Warning: file_put_contents(cache/omni_abef97cb39e6c804e97ca2f07db6be03.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
The Future of Financial Systems in the Digital Age
Perspectives from Europe and Japan...
View Book →Bistatic SAR data processing algorithms
"This book focuses on bistatic SAR signal processing, mainly on imaging aspects. Topics include bistatic SAR resolution analysis, echo generation methods, imaging algorithms, imaging parameters estima...
View Book →
Projection-Based Clustering through Self-Organization and Swarm Intelligence
Combining Cluster Analysis with the Visualization of High-Dimensional Data...
View Book →
Codes as fractals and noncommutative spaces
We consider the CSS algorithm relating self-orthogonal classical linear codes to q-ary quantum stabilizer codes and we show that to such a pair of a classical and a quantum code one can associate geom...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Convex optimization for the planted k-disjoint-clique problem
We consider the k-disjoint-clique problem. The input is an undirected graph G in which the nodes represent data items, and edges indicate a similarity between the corresponding items. The problem is t...
View Book →
Rhetorical Code Studies
Discovering Arguments in and around Code...
View Book →Metropolis algorithm and equienergy sampling for two mean field spin systems
In this paper we study the Metropolis algorithm in connection with two mean--field spin systems, the so called mean--field Ising model and the Blume--Emery--Griffiths model. In both this examples the ...
View Book →
Digital signal processing
First published in 1992...
View Book →
Fundamental Approaches to Software Engineering
21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Natural Computing and Beyond
Winter School Hakodate 2011, Hakodate, Japan, March 2011 and 6th International Workshop on Natural Computing, Tokyo, Japan, March 2012, Proceedings...
View Book →
Automated Machine Learning
Methods, Systems, Challenges...
View Book →
Ray Tracing Gems
High-Quality and Real-Time Rendering with DXR and Other APIs...
View Book →
Machine Learning for Cyber Physical Systems
Selected papers from the International Conference ML4CPS 2020...
View Book →Multimodal diff-hash
Many applications require comparing multimodal data with different structure and dimensionality that cannot be compared directly. Recently, there has been increasing interest in methods for learning a...
View Book →
Teaching and Learning About Whole Numbers in Primary School
...
View Book →
Mathematical Logic and Its Applications 2020
...
View Book →TS 135 202 - V6.1.0 - Universal Mobile Telecommunications System (UMTS); Specification of the 3GPP c
Available on Internet Archive....
View Book →Algorithmic adventures : from knowledge to magic
"This book is a fascinating read for students of all levels, and for those curious to learn about the science and magic of algorithmics and its role in other scientific disciplines."--BOOK JACKET....
View Book →
Dictionary of algorithms and data structures
"This is a dictionary of algorithms, algorithmic techniques, data structures, archetypical problems, and related definitions. Algorithms include common functions, such as Ackermann's function. Problem...
View Book →
Graph theoretic algorithms for the ground based strategic deterrent program : prioritization and sch
During the execution of programs, managers must orchestrate the planning and performance of upwards of tens of thousands of interdependent tasks. Many of these tasks have interdependencies such that f...
View Book →
Problem Solving with Algorithms and Data Structures
...
View Book →
Short sales and trade classification algorithms
"This paper demonstrates that short sales are often misclassified as buyer-initiated by the Lee-Ready and other commonly used trade classification algorithms. This result is due in part to regulation...
View Book →
Machine Learning Yearning
Technical Strategy for AI Engineers, In the Era of Deep Learning...
View Book →Calculation of the Two-body T-matrix in Configuration Space
A spectral integral method (IEM) for solving the two-body Schroedinger equation in configuration space is generalized to the calculation of the corresponding T-matrix. It is found that the desirable f...
View Book →
Algorithms for Decision Making
...
View Book →
Theory and Applications of Ordered Fuzzy Numbers
A Tribute to Professor Witold Kosiński...
View Book →
IMPROVE - Innovative Modelling Approaches for Production Systems to Raise Validatable Efficiency
Intelligent Methods for the Factory of the Future...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
Lithium-Ion Batteries
A Machine-Generated Summary of Current Research...
View Book →
Data structures and algorithms
First published in 1983...
View Book →A derivative-free optimization method to compute scalar perturbation of AdS black holes
In this work we describe an interesting application of a simple derivative-free optimization method to extract the quasinormal modes (QNM's) of a massive scalar field propagating in a 4-dimensional Sc...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Design Analysis and Algorithms
First published in 2008...
View Book →Optimization of Information Rate Upper and Lower Bounds for Channels with Memory
We consider the problem of minimizing upper bounds and maximizing lower bounds on information rates of stationary and ergodic discrete-time channels with memory. The channels we consider can have a fi...
View Book →
Allocation of forces, fires, and effects using genetic algorithms
"Prepared for the United States Army." Includes bibliographical references (pages 61-62). Description based on print version record; resource not viewed....
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Two-Loop Superstrings VII, Cohomology of Chiral Amplitudes
The relation between superholomorphicity and holomorphicity of chiral superstring N-point amplitudes for NS bosons on a genus 2 Riemann surface is shown to be encoded in a hybrid cohomology theory, in...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Grokking Algorithms: An illustrated guide for programmers and other curious people
First published in 2016...
View Book →Algorithms--ESA 2007 : 15th annual European symposium, Eilat, Israel, October 8-10, 2007 : proceedin
Includes bibliographical references and index. Also issued online....
View Book →
Data, algorithms and policies : redefining the digital world
Also available on the Internet as a PDF file. Includes bibliographical references. Description based on print version record; resource not viewed....
View Book →Fair allocation of fixed cost in one- and two-stage systems using data envelopment analysis
Purpose: The fair allocation and distribution of fixed costs in a set of competitive entities is one of the most important management issues. Fair cost allocation between stages is of particular imp...
View Book →
Teaching Multiplication with Lesson Study
Japanese and Ibero-American Theories for Mathematics Education...
View Book →
One-node quadrature beats monte carlo a generalized stochastic simulation algorithm
"In conventional stochastic simulation algorithms, Monte Carlo integration and curve fitting are merged together and implemented by means of regression. We perform a decomposition of the solution err...
View Book →Algorithm theory -- SWAT 2006 : 10th Scandinavian Workshop on Algorithm Theory, Riga, Latvia, July 6
Includes bibliographical references and index. Also issued online....
View Book →
Market Segmentation Analysis
Understanding It, Doing It, and Making It Useful...
View Book →
Programming for Computations - MATLAB/Octave
A Gentle Introduction to Numerical Simulations with MATLAB/Octave...
View Book →
Foundations of Software Science and Computation Structures
22nd International Conference, FOSSACS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings...
View Book →
Deferred acceptance algorithms history, theory, practice, and open questions
"The deferred acceptance algorithm proposed by Gale and Shapley (1962) has had a profound influence on market design, both directly, by being adapted into practical matching mechanisms, and, indirectl...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Data Structures and Algorithms Made Easy
First published in 2011...
View Book →
Social Media Mining
An Introduction...
View Book →
Optimization of Process Flowsheets through Metaheuristic Techniques
...
View Book →
Elements of causal inference : foundations and learning algorithms
Includes bibliographical references (pages 235-262) and index. Description based on print version record; resource not viewed....
View Book →
Cloud-Based Benchmarking of Medical Image Analysis
...
View Book →
Data structures and algorithm analysis in C
First published in 1993...
View Book →
Introduction to Algorithms
First published in 1990...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Constitutional challenges in the algorithmic society
"Technologies have always led to turning points for social development. In the past, different technologies have opened the doors towards new phase of growth and change while influencing social values...
View Book →
Graph Databases
New Opportunities for Connected Data...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →Self-Calibration of Radio Astronomical Arrays With Non-Diagonal Noise Covariance Matrix
The radio astronomy community is currently building a number of phased array telescopes. The calibration of these telescopes is hampered by the fact that covariances of signals from closely spaced ant...
View Book →A fast parallel algorithm for minimum-cost small integral flows
We present a new approach to the minimum-cost integral flow problem for small values of the flow. It reduces the problem to the tests of simple multi-variate polynomials over a finite field of charact...
View Book →
Finite Difference Computing with Exponential Decay Models
...
View Book →
Tools and Algorithms for the Construction and Analysis of Systems
25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part ...
View Book →Comparison of the speedy estimate methods of the induction motors
This paper deals with a novel method to achieve the effective performance of the extended Kalman filter (EKF) for the speedy estimate of an induction motor. The real coding genetic algorithm (GA) is u...
View Book →
Forecasting and Assessing Risk of Individual Electricity Peaks
...
View Book →
The Art of SEO
Mastering Search Engine Optimization...
View Book →
Introduction to Embedded Systems
A Cyber-Physical Systems Approach...
View Book →Widespread Occurrence of Trenching Patterns in the Granulation Field: Evidence for Roll Convection?
Time-averaged series of granulation images are analysed using COLIBRI, a purpose-adapted version of a code originally developed to detect straight or curvilinear features in aerospace images. The algo...
View Book →
Algorithmic equity : a framework for social applications
Social institutions-such as markets, social media platforms, criminal justice systems, and employment processes-increasingly leverage algorithms for decisionmaking purposes. This report examines poten...
View Book →
Statistical Learning and Sequential Prediction
...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Graph Databases For Beginners
The #1 Platform for Connected Data...
View Book →
The open Gromov-Witten-Welschinger theory of blowups of the projective plane
We compute the Welschinger invariants of blowups of the projective plane at an arbitrary conjugation invariant configuration of points. Specifically, open analogues of the WDVV equation and Kontsevich...
View Book →Digital platforms and algorithmic subjectivities
Algorithms are a form of productive power - so how may we conceptualise the newly merged terrains of social life, economy and self in a world of digital platforms? How do multiple self-quantifying pra...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Advances in Energy System Optimization
Proceedings of the 2nd International Symposium on Energy System Optimization...
View Book →
Graph Algorithms
Practical Examples in Apache Spark and Neo4j...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →Algorithms--ESA 2005 : 13th annual European symposium, Palma de Mallorca, Spain, October 3-6, 2005 :
Includes bibliographical references and index. Also issued online....
View Book →
System process form : type as algorithm
Designed and edited by MuirMcNeil, and published by Thames & Hudson, System Process Form displays hundreds of visual examples taken from MuirMcNeil's Two type system which comprises eight type family ...
View Book →
CS Unplugged
An enrichment and extension programme for primary-aged students...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →The Landau gauge gluon and ghost propagators in 4D SU(3) gluodynamics in large lattice volumes
We present recent results of the Landau gauge gluon and ghost propagators in SU(3) pure gauge theory at Wilson \beta=5.7 for lattice sizes up to 80^4 corresponding to physical volumes up to (13.2 fm)^...
View Book →About incoherent inference
In Templeton (2010), the Approximate Bayesian Computation (ABC) algorithm (see, e.g., Pritchard et al., 1999, Beaumont et al., 2002, Marjoram et al., 2003, Ratmann et al., 2009) is criticised on mathe...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Algorithms to Live By
First published in 2016...
View Book →
Tensor Network Contractions
Methods and Applications to Quantum Many-Body Systems...
View Book →
Enhanced Living Environments : Algorithms, Architectures, Platforms, and Systems
This open access book is the final publication of the COST Action IC1303 "Algorithms, Architectures and Platforms for Enhanced Living Environments (AAPELE)" project. Ambient Assisted Living (AAL) is a...
View Book →
Exact test for Markov order
We describe an exact test of the null hypothesis that a Markov chain is nth order versus the alternate hypothesis that it is $(n+1)$-th order. The procedure does not rely on asymptotic properties, but...
View Book →
Foundations of Machine Learning
...
View Book →
2D Game Development: From Zero to Hero
A compendium of the community knowledge on game design and development...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →The Extended Littlestone's Dimension for Learning with Mistakes and Abstentions
This paper studies classification with an abstention option in the online setting. In this setting, examples arrive sequentially, the learner is given a hypothesis class $\mathcal H$, and the goal of ...
View Book →Calculating conjugacy classes in Sylow p-subgroups of finite Chevalley groups of rank six and seven
Let G(q) be a finite Chevalley group, where q is a power of a good prime p, and let U(q) be a Sylow p-subgroup of G(q). Then a generalized version of a conjecture of Higman asserts that the number k(U...
View Book →
Think Data Structures
Algorithms and Information Retrieval in Java...
View Book →Wireless communications : algorithmic techniques
"This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It...
View Book →
Foundations of Trusted Autonomy
...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →