 |
|
 Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions
Ensemble methods have been called the most influential development in Data Mining and Machine Learning in the past decade. They combine multiple models into one usually more accurate than the best of its components. Ensembles can provide a critical boost to industrial challenges -- from investment timing to drug discovery, and fraud detection... |  |  Machine Vision
This book grew out of our efforts to provide a balanced coverage of essential elements of machine vision systems to students in our undergraduate and early graduate classes. The field of machine vision, or computer vision, has been growning at a fast face. The growth in this field, unlike most established fields, has been both in breadth and... |  |  Computational Fluid Dynamics in Practice
Computational Fluid Dynamics in Practice explores the current and future developments in CFD, with the authors detailing advanced applications and case studies to demonstrate successes, illustrate the limitations, and identify methods for good practice. Designers, engineers, and researchers working in this field of fluid mechanics will... |
|
|
 JUNOS Security
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations... |  |  |  |  Ultrashort Laser Pulse Phenomena, Second Edition
Ultrashort Laser Pulse Phenomena serves as an introduction to the phenomena of ultrashort laser pulses and describes how this technology can be applied in areas such as spectroscopy, medical imaging, electromagnetism, optics, and quantum physics. Combining the principles with experimental techniques, the book serves as a guide to designing... |
|
 Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |  |  Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand.... |  |  Microarray Image Analysis: An Algorithmic Approach
To harness the high-throughput potential of DNA microarray technology, it is crucial that the analysis stages of the process are decoupled from the requirements of operator assistance. Microarray Image Analysis: An Algorithmic Approach presents an automatic system for microarray image processing to make this... |
|
| Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 |