Listing 1 - 3 of 3 |
Sort by
|
Choose an application
This comprehensive reference consists of 18 chapters from prominent researchers in the field. Each chapter is self-contained, and synthesizes one aspect of frequent pattern mining. An emphasis is placed on simplifying the content, so that students and practitioners can benefit from the book. Each chapter contains a survey describing key research on the topic, a case study and future directions. Key topics include: Pattern Growth Methods, Frequent Pattern Mining in Data Streams, Mining Graph Patterns, Big Data Frequent Pattern Mining, Algorithms for Data Clustering and more. Advanced-level students in computer science, researchers and practitioners from industry will find this book an invaluable reference.
Data mining. --- Computer science. --- Informatics --- Science --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Database management. --- Artificial intelligence. --- Optical pattern recognition. --- Biometrics. --- Data Mining and Knowledge Discovery. --- Database Management. --- Artificial Intelligence. --- Pattern Recognition. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Pattern recognition. --- Biometrics (Biology). --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Statistical methods --- Data mining --- Database management --- Information retrieval --- 681.3*E --- 681.3*E Data --- Data
Choose an application
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBMFor many Java developers and software engineers, cryptography is an ""on-demand"" programming exercise, where cryptographi
Writing --- Cryptography --- Java (Computer program language) --- 681.3*D32 --- 681.3*E3 --- 681.3*E --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*D32 language classifications: applicative languages; data-flow languages; design languages; extensible languages; macro and assembly languages; nonprocedural languages; specialized application and very high-level languages (Programminglanguages) --- language classifications: applicative languages; data-flow languages; design languages; extensible languages; macro and assembly languages; nonprocedural languages; specialized application and very high-level languages (Programminglanguages) --- Object-oriented programming languages --- JavaSpaces technology --- 681.3*E Data --- Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Ciphers --- Data encryption (Computer science) --- Cryptography.
Choose an application
A new approach for conceptualizing and modeling multi-agent systems that consist of people, devices, and software agents.
Intelligent agents (Computer software) --- Computer software --- Development. --- Development of computer software --- Software development --- Agents, Autonomous (Computer software) --- Agents, Cognitive (Computer software) --- Agents, Intelligent (Computer software) --- Assistants, Cognitive (Computer software) --- Assistants, Intelligent software --- Autonomous agents (Computer software) --- Cognitive agents (Computer software) --- Cognitive assistants (Computer software) --- IAs (Computer software) --- Intelligent agent software --- Intelligent software agents --- Intelligent software assistants --- Software agents (Computer software) --- Special agents (Computer software) --- Artificial intelligence --- Computer programs --- Development --- E-books --- 681.3*D1 --- 681.3*D211 --- 681.3*D47 --- 681.3*I211 --- 681.3*D47 Organization and design: batch processing systems; distributed systems; hierarchical design; interactive systems; real-time systems (Operating systems) --- Organization and design: batch processing systems; distributed systems; hierarchical design; interactive systems; real-time systems (Operating systems) --- 681.3*D1 Programming techniques--See also {681.3*E} --- Programming techniques--See also {681.3*E} --- Software architectures: data abstractio, domain-specific architectures, information hiding, languages (e.g. description, interconnection, definition), patterns (e.g. client/server, pipeline, blackboard) --- Distributed artificial intelligence: coherence and coordination; intelligent agents; languages and structures; multiagent systems --- COMPUTER SCIENCE/Robotics & Agents
Listing 1 - 3 of 3 |
Sort by
|