Home | Amazing | Today | Tags | Publishers | Years | Search 
Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference, PAKDD 2011
Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference, PAKDD 2011

PAKDD has been recognized as a major international conference in the areas of data mining (DM) and knowledge discovery in databases (KDD). It provides an international forum for researchers and industry practitioners to share their new ideas, original research results and practical development experiences from all KDD-related areas...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Understanding Digital Signal Processing (3rd Edition)
Understanding Digital Signal Processing (3rd Edition)

Amazon.com’s Top-Selling DSP Book for Seven Straight Years—Now Fully Updated!

Understanding Digital Signal Processing, Third Edition, is quite simply the best resource for engineers and other technical professionals who want to master and apply today’s latest DSP...

Multiobjective Genetic Algorithms for Clustering: Applications in Data Mining and Bioinformatics
Multiobjective Genetic Algorithms for Clustering: Applications in Data Mining and Bioinformatics

Clustering is an important unsupervised classification technique where a set of patterns, usually vectors in multidimensional space, are grouped into clusters based on some similarity or dissimilarity criteria. In crisp clustering, each pattern is assigned to exactly one cluster, whereas in fuzzy clustering, each pattern is given a...

Word Sense Disambiguation: Algorithms and Applications (Text, Speech and Language Technology)
Word Sense Disambiguation: Algorithms and Applications (Text, Speech and Language Technology)

Word sense disambiguation is a core research problem in computational linguistics, which was recognized at the beginning of the scientific interest in machine translation and artificial intelligence. And yet no book has been fully devoted to review the wide variety of approaches to solving the problem. The time is right for such a...

Optimization Based Data Mining: Theory and Applications (Advanced Information and Knowledge Processing)
Optimization Based Data Mining: Theory and Applications (Advanced Information and Knowledge Processing)

The purpose of this book is to provide up-to-date progress both in Multiple Criteria Programming (MCP) and Support Vector Machines (SVMs) that have become powerful tools in the field of data mining. Most of the content in this book are directly from the research and application activities that our research group has conducted over the...

Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition
Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition

Essential Skills for a Successful IT Career

Written by CompTIA certification and training expert Mike Meyers, this instructive, full-color guide will help you pass the CompTIA A+ exams and become an expert hardware technician. Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition is...

Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing
Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing

Ongoing economic challenges are affecting and impacting business and society in nearly every industry and geographical region. Taking decisive action to reprioritize the way we are doing business is a key focus for companies. Around the world, companies are taking the necessary measures that will enable us to adjust to today’s reality...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Image Registration: Principles, Tools and Methods (Advances in Computer Vision and Pattern Recognition)
Image Registration: Principles, Tools and Methods (Advances in Computer Vision and Pattern Recognition)
Image registration is the process of finding correspondence between all points in two images of a scene. This correspondence is required in stereo depth perception, 3-D scene reconstruction, object detection and recognition, change detection, image fusion, object tracking and motion analysis. Analysis of two or more images of a...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy