Wiley Series on Bioinformatics: Computational Techniques and Engineering
Discover how data mining is fueling new discoveries in bioinformatics
As the field of bioinformatics continues to flourish, producing enormous amounts of new data, the need for sophisticated methods of data mining to better manage and extract meaning from...
A general scenario that has attracted a lot of attention for multimedia information retrieval is based on the query-by-example paradigm: retrieve all documents from a database containing parts or aspects similar to a given data fragment. However, multimedia objects, even though they are similar from a structural or semantic viewpoint, often reveal...
You already have the answer to boosting your eBay sales and profits...
You just have to know where to look. Turn eBay Data into Dollars shows you how to use the powerful tools available on eBay to sell smarter and make more money on every sale. Learn to mine sales data from tools such as Andale Research Tools, Terapeak, and...
The main purpose of the present manuscript addresses the development of techniques for the evaluation and the hardening of designs implemented on SRAM-based Field Programmable Gate Arrays against the radiation induced effects such as Single Event Upsets (SEUs) or Soft-Errors (SEs). The perspective of the analysis and the design flows proposed in...
JBoss in Action is the first book to focus on teaching readers in detail how to use the JBoss application server. Unlike other titles about JBoss, the authors of JBoss in Action go deeper into the advanced features and configuration of the server. In particular, it focuses on enterprise-class topics, such as high availability,...
* * An auspicious and comprehensive two-volume treatment of current solar energy strategies and technologies employed in buildings
* * Offers the reader a solid platform for assessing environmental and economic concerns for housing projects, and offers guidance on implementing the most appropriate course of action
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
We have been very pleased, beyond our expectations, with the reception of
the first edition of this book. Bioinformatics, however, continues to evolve
very rapidly, hence the need for a new edition. In the past three years, fullgenome
sequencing has blossomed with the completion of the sequence of
the fly and the first draft of the...
To tackle the complex problems of life today, we need to coordinate a wide range of expertise. Systems concepts and methods offer the means of integrating the contributions of specialists, including managers, scientists and engineers. The book introduces simple yet sound concepts and a language understandable to all concerned. Its methods of...
The goal of this Lecture Note is to prove a new type of limit theorems for normalized sums of strongly dependent random variables that play an important role in probability theory or in statistical physics. Here non-linear functionals of stationary Gaussian fields are considered, and it is shown that the theory of Wiener–Itô...
Data Science and Machine Learning are in high demand, as customers are increasingly looking for ways to glean insights from all their data. More customers now realize that Business Intelligence is not enough as the volume, speed and complexity of data now defy traditional analytics tools. While Business Intelligence addresses descriptive and...
This book introduces novice developers to a range of data access strategies for storing and retreiving data both locally and remotely. It provides you with a range of fully working data access solutions and the insight you need to know when, and how, to apply each of the techniques to best advantage.