Search Results - (((((((want OR wkant) OR mantis) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 281

    What Every Teacher Should Know About Effective Teaching Strategies. by Tileston, Donna E. Walker

    Published 1900
    Table of Contents: “…Procedural MemoryAutomatic Memory -- Emotional Memory -- Chapter 4 -- Procedural Knowledge: Teaching Strategies That Work -- Helping Students Construct Models -- Teaching Procedural Knowledge That Requires Algorithms -- Strategies to Help Construct Models -- Shaping Procedural Knowledge -- Internalizing Procedural Knowledge -- The Metacognitive System -- Chapter 5 -- Graphic Organizers: Strategies for Thinking -- Graphic Organizers -- Chapter 6 -- Using Verbal Strategies in the Classroom -- Brainstorming -- Socratic Questioning -- Quaker Dialogues…”
    Full text (MFA users only)
    Electronic eBook
  2. 282

    Features and processing in agreement by Mancini, Simona, 1978-

    Published 2018
    Table of Contents: “…1st/2nd vs. 3rd person: Person underspecification and context-dependencePronoun representation and interpretive anchors; The featural makeup of pronouns; Summary; Chapter Five; When disagreement is grammatical: Unagreement; Unagreement processing and the role of interpretive anchors; Unagreeing, null and overt subjects; Summary; Chapter Six; From feature bundles to feature an; Representations, algorithms and neuroanatomical bases of agreement; Relation to existing sentence comprehension models; Conclusion; Notes; Bibliography; Index…”
    Full text (MFA users only)
    Electronic eBook
  3. 283

    Reservoir engineering in modern oilfields : vertical, deviated, horizontal, and multilateral well systems by Chin, Wilson C.

    Published 2016
    Table of Contents: “…Stratigraphic grids, drilling dome-shaped structures.…”
    Full text (MFA users only)
    Electronic eBook
  4. 284

    Regression Analysis : Theory, Methods, and Applications by Sen, Ashish

    Published 1990
    Table of Contents: “…Random Variables -- B.1.2 Correlated Random Variables -- B.1.3 Sample Statistics -- B.1.4 Linear Combinations of Random Variables -- B.2 Random Vectors -- B.3 The Multivariate Normal Distribution -- B.4 The Chi-Square Distributions -- B.5 The F and t Distributions -- B.6 Jacobian of Transformations -- B.7 Multiple Correlation -- Problems -- C Nonlinear Least Squares -- C.1 Gauss-Newton Type Algorithms -- C.1.1 The Gauss-Newton Procedure -- C.1.2 Step Halving -- C.1.3 Starting Values and Derivatives -- C.1.4 Marquardt Procedure -- C.2 Some Other Algorithms -- C.2.1 Steepest Descent Method -- C.2.2 Quasi-Newton Algorithms -- C.2.3 The Simplex Method -- C.2.4 Weighting -- C.3 Pitfalls -- C.4 Bias, Confidence Regions and Measures of Fit -- C.5 Examples -- Problems -- Tables -- References -- Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  5. 285
  6. 286

    Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow. by Ravichandiran, Sudharsan

    Published 2018
    Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
    Full text (MFA users only)
    Electronic eBook
  7. 287

    Curves and Surfaces for CAGD : a Practical Guide. by Farin, Gerald

    Published 2001
    Table of Contents: “…Coons Patches; Chapter 23. Shape; Chapter 24. Evaluation of Some Methods; App.…”
    Full text (MFA users only)
    Electronic eBook
  8. 288

    Hands-On Automated Machine Learning : a beginner's guide to building automated machine learning systems using AutoML and Python. by Das, Sibanjan

    Published 2018
    Table of Contents: “…; Why use AutoML and how does it help?; When do you automate ML?; What will you learn?; Core components of AutoML systems; Automated feature preprocessing; Automated algorithm selection; Hyperparameter optimization; Building prototype subsystems for each component; Putting it all together as an end-to-end AutoML system; Overview of AutoML libraries; Featuretools; Auto-sklearn; MLBox; TPOT; Summary.…”
    Full text (MFA users only)
    Electronic eBook
  9. 289

    Novel Trends in Production Devices and Systems II : Special Topic Volume with Invited Peer Reviewed Papers Only

    Published 2014
    Table of Contents: “…Input Control in Production System by Simulation OptimizationThe Options of Using Data Mining Methods in Process Control; Synographical Approach to Dynamical Systems Analysis; Optimization of Technical System by Using FTA and Genetic Algorithm; Improving the Sustainability and Effectiveness of the Inventory Management in Manufacturing Company; Improving the Quality of Manufacturing Process through Six Sigma Application in the Automotive Industry; Genetic Algorithms in Test Design Automation; Reflections on the Opportunities of Multicriteria Optimization within Simulation Studies.…”
    Full text (MFA users only)
    Electronic eBook
  10. 290
  11. 291

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  12. 292
  13. 293

    Helping Children Learn Mathematics.

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  14. 294

    Bladder Cancer : diagnosis and clinical management

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  15. 295

    Apache Spark for Data Science Cookbook. by Chitturi, Padma Priya

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  16. 296
  17. 297
  18. 298
  19. 299

    Personality Revolution : Using AI to Understand Your Customers and Win More Business. by D'Agostino, Andrew

    Published 2019
    Table of Contents: “…Cover; Title Page; Copyright Page; Contents; Introduction; Doubting the Usefulness of Personality Models; Joining the Personality Revolution; PART I The Truth About Personality: Making sense of human behavior in an unpredictable world; Chapter 1 The High Cost of Not Understanding People; Flying Blind in a Complicated World; Seeing Others Through the Lens of Personality; What Happens When Personalities Clash; How Crystal Got Started; Chapter 2 The Ingredients of a Unique Personality; Where Do Personality Differences Come From?…”
    Full text (MFA users only)
    Electronic eBook
  20. 300