Home | Amazing | Today | Tags | Publishers | Years | Search 
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

Software Automatic Tuning: From Concepts to State-of-the-Art Results
Software Automatic Tuning: From Concepts to State-of-the-Art Results

Software automatic tuning is a technology paradigm enabling software adaptation to a variety of computational conditions. Originating from the stream of research works on highperformance computing, it is considered to be the most promising approach to the required performance advancements on the next generation supercomputing platforms. Also,...

php|architect's Guide to Web Scraping
php|architect's Guide to Web Scraping

Today , there aremany services out there providing news feeds, and there are plenty of code libraries that can parse this data. So, with the proliferation of web services and public APIs, why is web scraping still so important to the future of the Web? It is important because of the rise ofmicroformats, Semantic Web technologies, theW3C...

Managing and Mining Uncertain Data (Advances in Database Systems)
Managing and Mining Uncertain Data (Advances in Database Systems)

Uncertain data management has seen a revival in interest in recent years because of a number of new fields which utilize this kind of data. For example, in fields such as privacy-preserving data mining, additional errors may be added to data in order to mask the identity of the records. Often the data may be imputed using statistical methods...

Microsoft Office for the Older and Wiser: Get up and running with Office 2010 and Office 2007
Microsoft Office for the Older and Wiser: Get up and running with Office 2010 and Office 2007

I know what you’re thinking: “Office? That sounds a bit dull.” But don’t let the name put you off reading this book. Although Microsoft Office can be used to manage your household accounts and write letters to the bank, it also enables you to enjoy fun projects like creating party invitations, making posters, planning...

Real World Adobe Photoshop CS5 for Photographers
Real World Adobe Photoshop CS5 for Photographers

This edition of Real World Photoshop is more tightly focused for the needs and demands of the professional digital photographers. From acquiring images to using an efficient processing workflow to maintaining image quality and final output quality all within the powerful feature set of Adobe Photoshop CS5. Coverage of new CS5 features...

Learning Classifier Systems: 11th International Workshop, IWLCS 2008
Learning Classifier Systems: 11th International Workshop, IWLCS 2008

Learning Classifier Systems (LCS) constitute a fascinating concept at the intersection of machine learning and evolutionary computation. LCS’s genetic search, generally in combination with reinforcement learning techniques, can be applied to both temporal and spatial problem-solving and promotes powerful search in a wide variety of...

Embedded Software: Know It All (Newnes Know It All)
Embedded Software: Know It All (Newnes Know It All)

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

Embedded software is present everywhere - from a garage
...

Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

A senior database manager at one of the world’s largest banks once told me that the best way to secure Oracle is to unplug it from the wall…and he is probably right. In fact, this holds true for nearly every networked application. Unfortunately, for many of us turning off the database is not an option; we must find another way to...

Handbook of Face Recognition
Handbook of Face Recognition

Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...

Data Mining in Finance: Advances in Relational and Hybrid Methods
Data Mining in Finance: Advances in Relational and Hybrid Methods

Data Mining in Finance presents a comprehensive overview of major algorithmic approaches to predictive data mining, including statistical, neural networks, ruled-based, decision-tree, and fuzzy-logic methods, and then examines the suitability of these approaches to financial data mining. The book focuses specifically on relational data mining...

Multidimensional Databases: Problems and Solutions
Multidimensional Databases: Problems and Solutions

The term "multidimensional data" generally refers to data in which a given fact is quantified by a set of measures, obtained by applying one more or less complex aggregative function (from count or sum to average or percent, and so on) to raw data. Such measures are...

Result Page: 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy