|
|
|
|
Principles of Data Mining (Undergraduate Topics in Computer Science)
Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.
Principles of Data Mining explains and explores the principal techniques of Data Mining: for classification, association rule mining and clustering. Each... | | Statistics for Research (Wiley Series in Probability and Statistics)Praise for the Second Edition
"Statistics for Research has other fine qualities besides superior organization. The examples and the statistical methods are laid out with unusual clarity by the simple device of using special formats for each. The book was written with great care and is extremely user-friendly."—The... | | The Edge of Infinity: Supermassive Black Holes in the Universe
This timely book is suitable for the general reader wishing to find answers to some of the intriguing questions now being asked about black holes. Although once recognized as the most destructive force in nature, following a cascade of astonishing discoveries, the opinion of supermassive black holes has undergone a dramatic shift. Astronomers... |
|
| | Java 2 Core Language Little Black BookThe Java 2 Core Language Little Black Book is a compact, detailed reference for intermediate to experienced programmers and managers who are ready to learn how to build Java programs. The book features a logical, sequential approach with concise overviews and step-by-step, ready-to-use solutions created by a master Java programmer. This book is... | | |
|
|
Fundamentals of Digital Imaging in Medicine
There was a time not so long ago, well within the memory of many of us, when medical
imaging was an analog process in which X-rays, or reflected ultrasound signals,
exiting from a patient were intercepted by a detector, and their intensity depicted as
bright spots on a fluorescent screen or dark areas in a photographic film. The... | | Black Hat Physical Device Security: Exploiting Hardware and SoftwareAttacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,... | | |
|
|
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 |