Scalable Optimization via Probabilistic Modeling. From Algorithms to Applications

Motivation from Genetic and Evolutionary Computation. Factorization of the Search Distribution. The Convex and Concave Lagrangian. FDA Factorizations and Region Graphs. Probabilistic Optimization and Linkage Learning. Learning Bayesian Networks from Data.

Подобные документы

  • New computer arithmetics doing the parallel process of multiplying and division. A scoring in accuracy of representation of numbers is as result of the development of arithmetics. Factorizations of operands is in a basis of parallel computer arithmetics.

    статья, добавлен 10.08.2013

  • Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.

    статья, добавлен 13.08.2023

  • Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.

    статья, добавлен 23.06.2016

  • Analysis of simple principal component as a tool for dimension reduction can fail badly. Local approximations of principal component as among the most promising. Localized versions of component and principal curves and local partitioning algorithms.

    учебное пособие, добавлен 08.02.2013

  • Автоматизированный поиск документов по содержимому. Полнотекстовая поисковая система Sphinx search с открытым исходным кодом. Применение Sphinx search: возможности, принципы работы, решаемые проблемы. История проекта, его сравнение c Manticore search.

    статья, добавлен 19.09.2024

  • The information technology for graphical data from unmanned aircraft real time processing. The structure and functionality of the automated system, image processing algorithms and video. The used of technology in the development of a pilot workplace.

    статья, добавлен 28.01.2017

  • International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.

    книга, добавлен 08.03.2014

  • Serverless architecture has emerged as a revolutionary paradigm in cloud computing, offering developers a scalable and cost-effective approach to building applications. Serverless architecture, focusing on its key components, benefits, challenges.

    статья, добавлен 10.10.2024

  • Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.

    книга, добавлен 15.09.2012

  • The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    статья, добавлен 27.07.2016

  • Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.

    учебное пособие, добавлен 08.03.2014

  • Понятие термина Data Mining, его история возникновения. Понятие искусственного интеллекта. Сравнение статистики, машинного обучения и Data Mining. Развитие технологии баз данных начиная с 1960-х г. Data Mining как часть рынка информационных технологий.

    реферат, добавлен 14.01.2015

  • A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.

    статья, добавлен 15.09.2012

  • Определение термина "Big Data" и его применение в работе с информацией огромного объема и разнообразного состава. Определение основных источников получения компаниями информации. Методики анализа массивов данных и технологии Big Data в разных отраслях.

    курсовая работа, добавлен 28.09.2015

  • Random generators for cryptographic applications. Evaluation criteria for the principle design. Multiplication in binary extension fields. Time simulations and spectral algorithms. Limits on the maximum clock frequency of pipelined architectures.

    учебное пособие, добавлен 08.03.2014

  • Изучение задачи маршрутизации транспорта. Построение математической модели. Оценка способов решения задач маршрутизации. Обзор алгоритмов: муравьиного, Particle Swarm Optimization, Artificial Bee Colony, меметического, биоиспирированных в задачах VRP.

    дипломная работа, добавлен 11.08.2017

  • Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.

    материалы конференции, добавлен 08.03.2014

  • Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.

    книга, добавлен 08.03.2014

  • Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.

    статья, добавлен 25.03.2019

  • The concept and structure, as well as the laws of functioning of the Unified Modeling Language, history of its development. Precedents and conditions of effective use case diagrams. Research of a example of computer simulation and evaluation of results.

    презентация, добавлен 05.04.2016

  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    книга, добавлен 08.03.2014

  • Задачи Data Mining: описательные и предсказательные, классификации и регрессии, поиска ассоциативных правил, кластеризации. Практическое применение Data Mining. Особенности нечеткой логики, виды физической неопределенности. Процесс обнаружения знаний.

    презентация, добавлен 27.04.2023

  • Fuzzy controller has two inputs and one output linguistic variables. Structural diagram of neuro-fuzzy controller. The basic mathematical models of each of the five layers neuro-fuzzy controller. Block diagram of genetic algorithm and feature matching.

    статья, добавлен 21.06.2016

  • Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.

    методичка, добавлен 11.10.2014

  • Історія формування Data Mining, її головні завдання. Порядок формулювань завдань при використанні методів OLAP і Data Mining. Рівні знань, видобутих з даних. Характеристика основних бізнес-додатків: роздрібна торгівля, телекомунікація, страхування.

    реферат, добавлен 30.04.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.