Bayesian methods are being used more often than ever before in biology and
medicine. For example, at the University of Texas MD Anderson Cancer
Center, Bayesian sequential stopping rules routinely are used for the design
of clinical trials. This book is based on the author’s experience working with
a variety of...
The use of computed tomography (CT) has seen enormous growth over the past decade.
In the US, approximately 63 million examinations were performed in 2005 (Niagara
Health Quality Coalition 2004) compared to 35 million in 2000. The increased number
of clinical applications (e.g., in emergency and trauma, paediatric, cardiac, and...
The book describes the basics of machine learning principles and algorithms that are used in data mining and is intended for students of computer science, researchers who need to adapt various algorithms for particular data mining tasks, and for education of sophisticated users of machine learning and data mining tools.
Math is Exciting. We are living in the greatest age of mathematics ever
seen. In the 1930s, there were some people who feared that the rising
abstractions of the early twentieth century would either lead to mathematicians
working on sterile, silly intellectual exercises or to mathematics
splitting into sharply distinct...
The normal, intact immune system does not have equal probability of responding
to every potential part of a protein. It has been known for more than 50 years that
only parts of the protein that are “outside” are available for antibody binding. Yet,
with the advent of Western blotting techniques, antibodies that react...
The first part of this preface is for the student, the second for the instructor. Some
readers may find it helpful to look at both.Whoever you are, welcome!
This easy-to-follow textbook introduces the mathematical language, knowledge and problem-solving skills that undergraduates need to study computing. The language is in part...
Optimization is an extremely important area in science and technology which provides
powerful and useful tools and techniques for the formulation and solution of
a multitude of problems in which we wish, or need, to find a best possible option
or solution. It has been an important area of research for more than half a century,...
Many colleges and universities offer a course in discrete mathematics. Students
taking these courses are from many disciplines, one of the largest
being computer science. As a part of the Mathematics Across the Curriculum
project at Dartmouth, supported by the National Science Foundation,1
we proposed to create a discrete mathematics...
The main purpose of statistical theory is to derive from observations of a
random phenomenon an inference about the probability distribution underlying
this phenomenon. That is, it provides either an analysis (description)
of a past phenomenon, or some predictions about a future phenomenon of
a similar nature. In this book, we insist...
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security...
In the last three decades, machine learning research and practice have
focused on batch learning usually using small datasets. In batch learning, the
whole training data is available to the algorithm, which outputs a decision
model after processing the data eventually (or most of the times) multiple
times. The rationale behind this...
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security...