Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Transactions on Rough Sets VIII (Lecture Notes in Computer Science)
Transactions on Rough Sets VIII (Lecture Notes in Computer Science)
The LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical and mathematical foundations, through all aspects of rough set theory and its applications, such as data mining, knowledge discovery, and intelligent information processing, to relations between rough sets and other approaches to...
Cooking for Geeks: Real Science, Great Hacks, and Good Food
Cooking for Geeks: Real Science, Great Hacks, and Good Food

Are you the innovative type, the cook who marches to a different drummer -- used to expressing your creativity instead of just following recipes? Are you interested in the science behind what happens to food while it's cooking? Do you want to learn what makes a recipe work so you can improvise and create your own unique dish?

...
COX-2 Blockade in Cancer Prevention and Therapy (Cancer Drug Discovery and Development)
COX-2 Blockade in Cancer Prevention and Therapy (Cancer Drug Discovery and Development)

The revelation that aspirin and aspirin-like compounds have notable antineoplastic properties has revolutionized cancer research. COX-2 Blockade in Cancer Prevention and Therapy chronicles the evidence and presents exciting new opportunities for the use of cyclooxygenase-2 (COX-2) blockade in the prevention and treatment of cancer. The text...

Lysophospholipid Receptors: Signaling and Biochemistry
Lysophospholipid Receptors: Signaling and Biochemistry

The current state of the science supporting new research in lysophospholipids

The study of lysophospholipids exploded with the discovery of cell surface receptors on both lysophosphatidic acid (LPA) and sphingosine 1-phosphate (S1P). Since then, thousands of original research reports—ranging from fundamental cell...

Support Vector Machines: Optimization Based Theory, Algorithms, and Extensions (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Support Vector Machines: Optimization Based Theory, Algorithms, and Extensions (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

Support Vector Machines: Optimization Based Theory, Algorithms, and Extensions presents an accessible treatment of the two main components of support vector machines (SVMs)―classification problems and regression problems. The book emphasizes the close connection between optimization theory and SVMs since optimization is...

Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Using SAS Enterprise Miner, Barry de Ville's Decision Trees for Business Intelligence and Data Mining illustrates the application and operation of decision trees in business intelligence, data mining, business analytics, prediction, and knowledge discovery. It explains in detail the use of decision trees as a data mining technique and...
Feed Your Genes Right: Eat to Turn Off Disease-Causing Genes and Slow Down Aging
Feed Your Genes Right: Eat to Turn Off Disease-Causing Genes and Slow Down Aging
The study of DNA in heredity and disease has led to a great many
heady scientific discoveries and, ironically, to some humbling acknowledgments
of ancient medical wisdom.

Scientists discovered nucleic acids, the general chemical building
blocks of DNA (deoxyribonucleic acid) and genes, in the 1890s.Within
several
...
Modern Technologies in Web Services Research
Modern Technologies in Web Services Research
Nowadays, Web services are becoming a major research topic for computer scientists, engineers and business consulting professionals. Therefore, there appear a large number of topics and research about the Web services from various aspects. This book provides researchers, scholars, professionals, and educators with the most current research and...
SQL Injection Attacks and Defense
SQL Injection Attacks and Defense

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known...

Ektron Developer's Guide: Building an Ektron Powered Website
Ektron Developer's Guide: Building an Ektron Powered Website

GIVEN THAT YOU’RE READING the introduction to a Wrox book about Ektron, you likely have (or will soon have) some level of technical responsibility for a website powered by the Ektron Framework. Maybe you’re tasked with the duty of maintaining an existing site and are looking for information to help make that process more...

Foundations of Data Mining and Knowledge Discovery (Studies in Computational Intelligence)
Foundations of Data Mining and Knowledge Discovery (Studies in Computational Intelligence)
While the notion of knowledge is important in many academic disciplines such as philosophy, psychology, economics, and artificial intelligence, the storage and retrieval of data is the main concern of information science. In modern experimental science, knowledge is usually acquired by observing such data, and the cause-effect or association...
Privacy in Social Networks (Synthesis Lecutres on Data Mining and Knowledge Discovery)
Privacy in Social Networks (Synthesis Lecutres on Data Mining and Knowledge Discovery)

This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy