Online algorithm

Results: 302



#Item
181Applied mathematics / Science / Mathematics / Evolutionary game theory / Game theory / Algorithm

CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. 0000; 00:1–18 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: [removed]cpe Applying the dynamics of evo

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2013-08-29 10:47:23
182Business / Scheduling algorithms / Technology / Scheduling / Mathematical optimization / Applied mathematics / Genetic algorithm scheduling / Nurse scheduling problem / Operations research / Planning / Constraint programming

c o m p u t e r s & s e c u r i t y[removed]2 9 3 e3 0 4 Available online at www.sciencedirect.com ScienceDirect journal homepage: www.elsevier.com/locate/cose

Add to Reading List

Source URL: all.net

Language: English - Date: 2014-08-05 08:18:56
183Markov models / Computational statistics / Bayesian statistics / Markov chain Monte Carlo / Bayesian inference / Estimation theory / Markov chain / Metropolis–Hastings algorithm / Monte Carlo integration / Statistics / Monte Carlo methods / Statistical inference

INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN ENGINEERING Int. J. Numer. Meth. Engng[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]nme.4748 Data-driven model reduction for the Ba

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-10-06 09:25:06
184Cryptosystem / Symmetric-key algorithm / Cryptography / Iris recognition / Cipher

Microsoft Word - Noore-IJSP-Revised.doc

Add to Reading List

Source URL: www.biometrie-online.net

Language: English - Date: 2014-10-27 18:35:21
185Certificate policy / Revocation list / Public key certificate / X.509 / Certificate authority / Online Certificate Status Protocol / Public key infrastructure / X.500 / Certification path validation algorithm / Cryptography / Public-key cryptography / Key management

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATION[removed]September 2008

Add to Reading List

Source URL: t4c46.pki.qld.gov.au

Language: English - Date: 2013-08-05 22:03:26
186Certificate policy / Revocation list / Public key certificate / X.509 / Certificate authority / Online Certificate Status Protocol / Public key infrastructure / Certification path validation algorithm / Extended Validation Certificate / Cryptography / Public-key cryptography / Key management

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATION[removed]September 2008

Add to Reading List

Source URL: t4c2.pki.qld.gov.au

Language: English - Date: 2013-08-05 22:00:18
187Certificate policy / Revocation list / Public key certificate / X.509 / Certificate authority / Online Certificate Status Protocol / Public key infrastructure / Certification path validation algorithm / Extended Validation Certificate / Cryptography / Public-key cryptography / Key management

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATION[removed]September 2008

Add to Reading List

Source URL: t4c47.pki.qld.gov.au

Language: English - Date: 2013-08-05 22:04:26
188Linear programming / Convex analysis / Self-concordant function / Interior point method / Ellipsoid method / Algorithm / Convex function / Stability / Shapley–Folkman lemma / Mathematical optimization / Operations research / Convex optimization

4164 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 7, JULY 2012 Interior-Point Methods for Full-Information and Bandit Online Learning

Add to Reading List

Source URL: stat.wharton.upenn.edu

Language: English - Date: 2013-03-18 20:18:38
189Online algorithm / Algorithm / Mathematics / Applied mathematics / Statistics / Decision theory / Regret / Perceptron

An Efficient Bandit Algorithm for √ T -Regret in Online Multiclass Prediction?

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2013-10-28 18:03:14
190Block ciphers / Block cipher / Data Encryption Standard / Block size / Initialization vector / Cipher / Symmetric-key algorithm / Key schedule / ARIA / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

International Journal of Engineering Research Volume No.3, Issue No.12, pp : [removed]ISSN:[removed]online),[removed]print) 01 Dec. 2014

Add to Reading List

Source URL: www.ijer.in

Language: English - Date: 2014-11-30 09:12:30
UPDATE