Home | Amazing | Today | Tags | Publishers | Years | Search 
Automating the Design of Data Mining Algorithms: An Evolutionary Computation Approach (Natural Computing Series)
Automating the Design of Data Mining Algorithms: An Evolutionary Computation Approach (Natural Computing Series)

Traditionally, evolutionary computing techniques have been applied in the area of data mining either to optimize the parameters of data mining algorithms or to discover knowledge or patterns in the data, i.e., to directly solve the target data mining problem. This book proposes a different goal for evolutionary algorithms in data mining: to...

Middleware Management with Oracle Enterprise Manager Grid Control 10g R5
Middleware Management with Oracle Enterprise Manager Grid Control 10g R5
Today's IT environment is very complex, encompassing a myriad of technologies and middleware platforms. Many organizations have large and heterogeneous middleware platforms that power their enterprise applications and it is often a real challenge for administrators to meet agreed service levels and minimize downtime. Oracle Enterprise Manager...
Shape Interrogation for Computer Aided Design and Manufacturing
Shape Interrogation for Computer Aided Design and Manufacturing

Shape interrogation is the process of extraction of information from a geometric model. It is a fundamental component of Computer Aided Design and Manufacturing (CAD/CAM) systems. The authors focus on shape interrogation of geometric models bounded by free-form surfaces. Free-form surfaces, also called sculptured surfaces, are widely used in the...

miRNA Regulation of the Translational Machinery (Progress in Molecular and Subcellular Biology)
miRNA Regulation of the Translational Machinery (Progress in Molecular and Subcellular Biology)

The silencing of gene expression by small interfering RNAs has been recognized for only a relatively short time, but this has transformed our understanding of both transcriptional and post-transcriptional gene regulatory mechanisms. Multiple pathways culminate in formation of an RNA-induced silencing complex (RISC) containing a member of the...

Collaborative Search: Designing Systems for a Spectrum of Collaborative Styles (Synthesis Lectures on Information Concepts, Retrieval, and Services)
Collaborative Search: Designing Systems for a Spectrum of Collaborative Styles (Synthesis Lectures on Information Concepts, Retrieval, and Services)
Web search has become one of the prominent information behaviors of the new millennium (Fallows, D., 2008). Web search refers not only to the process of entering keywords into a search engine site, but it also includes a related ecology of online information-seeking activities, such as browsing to specific URLs, making sense of found content,...
Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book...
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and...
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and...
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it...
Rough  Granular Computing in Knowledge Discovery and Data Mining (Studies in Computational Intelligence)
Rough Granular Computing in Knowledge Discovery and Data Mining (Studies in Computational Intelligence)

The book "Rough-Granular Computing in Knowledge Discovery and Data Mining" written by Professor Jaroslaw Stepaniuk is dedicated to methods based on a combination of the following three closely related and rapidly growing areas: granular computing, rough sets, and knowledge discovery and data mining (KDD). In the book, the KDD...

The Testability of Distributed Real-Time Systems
The Testability of Distributed Real-Time Systems
The Testability of Distributed Real-Time Systems starts by collecting and analyzing all principal problems, as well as their interrelations that one has to keep in mind wh4en testing a distributed real-time system. The book discusses them in some detail from the viewpoints of software engineering, distributed systems principles, and real-time...
The Postcolonial Enlightenment: Eighteenth-century Colonialism and Postcolonial Theory
The Postcolonial Enlightenment: Eighteenth-century Colonialism and Postcolonial Theory
Over the last thirty years, postcolonial critiques of European imperial practices have transformed our understanding of colonial ideology, resistance, and cultural contact. The Enlightenment has played a complex but often unacknowledged role in this discussion, alternately reviled and venerated as the harbinger of colonial dominion and avatar of...
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy