|
|
|
|
Data Mining Patterns: New Methods and ApplicationsSince its definition a decade ago, the problem of mining patterns is becoming a very active research area, and efficient techniques have been widely applied to problems either in industry, government or science. From the initial definition and motivated by real applications, the problem of mining patterns not only addresses the finding of itemsets... | | IT Governance: How Top Performers Manage IT Decision Rights for Superior ResultsFirms with superior IT governance have more than 25% higher profits than firms with poor governance given the same strategic objectives. These top performers have custom-designed IT governance for their strategies. Just as corporate governance aims to ensure quality decisions about all corporate assets, IT governance links IT decisions with company... | | |
|
Beginning VB.NET 2003Three expert authors guide you through the basics of building working applications, creating windows and boxes, handling unexpected events, using object-oriented programming, and more. You’ll learn to use menus, toolbars, dialog boxes, and other controls in Windows applications, and how loops and branching structures function in... | | Design of Energy-Efficient Application-Specific Instruction Set ProcessorsAfter a brief introduction to low-power VLSI design, the design space of ASIP instruction set architectures (ISAs) is introduced with a special focus on important features for digital signal processing. Based on the degrees of freedom offered by this design space, a consistent ASIP design flow is proposed: this design flow starts with a given... | | Microsoft Office Access 2003: The Complete ReferenceThe Definitive Resource on Access 2003
CD-ROM contains quick reference section on Access 2003--plus sample database files that support the book's material
Scale mountains of data with a single application with the help of this comprehensive resource. Through detailed, step-by-step instructions, you'll learn how to design and... |
|
Advanced Data Mining TechniquesThis book covers the fundamental concepts of data mining, to demonstrate the potential of gathering large sets of data, and analyzing these data sets to gain useful business understanding. The book is organized in three parts. Part I introduces concepts. Part II describes and demonstrates basic data mining algorithms. It also contains chapters on a... | | | | Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the
smooth operation of communication and computing solutions becomes vital. However,
recurring events such as virus and worm attacks and the success of criminal attackers illustrate
the weaknesses in current information technologies and the... |
|
|
|
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 |