1 - 10
Next
- NLPCC (Conference) (7th : 2018 : Hohhot, China)
- Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource (XXIX, 478 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Conversational Bot/QA/IR
- Knowledge graph/IE
- Machine Learning for NLP
- Machine Translation
- NLP Applications.
- Tsukerman, Emmanuel.
- Birmingham : Packt Publishing, Limited, 2019.
- Description
- Book — 1 online resource (338 pages)
- Summary
-
- Cover
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Table of Contents
- Preface
- Chapter 1: Machine Learning for Cybersecurity
- Technical requirements
- Train-test-splitting your data
- Getting ready
- How to do it ...
- How it works ...
- Standardizing your data
- Getting ready
- How to do it ...
- How it works ...
- Summarizing large data using principal component analysis
- Getting ready
- How to do it ...
- How it works ...
- Generating text using Markov chains
- Getting ready
- How to do it ...
- How it works ...
- Performing clustering using scikit-learn
- Getting ready
- How to do it ...
- How it works ...
- Training an XGBoost classifier
- Getting ready
- How to do it ...
- How it works ...
- Analyzing time series using statsmodels
- Getting ready
- How to do it ...
- How it works ...
- Anomaly detection with Isolation Forest
- Getting ready
- How to do it ...
- How it works ...
- Natural language processing using a hashing vectorizer and tf-idf with scikit-learn
- Getting ready
- How to do it ...
- How it works ...
- Hyperparameter tuning with scikit-optimize
- Getting ready
- How to do it ...
- How it works ...
- Chapter 2: Machine Learning-Based Malware Detection
- Technical requirements
- Malware static analysis
- Computing the hash of a sample
- Getting ready
- How to do it ...
- How it works ...
- YARA
- Getting ready
- How to do it ...
- How it works ...
- Examining the PE header
- Getting ready
- How to do it ...
- How it works ...
- Featurizing the PE header
- Getting ready
- How to do it ...
- How it works ...
- Malware dynamic analysis
- Getting ready
- How to do it ...
- How it works ...
- Using machine learning to detect the file type
- Scraping GitHub for files of a specific type
- Getting ready
- How to do it ...
- How it works ...
- Classifying files by type
- Getting ready
- How to do it ...
- How it works ...
- Measuring the similarity between two strings
- Getting ready
- How to do it ...
- How it works ...
- Measuring the similarity between two files
- Getting ready
- How to do it ...
- How it works ...
- Extracting N-grams
- Getting ready
- How to do it ...
- How it works ...
- Selecting the best N-grams
- Getting ready
- How to do it ...
- How it works ...
- Building a static malware detector
- Getting ready
- How to do it ...
- How it works ...
- Tackling class imbalance
- Getting ready
- How to do it ...
- How it works ...
- Handling type I and type II errors
- Getting ready
- How to do it ...
- How it works ...
- Chapter 3: Advanced Malware Detection
- Technical requirements
- Detecting obfuscated JavaScript
- Getting ready
- How to do it ...
- How it works ...
- Featurizing PDF files
- Getting ready
- How to do it ...
- How it works ...
- Extracting N-grams quickly using the hash-gram algorithm
- Getting ready
- How to do it ...
- How it works ...
- See also
- Building a dynamic malware classifier
- Kranakis, Evangelos.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xvi, 106 pages) : illustrations (some color)
- Summary
-
- 1. Models for mobile agent computing
- Introduction
- What is a mobile agent
- Why mobile agents
- An algorithmic model for mobile agents
- Mobile agents
- Distributed networks
- Resource measures
- Mobile agent rendezvous
- Outline of the book
- Comments and bibliographic remarks.
- 2. Deterministic rendezvous in a ring
- Introduction
- A single stationary token
- The feasibility of rendezvous
- The time complexity of rendezvous
- Memory tradeoff for rendezvous with detection
- Limits to the memory trade-off
- Movable tokens
- Comments and bibliographic remarks.
- 3. Multiple agent rendezvous in a ring
- Introduction
- Impossibility of rendezvous
- Rendezvous with detection
- Conditional solutions
- Comments and bibliographic remarks.
- 4. Randomized rendezvous in a ring
- Introduction
- Random walk algorithm
- Randomization and tokens
- Time/memory trade-offs
- Coin half tour algorithm
- Approximate counting algorithm
- Comments and bibliographic remarks.
- 5. Other models
- Introduction
- Leader election and rendezvous
- Rendezvous with failing tokens
- Rendezvous when tokens fail upon release
- Rendezvous when tokens can fail at any time
- The cost of token failure
- Flickering tokens
- Asynchronous rendezvous
- Look-compute-move
- Model and terminology
- Impossibility results
- Gathering configurations with a single multiplicity
- Gathering rigid configurations
- Gathering an odd number of robots
- Dangerous networks
- Black-hole search in an asynchronous ring
- Rendezvous in asynchronous rings in spite of a black-hole
- Comments and bibliographic remarks.
- 6. Other topologies
- Introduction
- Synchronous torus
- Memory lower bounds for rendezvous
- Rendezvous algorithms
- Trees
- Arbitrary graphs
- Comments and bibliographic remarks.
- Bibliography
- Glossary
- Authors' biographies
- Index.
- Seni, Giovanni.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xvi, 108 pages) : illustrations
- Summary
-
- Ensembles Discovered Predictive Learning and Decision Trees Model Complexity, Model Selection and Regularization Importance Sampling and the Classic Ensemble Methods Rule Ensembles and Interpretation Statistics Ensemble Complexity.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Sun, Yizhou.
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xi, 147 pages) : illustrations (some color)
- Summary
-
- Introduction Ranking-Based Clustering Classification of Heterogeneous Information Networks Meta-Path-Based Similarity Search Meta-Path-Based Relationship Prediction Relation Strength-Aware Clustering with Incomplete Attributes User-Guided Clustering via Meta-Path Selection Research Frontiers.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
6. Sentiment analysis and opinion mining [2012]
- Liu, Bing, 1963-
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xiv, 167 pages)
- Summary
-
- Preface Sentiment Analysis: A Fascinating Problem The Problem of Sentiment Analysis Document Sentiment Classification Sentence Subjectivity and Sentiment Classification Aspect-Based Sentiment Analysis Sentiment Lexicon Generation Opinion Summarization Analysis of Comparative Opinions Opinion Search and Retrieval Opinion Spam Detection Quality of Reviews Concluding Remarks Bibliography Author Biography.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Mishra, Sakti, author.
- Birmingham : Packt Publishing, Limited, 2022.
- Description
- Book — 1 online resource (430 p.)
- Summary
-
- Table of Contents An Overview of Amazon EMR Exploring the Architecture and Deployment Options Common Use Cases and Architecture Patterns Big Data Applications and Notebooks Available in Amazon EMR Setting Up and Configuring EMR Clusters Monitoring, Scaling, and High Availability Understanding Security in Amazon EMR Understanding Data Governance in Amazon EMR Implementing Batch ETL Pipeline with Amazon EMR and Apache Spark Implementing Real-Time Streaming with Amazon EMR and Spark Streaming Implementing UPSERT on S3 Data Lake with Apache Spark and Apache Hudi Orchestrating Amazon EMR Jobs with AWS Step Functions and Apache Airflow/MWAA Migrating On-Premises Hadoop Workloads to Amazon EMR Best Practices and Cost Optimization Techniques.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- BUELTA, JAIME.
- [S.l.] : PACKT PUBLISHING LIMITED, 2022.
- Description
- Book — 1 online resource
- Summary
-
- Table of Contents Introduction to Software Architecture API Design Data Modeling The Data Layer The Twelve-Factor App Methodology Web Server Structures Event-Driven Structures Advanced Event-Driven Structures Microservices vs Monolith Testing and TDD Package Management Logging Metrics Profiling Debugging Ongoing Architecture.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Amsterdam : IOS Press, 2011.
- Description
- Book — 1 online resource (196 pages) Digital: data file.
- Summary
-
- Title page; Preface; Contents; Part I. Foundations of Well-Being; Part II. Supporting the Well-Being Through Care Taking in Smart Environments; Part III. Improving the Well-Being Through Life-Style and Entertainment; Subject Index; Author Index.
(source: Nielsen Book Data)
- ADMA (Conference) (13th : 2017 : Singapore)
- Cham, Switzerland : Springer, 2017.
- Description
- Book — 1 online resource (xvii, 881 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Database and Distributed Machine Learning.- Querying and Mining Strings Made Easy Distributed Training Large-Scale Deep Architectures.- Fault Detection and Localization in Distributed Systems using Recurrent Convolutional Neural Networks.- Discovering Group Skylines with Constraints by Early Candidate Pruning.- Comparing MapReduce-Based k-NN Similarity Joins On Hadoop For High-dimensional Data.- A Higher-Fidelity Frugal Quantile Estimator.- Recommender System.- Fair Recommendations Through Diversity Promotion.- A Hierarchical Bayesian Factorization Model for Implicit and Explicit Feedback Data.- Empirical Analysis of Factors Influencing Twitter Hashtag Recommendation on Detected Communities.- Group Recommender Model Based on Preference Interaction.- Identification of Grey Sheep Users By Histogram Inter
- section In Recommender Systems.- Social Network and Social Media.- A Feature-based Approach for the Redefined Link Prediction Problem in Signed Networks.- From Mutual Friends to Overlapping Community Detection: A Non-negative Matrix Factorization Approach.- Calling for Response: Automatically Distinguishing Situation-aware Tweets During Crises.- Efficient Revenue Maximization for Viral Marketing in Social Networks.- Generating Life Course Trajectory Sequences with Recurrent Neural Networks and Application to Early Detection on Social Disadvantage.- FRISK: A Multilingual Approach to Find twitteR InterestS via wiKipedia.- A Solution to Tweet-Based User Identification across Online Social Networks.- Machine Learning.- Supervised Feature Selection Algorithm Based on Low-Rank and Manifold Learning.- Mixed Membership Sparse Gaussian Conditional Random Fields.- Effects of Dynamic Subspacing in Random Forest.- Diversity and Locality in Multi-Component, Multi-Layer Predictive Systems: A Mutual Information Based Approach.- Hybrid Subspace Mixture Models For Prediction and Anomaly Detection in High Dimensions.- Classification and Clustering Methods.- StruClus: Scalable Structural Graph Set Clustering with Representative Sampling.- Employing Hierarchical Clustering and Reinforcement Learning for Attribute-based Zero-Shot Classification.- Environmental Sound Recognition using Masked Conditional Neural Networks.- Analyzing Performance of Classification Techniques in Detecting Epileptic Seizure.- A Framework for Clustering and Dynamic Maintenance of XML Documents.- Language-independent Twitter Classification using Character-based Convolutional Networks.- Behavior Modeling and User Profiling.- Modeling Check-in Behavior with Geographical Neighborhood Influence of Venues.- An empirical study on collective online behaviors of extremist supporters. -Your Moves, Your Device: Establishing Behavior Profiles using Tensors.- An Approach for Identifying Author Profiles of Blogs.- Generating Topics of Interests for Research Communities.- An Evolutionary Approach for Learning Conditional Preference Network from Inconsistent Examples.- Bioinformatic and Medical Data Analysis.- Predicting Clinical Outcomes of Alzheimer's Disease from Complex Brain Networks.- Doctoral Advisor or Medical Condition: Towards Entity-specific Rankings of Knowledge Base Properties.- Multiclass Lung Cancer Diagnosis by Gene Expression Programming and Microarray Datasets.- Drug-drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers.- Spatio-temporal Data.- People-Centric Mobile Crowdsensing Platform for Urban Design.- Long-Term User Location Prediction Using Deep Learning and Periodic Pattern Mining.- An Intelligent Weighted Fuzzy Time Series Model Based on A Sine-Cosine Adaptive Human Learning Optimization Algorithm and Its Application to Financial Markets Forecasting.- Mobile Robot Scheduling with Multiple Trips and Time Windows.- Natural Language Processing and Text Mining.- Feature Analysis for Duplicate Detection in Programming QA Communities.- A Joint Human/Machine Process for Coding Events and Conflict Drivers.- Quality Prediction of Newly Proposed Questions in CQA by Leveraging Weakly Supervised Learning.- Improving Chinese Sentiment Analysis via Segmentation-based Representation Using Parallel CNN.- Entity Recognition by Distant Supervision with Soft List Constraint.- Structured Sentiment Analysis.- Data Mining Applications.- Improving Real-Time Bidding Using a Constrained Markov Decision Process.- PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network.- Identifying Unreliable Sensors Without a Knowledge of the Ground Truth in Deceptive Environments.- Color-sketch simulator: a guide for color-based visual known-item search.- Applications.- Making Use of External Company Data to Improve the Classification of Bank Transactions.- Mining Load Profile Patterns for Australian Electricity Consumers.- STA: a Spatio-temporal Thematic Analytics Framework for Urban Ground Sensing.- Privacy and Utility Preservation for Location Data Using Stay Region Analysis.- Location-aware Human Activity Recognition.- Demos.- SWYSWYK: a new Sharing Paradigm for the Personal Cloud.- Tools and Infrastructure for Supporting Enterprise Knowledge Graphs.- An Interactive Web-based Toolset for Knowledge Discovery from Short Text Log Data.- Carbon: Forecasting Civil Unrest Events by Monitoring News and Social Media.- A system for Querying and Analyzing Urban Regions.- Detect tracking behavior among trajectory data.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.