Search Results for Computer algorithms. - Narrowed by: EnglishSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002balgorithms.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ic$003dtrue$0026ps$003d300?dt=list2025-09-11T02:11:18ZData structure and algorithmsent://SD_ILS/0/SD_ILS:2808502025-09-11T02:11:18Z2025-09-11T02:11:18ZIliana Mohd Ali Nurul Haslinda Ngah, editor. Mohd Alif Hasmani Abd Ghani, editor.<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789672829010<br/>How To Speak Machine:Computational Thinking For The Rest Of Usent://SD_ILS/0/SD_ILS:2736572025-09-11T02:11:18Z2025-09-11T02:11:18ZMaeda, John,<br/>2019<br/>Perpustakaan Medan Idaman Perpustakaan Lembah Pantai<br/>ISBN 9780593086322<br/>You Can't Dance to These Rhythms : What Are Algorithms?ent://SD_ILS/0/SD_ILS:2678412025-09-11T02:11:18Z2025-09-11T02:11:18ZCleary, Brian P<br/>2019<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9781541533080<br/>A human's guide to machine intelligence : how algorithms are shaping our lives and how we can stay in controlent://SD_ILS/0/SD_ILS:2818682025-09-11T02:11:18Z2025-09-11T02:11:18ZHosanagar, Kartik<br/>2019<br/>Perpustakaan Lembah Pantai<br/>ISBN 9780525560906<br/>Programming Pioneer Ada Lovelaceent://SD_ILS/0/SD_ILS:2691902025-09-11T02:11:18Z2025-09-11T02:11:18ZBodden, Valerie<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781512407846<br/>Programming with JavaScript : algorithms and applications for desktop and mobile browsersent://SD_ILS/0/SD_ILS:2067072025-09-11T02:11:18Z2025-09-11T02:11:18ZDionisio, John David N., 1970- Toal, Ray<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763780609<br/>Security and game theory : algorithms, deployed systems, lessons learnedent://SD_ILS/0/SD_ILS:1927722025-09-11T02:11:18Z2025-09-11T02:11:18ZTambe, Milind, 1965-<br/>"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781107096424<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1989502025-09-11T02:11:18Z2025-09-11T02:11:18ZSchneier, Bruce<br/>1996<br/>ISBN 9780471117094<br/>