Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Knowledge and Data Management in GRIDs
Knowledge and Data Management in GRIDs
From the reviews:

"This edited book is an early attempt by primarily European researchers to harness and expand the use of grid technologies in accessing distributed sources for sharing, and also to extract and produce knowledge. … Overall, the book is well organized and the selected material represents a very interesting range of...

IS-IS: Deployment in IP Networks
IS-IS: Deployment in IP Networks

IS-IS, the Intermediate System to Intermediate System protocol, has been used effectively as a routing protocol for many large-scale networks, including service provider backbone, telephone system management, and power equipment networks. Used in conjunction with the Border Gateway Protocol...

Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference, PAKDD 2011
Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference, PAKDD 2011

PAKDD has been recognized as a major international conference in the areas of data mining (DM) and knowledge discovery in databases (KDD). It provides an international forum for researchers and industry practitioners to share their new ideas, original research results and practical development experiences from all KDD-related areas...

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is...

Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Few events have had a more profound impact on the social and cultural upheavals of the Sixties than the psychedelic revolution spawned by the spread of LSD. This book for the first time tells the full and astounding story—part of it hidden till now in secret Government files—of the role the mind-altering drug played in our recent...
Soft Computing for Business Intelligence (Studies in Computational Intelligence)
Soft Computing for Business Intelligence (Studies in Computational Intelligence)

The book Soft Computing for Business Intelligence is the remarkable output of a program based on the idea of joint trans-disciplinary research as supported by the Eureka Iberoamerica Network and the University of Oldenburg.

It contains twenty-seven papers allocated to three sections: Soft Computing, Business...

Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Data Mining and Knowledge Discovery Technologies (Advances in Data Warehousing and Mining)
Data Mining and Knowledge Discovery Technologies (Advances in Data Warehousing and Mining)
Data warehousing and OLAP (online analytical processing) technologies have gained a widespread acceptance since the 90’s as a support for decision-making. A data warehouse is a collection of subject-oriented, integrated, consolidated, time-varying, and non-volatile data (Kimball, 1996; Inmon, 1996). It is manipulated through OLAP tools, which...
Knowledge Discovery from Sensor Data (Industrial Innovation)
Knowledge Discovery from Sensor Data (Industrial Innovation)
Addressing the issues challenging the sensor community, this book presents innovative solutions in offline data mining and real-time analysis of sensor or geographically distributed data. Illustrated with case studies, it discusses the challenges and requirements for sensor data-based knowledge discovery solutions in high-priority application. The...
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone

Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like...

Terminological Ontologies: Design, Management and Practical Applications
Terminological Ontologies: Design, Management and Practical Applications

Information infrastructures are integrated solutions based on the fusion of information and communication technologies. They are characterized by the large amount of data that must be managed accordingly. An information infrastructure requires an efficient and effective information retrieval system to provide access to the items stored in the...

Building Hypermedia APIs with HTML5 and Node
Building Hypermedia APIs with HTML5 and Node

This book’s primary focus is on designing hypermedia APIs. That may seem a bit strange to some readers. There are many books on programming languages, data storage systems, web frameworks, etc. This is not one of those books. Instead, this book covers the nature of the messages passed between client and server, and how to improve...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy