Narrow your search

Library

KU Leuven (5)

ULB (5)

ULiège (5)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

VIVES (4)

AP (3)

KDG (3)

More...

Resource type

book (10)

digital (3)


Language

English (12)


Year
From To Submit

2018 (3)

2008 (3)

2005 (5)

2002 (1)

Listing 1 - 10 of 12 << page
of 2
>>
Sort by
Association Rule Mining : Models and Algorithms
Authors: ---
ISBN: 3540435336 3540460276 Year: 2002 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Due to the popularity of knowledge discovery and data mining, in practice as well as among academic and corporate R&D professionals, association rule mining is receiving increasing attention. The authors present the recent progress achieved in mining quantitative association rules, causal rules, exceptional rules, negative association rules, association rules in multi-databases, and association rules in small databases. This book is written for researchers, professionals, and students working in the fields of data mining, data analysis, machine learning, knowledge discovery in databases, and anyone who is interested in association rule mining.

Keywords

Association rule mining. --- Computer algorithms. --- Association mining --- Association rules mining --- Mining, Association rule --- Computer science. --- Algorithms. --- Database management. --- Information storage and retrieval. --- Artificial intelligence. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Database Management. --- Information Storage and Retrieval. --- Algorithm Analysis and Problem Complexity. --- Algorithms --- Data mining --- Information storage and retrieva. --- Computer software. --- Artificial Intelligence. --- Information storage and retrieval systems. --- Software, Computer --- Computer systems --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Algorism --- Algebra --- Arithmetic --- Foundations


Digital
AI 2005: Advances in Artificial Intelligence : 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005, Proceedings
Authors: ---
ISBN: 9783540316527 Year: 2005 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Book
Secure transaction protocol analysis : models and applications
Authors: --- ---
ISBN: 3540850740 3540850732 Year: 2008 Publisher: Berlin, Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.

Keywords

Computer networks --- Electronic commerce --- Computer network protocols. --- Security measures. --- Protocols, Computer network --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Information Technology --- Computer Science (Hardware & Networks) --- Computer Communication Networks. --- Software engineering. --- Operating systems (Computers). --- Data mining. --- Information storage and retrieva. --- Software Engineering/Programming and Operating Systems. --- Operating Systems. --- Software Engineering. --- Data Mining and Knowledge Discovery. --- Information Storage and Retrieval. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Operating systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer communication systems. --- Information storage and retrieval. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing


Book
AI 2005: Advances in Artificial Intelligence
Authors: --- ---
ISBN: 9783540316527 Year: 2005 Publisher: Berlin Heidelberg Springer-Verlag GmbH.

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 18th Australian Joint Conference on Artificial Intelligence (AI 2005) was held at the University of Technology, Sydney (UTS), Sydney, Australia from 5 to 9 December 2005. AI 2005 attracted a historical record number of submissions, a total of 535 papers. The review process was extremely selective. Out of these 535 submissions, the Program Chairs selected only 77 (14.4%) full papers and 119 (22.2%) short papers based on the review reports, making an acceptance rate of 36.6% in total. Authors of the accepted papers came from over 20 countries. This volume of the proceedings contains the abstracts of three keynote speeches and all the full and short papers. The full papers were categorized into three broad sections, namely: AI foundations and technologies, computational intelligence, and AI in specialized domains. AI 2005 also hosted several tutorials and workshops, providing an interacting mode for specialists and scholars from Australia and other countries. Ronald R. Yager, Geoff Webb and David Goldberg (in conjunction with ACAL05) were the distinguished researchers invited to give presentations. Their contributions to AI 2005 are really appreciated.


Book
Secure Transaction Protocol Analysis : Models and Applications
Authors: --- --- ---
ISBN: 9783540850748 Year: 2008 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.


Book
Information Retrieval : 24th China Conference, CCIR 2018, Guilin, China, September 27–29, 2018, Proceedings
Authors: --- --- --- ---
ISBN: 3030010120 3030010112 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 24th China Conference on Information Retrieval, CCIR 2018, held in Guilin, China, in September 2018. The 22 full papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections: Information retrieval, collaborative and social computing, natural language processing.

Keywords

Information storage and retrieva. --- Artificial intelligence. --- Natural language processing (Computer science). --- Data mining. --- Information Storage and Retrieval. --- Artificial Intelligence. --- Natural Language Processing (NLP). --- Data Mining and Knowledge Discovery. --- Information Systems Applications (incl. Internet). --- Information storage and retrieval. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- NLP (Computer science) --- Artificial intelligence --- Electronic data processing --- Human-computer interaction --- Semantic computing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer and Information Systems Applications. --- Data centers


Book
Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 9811329079 9811329060 Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.


Digital
Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 9789811329074 Year: 2018 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.


Book
AI 2005 : advances in artificial intelligence : 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005 : proceedings
Authors: --- ---
Year: 2005 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 18th Australian Joint Conference on Artificial Intelligence (AI 2005) was held at the University of Technology, Sydney (UTS), Sydney, Australia from 5 to 9 December 2005. AI 2005 attracted a historical record number of submissions, a total of 535 papers. The review process was extremely selective. Out of these 535 submissions, the Program Chairs selected only 77 (14.4%) full papers and 119 (22.2%) short papers based on the review reports, making an acceptance rate of 36.6% in total. Authors of the accepted papers came from over 20 countries. This volume of the proceedings contains the abstracts of three keynote speeches and all the full and short papers. The full papers were categorized into three broad sections, namely: AI foundations and technologies, computational intelligence, and AI in specialized domains. AI 2005 also hosted several tutorials and workshops, providing an interacting mode for specialists and scholars from Australia and other countries. Ronald R. Yager, Geoff Webb and David Goldberg (in conjunction with ACAL05) were the distinguished researchers invited to give presentations. Their contributions to AI 2005 are really appreciated.


Book
AI 2005 : advances in artificial intelligence : 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005 : proceedings
Authors: --- ---
Year: 2005 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 18th Australian Joint Conference on Artificial Intelligence (AI 2005) was held at the University of Technology, Sydney (UTS), Sydney, Australia from 5 to 9 December 2005. AI 2005 attracted a historical record number of submissions, a total of 535 papers. The review process was extremely selective. Out of these 535 submissions, the Program Chairs selected only 77 (14.4%) full papers and 119 (22.2%) short papers based on the review reports, making an acceptance rate of 36.6% in total. Authors of the accepted papers came from over 20 countries. This volume of the proceedings contains the abstracts of three keynote speeches and all the full and short papers. The full papers were categorized into three broad sections, namely: AI foundations and technologies, computational intelligence, and AI in specialized domains. AI 2005 also hosted several tutorials and workshops, providing an interacting mode for specialists and scholars from Australia and other countries. Ronald R. Yager, Geoff Webb and David Goldberg (in conjunction with ACAL05) were the distinguished researchers invited to give presentations. Their contributions to AI 2005 are really appreciated.

Listing 1 - 10 of 12 << page
of 2
>>
Sort by