Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer algorithms 10
- Algorithms 5
- Computer programming 5
- Algoritmos 4
- Data structures (Computer science) 4
- Python (Computer program language) 3
- Application software 2
- Computer science 2
- Electronic data processing 2
- Java (Computer program language) 2
- Programación de ordenadores 2
- Algoritmos computacionales 1
- Artificial intelligence 1
- C (Computer program language) 1
- C# (Computer program language) 1
- COMMON LISP (Computer program language) 1
- COMPUTERS 1
- Cogeneration of electric power and heat 1
- Compression testing 1
- Computer Communication Networks 1
- Computer communication systems 1
- Computer graphics 1
- Computer software 1
- Computers 1
- Computers and Society 1
- Computers and civilization 1
- Cryptology 1
- Data encryption (Computer science) 1
- Data processing 1
- Data protection 1
-
21por Lopez, Cesar. authorTabla de Contenidos: “…""Contents at a Glance""; ""Contents""; ""About the Author""; ""Chapter 1: Introducing MATLAB and the MATLAB Working Environment""; ""Introduction""; ""Developing Algorithms and Applications""; ""Data Access and Analysis""; ""Data Visualization""; ""Numerical Calculation""; ""Publication of Results and Distribution of Applications""; ""The MATLAB working environment""; ""Help in MATLAB""; ""Numerical Computation with MATLAB""; ""Symbolic Calculations with MATLAB""; ""Graphics with MATLAB""; ""General Notation""; ""Help with Commands""; ""MATLAB and Programming""…”
Publicado 2014
Libro electrónico -
22Publicado 1992Tabla de Contenidos: “…Program design; 1.1 Steps in program development; 1.2 Structured programming; 1.3 An introduction to algorithms and pseudocode; 1.4 Chapter summary; Chapter 2. …”
Libro electrónico -
23Publicado 2022Tabla de Contenidos: “…-- Self-Taught Success Stories -- Matt Munson -- Tianni Myers -- Getting Started -- Installing Python -- Troubleshooting -- Challenges -- Sticking with It -- Part I Introduction to Algorithms -- Chapter 1 What Is an Algorithm? …”
Libro electrónico -
24Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Algorithmic Trading and the TradeStation Platform -- Introducing algorithmic trading -- Algorithmic trading definition -- Algorithmic trading in quantitative hedge funds -- Introducing the TradeStation platform -- The TradeStation story -- Download and installation procedure -- Introducing TradeStation apps -- Workspaces and desktops -- Summary -- Chapter 2: Getting Hands-On with EasyLanguage -- Understanding the basics of EasyLanguage…”
Libro electrónico -
25Publicado 1992Tabla de Contenidos: “…Fast Bitmap Stretching; Introduction; The Algorithm; Some Projects Using the Bitmap Stretcher; Further Work; Chapter 2. …”
Libro electrónico -
26por Dave, Parag H.Tabla de Contenidos: “…Problem -- Single Source Shortest Paths -- Shortest Paths Problem -- Shortest Paths Tree -- All-Pairs Shortest Paths -- Maximum Flow Problems -- Flow Networks -- Maximum-Flow Problem -- Analysis of Ford-Fulkerson Algorithm -- Conclusion -- Summary -- Key Terms -- Exercises -- Web Resources -- Abstract Algorithms 4-Backtracking -- Objectives -- Combinatorial Search -- Search and Traversal -- Breadth First Search -- Depth First Search -- The Backtracking Strategy -- Example 1: 8-Queens Problem -- Backtracking Framework -- Efficiency of Backtracking -- Example 2: M-Colouring Problem -- Example 3: Hamiltonian Circuits -- Some Typical State Spaces -- Constructing all Subsets -- Constructing all Permutations -- Constructing all Paths in a Graph -- Bandwidth Minimization -- Covering Chess Boards -- Convex Hull -- Summary -- Key Terms -- Exercises -- Web Resources -- Natural Algorithms-GA, SA, ANN, TS -- Objectives -- Introduction -- Evolutionary Algorithms and Evolutionary Computing -- Genetic Algorithms -- An example problem -- Observations -- Simulated Annealing -- Sample implementation -- Artificial Neural Networks -- Analogy to the Brain -- How they Work? …”
Publicado 1900
Libro electrónico -
27por Loudon, KyleTabla de Contenidos: “…Preliminaries; 1.2. An Introduction to Algorithms; 1.2.1.2. Divide-and-conquer algorithms; 1.2.1.3. …”
Publicado 1999
Libro electrónico -
28por Yang, Xin-SheTabla de Contenidos: “…Half Title; Title Page; Copyright; Contents; Preface; 1 Introduction to Algorithms; 1.1 What is an Algorithm?; 1.2 Newton's Method; 1.3 Optimization; 1.3.1 Gradient-Based Algorithms; 1.3.2 Hill Climbing with Random Restart; 1.4 Search for Optimality; 1.5 No-Free-Lunch Theorems; 1.5.1 NFL Theorems; 1.5.2 Choice of Algorithms; 1.6 Nature-Inspired Metaheuristics; 1.7 A Brief History of Metaheuristics; References; 2 Analysis of Algorithms; 2.1 Introduction; 2.2 Analysis of Optimization Algorithms; 2.2.1 Algorithm as an Iterative Process; 2.2.2 An Ideal Algorithm?…”
Publicado 2014
Libro electrónico -
29Tabla de Contenidos: “…Botnets -- A Closer Look at Spyware -- Trojans and Backdoors -- Rootkits -- Viruses and Worms -- Botnets -- Brief History of Viruses, Worms, and Trojans -- The Current Situation -- Anti-Virus Software -- Need for Anti-Virus Software -- Top 5 Commercially Available Anti-Virus Software -- Symantec Norton Anti-Virus Software -- McAfee Anti- Virus -- Kaspersky Anti- Virus -- Bitdefender Anti- Virus -- AVG Anti-Virus Software -- A Few Words of Caution -- Chapter Summary -- Chapter 8: Cryptography -- Introduction -- Cryptographic Algorithms -- Symmetric Key Cryptography -- Key Distribution -- Asymmetric Key Cryptography -- Public Key Cryptography -- RSA Algorithm -- Advantages of Public Key Cryptography -- Applications of PKC -- Public Key Infrastructure (PKI) -- Certificate Authority (CA) -- Digital Certificate -- Hash Function Cryptography -- Popular Hashes -- Digital Signatures -- Summary of Cryptography Standard Algorithms -- Disk / Drive Encryption -- Attacks on Cryptography -- Chapter Summary -- Part IV: Network Security -- Chapter 9: Understanding Networks and Network Security -- Introduction -- Networking Fundamentals -- Computer Communication -- Network and its Components -- Network Protocols -- OSI (Open Systems Interconnection) Reference Model -- TCP/IP Model -- Network Vulnerabilities and Threats -- Vulnerabilities -- Security Policy Weaknesses -- Technology Weaknesses -- Configuration Weaknesses -- Threats -- Attacks -- Reconnaissance -- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) -- Other Attacks on Networks -- How to counter the Network Attacks -- Chapter Summary -- Chapter 10: Firewalls -- Introduction -- How Do You Protect a Network? …”
Libro electrónico -
30Publicado 2011Tabla de Contenidos: “…Objects and Access Policies -- Name Servers -- Storage Servers -- Implementation -- Client -- Name Server -- Storage Server -- Applications -- Untrusted Storage Server -- Evaluation -- Application Performance -- Availability -- Related Work -- Conclusion -- References -- Storage and Performance Management -- Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud -- Introduction -- LiveDFS Design -- Primitives -- Deduplication Design -- Prefetching of Fingerprint Store -- Journaling -- LiveDFS Implementation and Deployment -- Experiments -- I/O Throughput -- OpenStack Deployment -- Related Work -- Conclusions and Future Work -- References -- Scalable Load Balancing in Cluster Storage Systems -- Introduction -- Preliminaries -- Algorithms for Load Balancing -- Exact Solution: ILP Formulation -- Approximation -- Implementation of Ursa on Windows Azure -- Experiments -- Evaluation on Simulator -- Evaluation on Windows Azure -- Related Work -- Conclusion and Future Work -- References -- Predico: A System for What-if Analysis in Complex Data Center Applications -- Introduction -- Background and Problem Formulation -- Modeling a Data Center Application -- Queuing Theoretic Node-Level Models -- Workload Models -- Model Composition: From Node-Level to System-Level Models -- Answering What-if Queries -- On-the-Fly Model Construction Using the Influence Graph -- Query Execution Using Change Propagation -- Predico Implementation -- Posing What-if Queries in Predico -- Prototype Implementation -- Experimental Evaluation -- Experimental Setup -- Accuracy of Node-Level Resource Usage and Latency Models -- Accuracy of Node-Level Workload Models -- Accuracy of System-Level Models with Increasing Composition Depth -- Accuracy of System-Level Models with Varying Topology -- Workload-Only What-If Analysis Case Study -- Related Work -- Conclusions…”
Libro electrónico -
31Publicado 2015“…The book is an introduction to algorithmic complexity. Examples taken from current research in the polymer sciences are used for compression of like-natured properties as found on a chain of polymers. …”
Libro electrónico -
32Publicado 2019“…You'll start with an introduction to algorithmic trading, along with setting up the environment required to perform the tasks in the book. …”
Libro electrónico