Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Choose an application
Computer. Automation --- Neural computers --- Ordinateurs neuronaux --- Congresses --- Congrès --- Congresses. --- Congrès --- Neural computers - Congresses
Choose an application
Mathematical optimization --- Convex domains --- Decision making --- Optimisation mathématique --- Algèbres convexes --- Prise de décision --- Mathematical models --- Modèles mathématiques --- Mathematics --- 519.83 --- -Deciding --- Decision (Psychology) --- Decision analysis --- Decision processes --- Making decisions --- Management --- Management decisions --- Choice (Psychology) --- Problem solving --- Convex regions --- Convexity --- Calculus of variations --- Convex geometry --- Point set theory --- Optimization (Mathematics) --- Optimization techniques --- Optimization theory --- Systems optimization --- Mathematical analysis --- Maxima and minima --- Operations research --- Simulation methods --- System analysis --- Theory of games --- -Theory of games --- 519.83 Theory of games --- -Convex regions --- Deciding --- Optimisation mathématique --- Algèbres convexes --- Prise de décision --- Modèles mathématiques --- Fonctions convexes --- Convex functions --- Géometrie convexe --- Microéconomie --- Decision making - Mathematics --- Géometrie convexe --- Microéconomie
Choose an application
Science --- Complexity (Philosophy) --- Computational Complexity --- Philosophy --- Complexité (philosophie) --- Complexité de calcul (informatique) --- Systémique --- Philosophy. --- Science - Philosophy --- Complexity philosophy --- Computational complexity --- System analysis
Choose an application
Choose an application
The real power for security applications will come from the synergy of academic and commercial research focusing on the specific issue of security. This book is suitable for those interested in understanding the techniques for handling very large data sets and how to apply them in conjunction for solving security issues.
Data mining --- Computer algorithms --- Terrorism --- Terrorism risk assessment --- Prevention --- Data sets --- Security informatics --- NATO
Listing 1 - 6 of 6 |
Sort by
|