Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
25401por Rokach, Lior“…A walk-through guide to existing open-source data mining software is also included in this edition.This book invites readers to explore the many benefits in data mining that decision trees offer:Self-explanatory and easy to follow when compactedAble to handle a variety of input data: nominal, numeric and textualScales well to big dataAble to process datasets that may have errors or missing valuesHigh predictive performance for a relatively small computational effortAvailable in many open source data mining packages over a variety of platformsUseful for various tasks, such as classification, regression, clustering and feature selectionContents:Introduction to Decision TreesTraining Decision TreesA Generic Algorithm for Top-Down Induction of Decision TreesEvaluation of Classification TreesSplitting CriteriaPruning TreesPopular Decision Trees Induction AlgorithmsBeyond Classification TasksDecision ForestsA Walk-through Guide for Using Decision Trees SoftwareAdvanced Decision TreesCost-sensitive Active and Proactive Learning of Decision TreesFeature SelectionFuzzy Decision TreesHybridization of Decision Trees with Other TechniquesDecision Trees and Recommender SystemsReadership: Researchers, graduate and undergraduate students in information systems, engineering, computer science, statistics and management…”
Publicado 2015
Enlace al texto completo en streaming en Ebscohost
Libro electrónico -
25402por Bakeman, Roger“…This integrated approach helps to simplify topics that often cause confusion.Understanding Statistics in the Behavioral Sciences features:•Computer-based exercises, many of which rely on spreadsheets, help the reader perform statistical analyses and compare and verify the results using either SPSS or SAS. …”
Publicado 2005
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
25403Publicado 2017“…After synthesis, plastid proteins must rapidly fold into stable three dimensional structures and often undergo co- and posttranslational modifications to perform their biological mission, avoiding aberrant folding, aggregation and targeting with the help of molecular chaperones and proteases. …”
Libro electrónico -
25404Publicado 2018“…Improvements in task performance, usability, and embodiment have all been reported in systems utilizing some form of feedback. …”
Libro electrónico -
25405Publicado 2020“…The most severe isthat the sequence of steps performed by Friedmann does not consistently obey Zadeh’spivot rule. …”
Libro electrónico -
25406Publicado 2011“…While the International Court of Justice appears to have been reluctant to perform such a function, the Inter-American Court of Human Rights has developed a creative and dynamic method of interpretation intended to afford a full and complete protection to human beings; such an approach resulted inevitably in the identification of the content of peremptory norms. …”
Libro electrónico -
25407“…This short book applies the DevOps perspective to the competitive challenge, faced by every high-performance IT organization today, of integrating and automating open source, cloud, and enterprise tools, processes, and techniques across the software development life cycle from requirements to release. …”
Libro electrónico -
25408por Schmidt, Manfred G.“…He concludes that the GDR was unable to cope with the trade-off between ambitious social policy goals and a deteriorating economic performance. Ritter embeds his analysis of the Social Union in a general study of German unification, its international circumstances and its domestic repercussions (1989-1994). …”
Publicado 2013
Libro electrónico -
25409por Funk, Tom. author“…In it, we simplify tasks that might otherwise be complicated—like adopting and tracking key performance metrics, developing online ad campaigns, or creating Facebook apps like games, giveaways and sweepstakes with the capacity to go viral. …”
Publicado 2013
Libro electrónico -
25410Publicado 2016“…Furthermore, the important issue of transnational joint performance of exercising state authority as well as aspects of cross-border economic activities of local authorities are discussed Grenzüberschreitende Zusammenarbeit auf kommunaler Ebene ist bereits seit Langem gelebte Praxis. …”
Libro electrónico -
25411Publicado 2022“…What you will learn Understand the new language features and the problems they can solve Implement generic features of the STL with practical examples Understand standard support classes for concurrency and synchronization Perform efficient memory management using the STL Implement seamless formatting using std::format Work with strings the STL way instead of handcrafting C-style code Who this book is for This book is for intermediate to advanced C++ programmers who want to get the most out of the Standard Template Library of C++20, the newest version of C++. …”
Libro electrónico -
25412Publicado 2022“…The book focuses on model compression and feature engineering methods that are essential in automated deep learning. It also includes performance techniques that allow the creation of large-scale distributive training platforms using NNI. …”
Libro electrónico -
25413Publicado 2022“…We will be wrapping up the course by understanding how to perform threat hunting with Microsoft Sentinel, which will be our 8th module. …”
Video -
25414Publicado 2018“…Along the way, you’ll perform data manipulation and solve common problems using basic file input/output functions. …”
-
25415Publicado 2018“…It takes you through the process of performing “genetic testing” on your company, examining the market through the six Cs of positioning, and developing your positioning statement—a rational, factual statement about your company’s role and relevance. …”
Libro electrónico -
25416Publicado 2018“…The result is greater alignment and visibility, improved performance throughout the enterprise, and ultimately better outcomes for the business…”
Libro electrónico -
25417Publicado 2019“…However, if this activity is performed without correct planning and the correct architecture choice, it leads to server sprawl where your environment houses more servers than it should based on its current and predicted requirements. …”
Libro electrónico -
25418Publicado 2018“…Throughout the book you'll build an Android application – an RSS reader – designed and implemented according to the different topics covered in the book What you will learn Understand Kotlin's approach to concurrency Implement sequential and asynchronous suspending functions Create suspending data sources that are resumed on demand Explore the best practices for error handling Use channels to communicate between coroutines Uncover how coroutines work under the hood Who this book is for If you're a Kotlin or Android developer interested in learning how to program concurrently to enhance the performance of your applications, this is the book for you. …”
Libro electrónico -
25419Publicado 2018“…A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure About This Book Advanced exploitation techniques to breach modern operating systems and complex network devices Learn about Docker breakouts, Active Directory delegation, and CRON jobs Practical use cases to deliver an intelligent endpoint-protected system Who This Book Is For If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. …”
Libro electrónico -
25420Publicado 2021“…As you progress, you'll cover everything from building declarative language files to the pitfalls in performing continuous deployment with GitOps. By the end of this book, you'll be well-versed with the fundamentals of delivery and deployment, the different schools of GitOps, and how to best leverage GitOps in your teams. …”
Libro electrónico