Search Results for Computer algorithm. - Narrowed by: Perpustakaan Kuala Lumpur SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002balgorithm.$0026qf$003dLIBRARY$002509Library$0025091$00253APKL$002509Perpustakaan$002bKuala$002bLumpur$0026ps$003d300?dt=list 2025-09-11T21:46:29Z Data structure and algorithms ent://SD_ILS/0/SD_ILS:280850 2025-09-11T21:46:29Z 2025-09-11T21:46:29Z Iliana Mohd Ali&#160;Nurul Haslinda Ngah, editor.&#160;Mohd Alif Hasmani Abd Ghani, editor.<br/>2021<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789672829010<br/> Programming with JavaScript : algorithms and applications for desktop and mobile browsers ent://SD_ILS/0/SD_ILS:206707 2025-09-11T21:46:29Z 2025-09-11T21:46:29Z Dionisio, John David N., 1970-&#160;Toal, Ray<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763780609<br/> Security and game theory : algorithms, deployed systems, lessons learned ent://SD_ILS/0/SD_ILS:192772 2025-09-11T21:46:29Z 2025-09-11T21:46:29Z Tambe, Milind, 1965-<br/>&quot;Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world&quot;--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781107096424<br/> Struktur data dan algoritma menggunakan JAVA ent://SD_ILS/0/SD_ILS:48790 2025-09-11T21:46:29Z 2025-09-11T21:46:29Z Norida Muhd Darus&#160;Yuhanis Yusof&#160;Haslina Mohd<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789832639565<br/> Probability and statistics with reliability queuing and computer science applications ent://SD_ILS/0/SD_ILS:7335 2025-09-11T21:46:29Z 2025-09-11T21:46:29Z Trivedi, Kishor S.<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471333418<br/> Structuring data and building algorithm ent://SD_ILS/0/SD_ILS:26204 2025-09-11T21:46:29Z 2025-09-11T21:46:29Z Chai, Ian&#160;White, Jonathan David<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789839340891<br/> A practical introduction to data structures and algorithm analysis ent://SD_ILS/0/SD_ILS:17080 2025-09-11T21:46:29Z 2025-09-11T21:46:29Z Shaffer, Clifford A.<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780130284464<br/>