Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Due to the popularity of knowledge discovery and data mining, in practice as well as among academic and corporate R&D professionals, association rule mining is receiving increasing attention. The authors present the recent progress achieved in mining quantitative association rules, causal rules, exceptional rules, negative association rules, association rules in multi-databases, and association rules in small databases. This book is written for researchers, professionals, and students working in the fields of data mining, data analysis, machine learning, knowledge discovery in databases, and anyone who is interested in association rule mining.
Association rule mining. --- Computer algorithms. --- Association mining --- Association rules mining --- Mining, Association rule --- Computer science. --- Algorithms. --- Database management. --- Information storage and retrieval. --- Artificial intelligence. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Database Management. --- Information Storage and Retrieval. --- Algorithm Analysis and Problem Complexity. --- Algorithms --- Data mining --- Information storage and retrieva. --- Computer software. --- Artificial Intelligence. --- Information storage and retrieval systems. --- Software, Computer --- Computer systems --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
Mathematical logic --- Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- informatica --- informatiesystemen --- database management --- wiskunde --- KI (kunstmatige intelligentie) --- logica --- robots --- AI (artificiële intelligentie)
Choose an application
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.
Computer networks --- Electronic commerce --- Computer network protocols. --- Security measures. --- Protocols, Computer network --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Information Technology --- Computer Science (Hardware & Networks) --- Computer Communication Networks. --- Software engineering. --- Operating systems (Computers). --- Data mining. --- Information storage and retrieva. --- Software Engineering/Programming and Operating Systems. --- Operating Systems. --- Software Engineering. --- Data Mining and Knowledge Discovery. --- Information Storage and Retrieval. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Operating systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer communication systems. --- Information storage and retrieval. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
The 18th Australian Joint Conference on Artificial Intelligence (AI 2005) was held at the University of Technology, Sydney (UTS), Sydney, Australia from 5 to 9 December 2005. AI 2005 attracted a historical record number of submissions, a total of 535 papers. The review process was extremely selective. Out of these 535 submissions, the Program Chairs selected only 77 (14.4%) full papers and 119 (22.2%) short papers based on the review reports, making an acceptance rate of 36.6% in total. Authors of the accepted papers came from over 20 countries. This volume of the proceedings contains the abstracts of three keynote speeches and all the full and short papers. The full papers were categorized into three broad sections, namely: AI foundations and technologies, computational intelligence, and AI in specialized domains. AI 2005 also hosted several tutorials and workshops, providing an interacting mode for specialists and scholars from Australia and other countries. Ronald R. Yager, Geoff Webb and David Goldberg (in conjunction with ACAL05) were the distinguished researchers invited to give presentations. Their contributions to AI 2005 are really appreciated.
Mathematical logic --- Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- informatica --- informatiesystemen --- database management --- wiskunde --- KI (kunstmatige intelligentie) --- logica --- robots
Choose an application
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.
Choose an application
This book constitutes the refereed proceedings of the 24th China Conference on Information Retrieval, CCIR 2018, held in Guilin, China, in September 2018. The 22 full papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections: Information retrieval, collaborative and social computing, natural language processing.
Information storage and retrieva. --- Artificial intelligence. --- Natural language processing (Computer science). --- Data mining. --- Information Storage and Retrieval. --- Artificial Intelligence. --- Natural Language Processing (NLP). --- Data Mining and Knowledge Discovery. --- Information Systems Applications (incl. Internet). --- Information storage and retrieval. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- NLP (Computer science) --- Artificial intelligence --- Electronic data processing --- Human-computer interaction --- Semantic computing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer and Information Systems Applications. --- Data centers
Choose an application
This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
Computer security. --- Data mining. --- Artificial intelligence. --- Data encryption (Computer science). --- Systems and Data Security. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- datamining --- cryptografie --- informatica --- computerbeveiliging --- KI (kunstmatige intelligentie) --- data acquisition --- AI (artificiële intelligentie)
Choose an application
The 18th Australian Joint Conference on Artificial Intelligence (AI 2005) was held at the University of Technology, Sydney (UTS), Sydney, Australia from 5 to 9 December 2005. AI 2005 attracted a historical record number of submissions, a total of 535 papers. The review process was extremely selective. Out of these 535 submissions, the Program Chairs selected only 77 (14.4%) full papers and 119 (22.2%) short papers based on the review reports, making an acceptance rate of 36.6% in total. Authors of the accepted papers came from over 20 countries. This volume of the proceedings contains the abstracts of three keynote speeches and all the full and short papers. The full papers were categorized into three broad sections, namely: AI foundations and technologies, computational intelligence, and AI in specialized domains. AI 2005 also hosted several tutorials and workshops, providing an interacting mode for specialists and scholars from Australia and other countries. Ronald R. Yager, Geoff Webb and David Goldberg (in conjunction with ACAL05) were the distinguished researchers invited to give presentations. Their contributions to AI 2005 are really appreciated.
Artificial intelligence. --- Computers. --- Mathematical logic. --- Database management. --- Information storage and retrieval. --- Application software. --- Artificial Intelligence. --- Computation by Abstract Devices. --- Mathematical Logic and Formal Languages. --- Database Management. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Artificial intelligence
Choose an application
The 18th Australian Joint Conference on Artificial Intelligence (AI 2005) was held at the University of Technology, Sydney (UTS), Sydney, Australia from 5 to 9 December 2005. AI 2005 attracted a historical record number of submissions, a total of 535 papers. The review process was extremely selective. Out of these 535 submissions, the Program Chairs selected only 77 (14.4%) full papers and 119 (22.2%) short papers based on the review reports, making an acceptance rate of 36.6% in total. Authors of the accepted papers came from over 20 countries. This volume of the proceedings contains the abstracts of three keynote speeches and all the full and short papers. The full papers were categorized into three broad sections, namely: AI foundations and technologies, computational intelligence, and AI in specialized domains. AI 2005 also hosted several tutorials and workshops, providing an interacting mode for specialists and scholars from Australia and other countries. Ronald R. Yager, Geoff Webb and David Goldberg (in conjunction with ACAL05) were the distinguished researchers invited to give presentations. Their contributions to AI 2005 are really appreciated.
Artificial intelligence. --- Computers. --- Mathematical logic. --- Database management. --- Information storage and retrieval. --- Application software. --- Artificial Intelligence. --- Computation by Abstract Devices. --- Mathematical Logic and Formal Languages. --- Database Management. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Artificial intelligence
Listing 1 - 10 of 12 | << page >> |
Sort by
|