturing Process through Six Sigma Application in the Automotive Industry; Genetic Algorithms in Test Design Automation; Reflections on the Opportunities of Multicriteria Optimization within Simulation Studies.…”
Full text (MFA users only)
Electronic eBook -
290
Atlas of AI : power, politics, and the planetary costs of artificial intelligence
Published 2021Full text (MFA users only)
Electronic eBook -
291
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
292
-
293
-
294
Bladder Cancer : diagnosis and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
295
-
296
Emergence and collapse of early villages : models of central mesa verde archaeology
Published 2012Full text (MFA users only)
Electronic eBook -
297
Two-degree-of-freedom control systems : the Youla Parameterization approach
Published 2015Full text (MFA users only)
Electronic eBook -
298
Constraint Solving over Multi-valued Logics : Application to Digital Circuits.
Published 2002Full text (MFA users only)
Electronic eBook -
299
Personality Revolution : Using AI to Understand Your Customers and Win More Business.
Published 2019Table of Contents: “…Cover; Title Page; Copyright Page; Contents; Introduction; Doubting the Usefulness of Personality Models; Joining the Personality Revolution; PART I The Truth About Personality: Making sense of human behavior in an unpredictable world; Chapter 1 The High Cost of Not Understanding People; Flying Blind in a Complicated World; Seeing Others Through the Lens of Personality; What Happens When Personalities Clash; How Crystal Got Started; Chapter 2 The Ingredients of a Unique Personality; Where Do Personality Differences Come From?…”
Full text (MFA users only)
Electronic eBook -
300
Advances in structures analysis : special topic volume with invited peer reviewed papers only
Published 2011Full text (MFA users only)
Electronic eBook