Search Results for algorithm - Narrowed by: English SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dalgorithm$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026pe$003dd$00253A$0026ps$003d300$0026isd$003dtrue? 2025-11-11T07:28:34Z Sensemaking :/ the power of the humanities in the age of the algorithm ent://SD_ILS/0/SD_ILS:253473 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Madsbjerg, Christian<br/>2017<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9780316393249<br/> Once Upon an Algorithm : How Stories Explain Computing ent://SD_ILS/0/SD_ILS:306371 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Erwig, Martin<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780262036634<br/> Data structure and algorithms ent://SD_ILS/0/SD_ILS:280850 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Iliana Mohd Ali&#160;Nurul Haslinda Ngah, editor.&#160;Mohd Alif Hasmani Abd Ghani, editor.<br/>2021<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789672829010<br/> Competing in the age of AI : Strategy and leadership when algorithms and networks run the world ent://SD_ILS/0/SD_ILS:273425 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Iansiti, Marco,&#160;Lakhani, Karim R., uthor<br/>2020<br/>Perpustakaan Medan Idaman&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9781633697621<br/> How To Speak Machine:Computational Thinking For The Rest Of Us ent://SD_ILS/0/SD_ILS:273657 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Maeda, John,<br/>2019<br/>Perpustakaan Medan Idaman&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9780593086322<br/> You Can't Dance to These Rhythms : What Are Algorithms? ent://SD_ILS/0/SD_ILS:267841 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Cleary, Brian P<br/>2019<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9781541533080<br/> A human's guide to machine intelligence : how algorithms are shaping our lives and how we can stay in control ent://SD_ILS/0/SD_ILS:281868 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Hosanagar, Kartik<br/>2019<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9780525560906<br/> Programming Pioneer Ada Lovelace ent://SD_ILS/0/SD_ILS:269190 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Bodden, Valerie<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781512407846<br/> Distributed algorithms : an intuitive approach ent://SD_ILS/0/SD_ILS:270975 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Fokkink, Wan<br/>2018<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780262037662<br/> The formula : how algorithms solve all our problems and create more ent://SD_ILS/0/SD_ILS:235212 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Dormehl,Luke<br/>2015<br/>Perpustakaan Lembah Pantai&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780399170546<br/> Programming with JavaScript : algorithms and applications for desktop and mobile browsers ent://SD_ILS/0/SD_ILS:206707 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Dionisio, John David N., 1970-&#160;Toal, Ray<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763780609<br/> Security and game theory : algorithms, deployed systems, lessons learned ent://SD_ILS/0/SD_ILS:192772 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Tambe, Milind, 1965-<br/>&quot;Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world&quot;--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781107096424<br/> Heuristic search : theory and applications ent://SD_ILS/0/SD_ILS:172516 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Edelkamp, Stefan.&#160;Schr&ouml;dl, Stefan.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780123725127<br/> Methods and algorithms in navigation : marine navigation and safety of sea transportation ent://SD_ILS/0/SD_ILS:186353 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Weintrit, Adam&#160;Neumann Tomasz<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780415691147<br/> Schaum's outlines. Matrix operations ent://SD_ILS/0/SD_ILS:186472 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Bronson, Richard<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071756044<br/> Learning with kernels : Support vector machine, regulation, optimization and beyond ent://SD_ILS/0/SD_ILS:270977 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Scholkopf, Bernhard<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780262536578<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:198950 2025-11-11T07:28:34Z 2025-11-11T07:28:34Z Schneier, Bruce<br/>1996<br/>ISBN&#160;9780471117094<br/>