Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Develop a range of cutting-edge machine learning projects with Apache Spark using this actionable guide About This Book Customize Apache Spark and R to fit your analytical needs in customer research, fraud detection, risk analytics, and recommendation engine development Develop a set of practical Machine Learning applications that can be implemented in real-life projects A comprehensive, project-based guide to improve and refine your predictive models for practical implementation Who This Book Is For If you are a data scientist, a data analyst, or an R and SPSS user with a good understanding of machine learning concepts, algorithms, and techniques, then this is the book for you. Some basic understanding of Spark and its core elements and application is required. What You Will Learn Set up Apache Spark for machine learning and discover its impressive processing power Combine Spark and R to unlock detailed business insights essential for decision making Build machine learning systems with Spark that can detect fraud and analyze financial risks Build predictive models focusing on customer scoring and service ranking Build a recommendation systems using SPSS on Apache Spark Tackle parallel computing and find out how it can support your machine learning projects Turn open data and communication data into actionable insights by making use of various forms of machine learning In Detail There's a reason why Apache Spark has become one of the most popular tools in Machine Learning ? its ability to handle huge datasets at an impressive speed means you can be much more responsive to the data at your disposal. This book shows you Spark at its very best, demonstrating how to connect it with R and unlock maximum value not only from the tool but also from your data. Packed with a range of project "blueprints" that demonstrate some of the most interesting challenges that Spark can help you tackle, you'll find out how to use Spark notebooks and access, clean, and join different datasets before putting your knowledge into practice with some real-world projects, in which you will see how Spark Machine Learning can help you with everything from fraud detection to analyzing customer attrition. You'll also find out how to build a recommendation engine using Spark's parallel computing powers. Style and approach This book offers a step-by-step approach to setting up Apache Spark, and use other analytical tools with it to process Big Data and build machine learning pr...
Machine learning. --- Big data. --- Information retrieval. --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Data sets, Large --- Large data sets --- Data sets --- Learning, Machine --- Artificial intelligence --- Machine theory --- Spark (Electronic resource : Apache Software Foundation) --- Apache Spark (Electronic resource : Apache Software Foundation)
Choose an application
This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as
Firewalls (Computer security) --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer networks --- Security measures --- Coupe-feu (Sécurité informatique) --- Réseaux d'ordinateurs --- Sécurité --- Mesures
Choose an application
Choose an application
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook–Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
Computer security. --- Computer communication systems. --- Information storage and retrieval. --- Computer networks --- Privacy. --- Computer Communication Networks. --- Information Storage and Retrieval. --- Mobile and Network Security. --- Systems and Data Security. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Security measures --- Distributed processing
Choose an application
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
Information retrieval --- Human rights --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- veiligheid (technologie) --- privacy --- informatiesystemen --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- mobiele communicatie
Choose an application
Choose an application
This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Data Encryption. --- Computers and Society. --- Civilization and computers --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Civilization --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Foundations --- Distributed processing --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Cloud computing --- Web services --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Packet classification is the core component of routers, firewalls and other networking devices that enables many networking services such as packet filtering and traffic accounting. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the standard in industry today. While we can expect some gain in TCAM performance from improved hardware, the demands on TCAM performance (measured by the number of rules in packet classifiers) increase far more rapidly due to the explosive growth of internet services and threats. Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: • Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. • Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. • Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.
Computer network protocols. --- Computer networks. --- Packet switching (Data transmission). --- Routers (Computer networks) --- Packet switching (Data transmission) --- Computer network protocols --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Electrical Engineering --- Network routers --- Engineering. --- Computer hardware. --- Computer memory systems. --- Computer communication systems. --- Special purpose computers. --- Electrical engineering. --- Communications Engineering, Networks. --- Computer Communication Networks. --- Signal, Image and Speech Processing. --- Computer Hardware. --- Memory Structures. --- Special Purpose and Application-Based Systems. --- Routing (Computer network management) --- Equipment and supplies --- Telecommunication. --- Memory management (Computer scie. --- Software engineering. --- Computer software engineering --- Engineering --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Signal processing. --- Image processing. --- Speech processing systems. --- Special purpose computers --- Computers --- Computer memory systems --- Electronic digital computers --- Storage devices, Computer --- Computer input-output equipment --- Memory management (Computer science) --- Computational linguistics --- Electronic systems --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Information networks --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Electric engineering --- Memory systems --- Storage devices --- Distributed processing
Choose an application
This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Cloud computing --- Computer networks. --- Security measures --- Web services --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Information retrieval --- Human rights --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- veiligheid (technologie) --- privacy --- informatiesystemen --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- mobiele communicatie
Listing 1 - 10 of 12 | << page >> |
Sort by
|