1 - 20
Next
- NLPCC (Conference) (7th : 2018 : Hohhot, China)
- Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource (XXIX, 478 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Conversational Bot/QA/IR
- Knowledge graph/IE
- Machine Learning for NLP
- Machine Translation
- NLP Applications.
2. Artificial intelligence and robotics [2018]
- International Symposium on Artificial Intelligence and Robotics (2nd : 2017 : Kitakyūshū-shi, Japan)
- Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource (XIV, 326 pages) : 154 illustrations Digital: text file.PDF.
- Summary
-
- Identification of the Conjugate Pair to Estimating Object Distance: An Application of the Ant Colony Algorithm.-Design of Palm Acupuncture Points Indicator
- Low-rank Representation and Locality-constrained Regression for Robust Low-Resolution Face Recognition
- Face Recognition Benchmark with ID Photos
- Scene Relighting using a Single Reference Image through Material Constrained Layer Decomposition
- Applying Adaptive Actor-critic Learning to Human Upper Lime Lifting Motion
- A Demand-based Allocation Mechanism for Virtual Machine
- A Joint Hierarchy Model for Action Recognition Using Kinect
- QoS-Based Medical Program Evolution
- An Improved 3D Surface Reconstruction Method based on Three Wavelength Phase Shift Profilometry
- The Research on the Lung Tumor Imaging based on the Electrical Impedance Tomography
- Combining CNN and MRF for Road Detection
- The Increasing of Discrimination Accuracy of Waxed Apples based on Hyperspectral Imaging Optimized by Spectral Correlation Analysis
- A Diffeomorphic Demons Approach to Statistical Shape Modeling.
- Tsukerman, Emmanuel.
- Birmingham : Packt Publishing, Limited, 2019.
- Description
- Book — 1 online resource (338 pages)
- Summary
-
- Cover
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Table of Contents
- Preface
- Chapter 1: Machine Learning for Cybersecurity
- Technical requirements
- Train-test-splitting your data
- Getting ready
- How to do it ...
- How it works ...
- Standardizing your data
- Getting ready
- How to do it ...
- How it works ...
- Summarizing large data using principal component analysis
- Getting ready
- How to do it ...
- How it works ...
- Generating text using Markov chains
- Getting ready
- How to do it ...
- How it works ...
- Performing clustering using scikit-learn
- Getting ready
- How to do it ...
- How it works ...
- Training an XGBoost classifier
- Getting ready
- How to do it ...
- How it works ...
- Analyzing time series using statsmodels
- Getting ready
- How to do it ...
- How it works ...
- Anomaly detection with Isolation Forest
- Getting ready
- How to do it ...
- How it works ...
- Natural language processing using a hashing vectorizer and tf-idf with scikit-learn
- Getting ready
- How to do it ...
- How it works ...
- Hyperparameter tuning with scikit-optimize
- Getting ready
- How to do it ...
- How it works ...
- Chapter 2: Machine Learning-Based Malware Detection
- Technical requirements
- Malware static analysis
- Computing the hash of a sample
- Getting ready
- How to do it ...
- How it works ...
- YARA
- Getting ready
- How to do it ...
- How it works ...
- Examining the PE header
- Getting ready
- How to do it ...
- How it works ...
- Featurizing the PE header
- Getting ready
- How to do it ...
- How it works ...
- Malware dynamic analysis
- Getting ready
- How to do it ...
- How it works ...
- Using machine learning to detect the file type
- Scraping GitHub for files of a specific type
- Getting ready
- How to do it ...
- How it works ...
- Classifying files by type
- Getting ready
- How to do it ...
- How it works ...
- Measuring the similarity between two strings
- Getting ready
- How to do it ...
- How it works ...
- Measuring the similarity between two files
- Getting ready
- How to do it ...
- How it works ...
- Extracting N-grams
- Getting ready
- How to do it ...
- How it works ...
- Selecting the best N-grams
- Getting ready
- How to do it ...
- How it works ...
- Building a static malware detector
- Getting ready
- How to do it ...
- How it works ...
- Tackling class imbalance
- Getting ready
- How to do it ...
- How it works ...
- Handling type I and type II errors
- Getting ready
- How to do it ...
- How it works ...
- Chapter 3: Advanced Malware Detection
- Technical requirements
- Detecting obfuscated JavaScript
- Getting ready
- How to do it ...
- How it works ...
- Featurizing PDF files
- Getting ready
- How to do it ...
- How it works ...
- Extracting N-grams quickly using the hash-gram algorithm
- Getting ready
- How to do it ...
- How it works ...
- See also
- Building a dynamic malware classifier
- Lowe, Andrew author.
- Swindon BCS, The Chartered Institute for IT 2021
- Description
- Book — 1 online resource (180 pages) Sound: digital.
- Summary
-
- Introduction - Ethical and Sustainable Human and Artificial AI Artificial Intelligence and Robotics Applying The Benefits of AI and Identifying Challenges and Risks Starting AI - How to Build A Machine Learning Toolbox Algorithms The Management, Roles and Responsibilities of Humans and Machines AI in Use in Industry - Reimagining Everything in the Fourth Industrial Revolution AI Case Studies .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
5. The answer machine [2012]
- Feldman, Susan.
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xvii, 119 pages) : illustrations
- Summary
-
- Introduction The Query Process and Barriers to Finding Information Online Online Search: An Evolution Search and Discovery Technologies: An Overview Information Access: A Spectrum of Needs and Uses Future Tense: The Next Era in Information Access and Discovery Answer Machines.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- López, Beatriz.
- Cham, Switzerland : Springer, ©2013.
- Description
- Book — 1 online resource (xv, 87 pages) : illustrations
- Summary
-
- Introduction The Case-Base Reasoning and Decision Making Learning Formal Aspects Summary and Beyond.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
7. Lifelong machine learning [2018]
- Chen, Zhiyuan (Computer scientist), author.
- Second edition. - Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource (xix, 187 pages) : illustrations
- Summary
-
- Preface Acknowledgments Introduction Related Learning Paradigms Lifelong Supervised Learning Continual Learning and Catastrophic Forgetting Open-World Learning Lifelong Topic Modeling Lifelong Information Extraction Continuous Knowledge Learning in Chatbots Lifelong Reinforcement Learning Conclusion and Future Directions Bibliography Authors' Biographies.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Kranakis, Evangelos.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xvi, 106 pages) : illustrations (some color)
- Summary
-
- 1. Models for mobile agent computing
- Introduction
- What is a mobile agent
- Why mobile agents
- An algorithmic model for mobile agents
- Mobile agents
- Distributed networks
- Resource measures
- Mobile agent rendezvous
- Outline of the book
- Comments and bibliographic remarks.
- 2. Deterministic rendezvous in a ring
- Introduction
- A single stationary token
- The feasibility of rendezvous
- The time complexity of rendezvous
- Memory tradeoff for rendezvous with detection
- Limits to the memory trade-off
- Movable tokens
- Comments and bibliographic remarks.
- 3. Multiple agent rendezvous in a ring
- Introduction
- Impossibility of rendezvous
- Rendezvous with detection
- Conditional solutions
- Comments and bibliographic remarks.
- 4. Randomized rendezvous in a ring
- Introduction
- Random walk algorithm
- Randomization and tokens
- Time/memory trade-offs
- Coin half tour algorithm
- Approximate counting algorithm
- Comments and bibliographic remarks.
- 5. Other models
- Introduction
- Leader election and rendezvous
- Rendezvous with failing tokens
- Rendezvous when tokens fail upon release
- Rendezvous when tokens can fail at any time
- The cost of token failure
- Flickering tokens
- Asynchronous rendezvous
- Look-compute-move
- Model and terminology
- Impossibility results
- Gathering configurations with a single multiplicity
- Gathering rigid configurations
- Gathering an odd number of robots
- Dangerous networks
- Black-hole search in an asynchronous ring
- Rendezvous in asynchronous rings in spite of a black-hole
- Comments and bibliographic remarks.
- 6. Other topologies
- Introduction
- Synchronous torus
- Memory lower bounds for rendezvous
- Rendezvous algorithms
- Trees
- Arbitrary graphs
- Comments and bibliographic remarks.
- Bibliography
- Glossary
- Authors' biographies
- Index.
9. Active learning [2012]
- Settles, Burr.
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xiii, 100 pages) : illustrations
- Summary
-
- Automating Inquiry Uncertainty Sampling Searching Through the Hypothesis Space Minimizing Expected Error and Variance Exploiting Structure in Data Theory Practical Considerations.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
10. Algorithms for reinforcement learning [2010]
- Szepesvári, Csaba.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xii, 89 pages) : illustrations
- Summary
-
- Markov Decision Processes Value Prediction Problems Control For Further Exploration.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Geffner, Hector.
- Cham, Switzerland : Springer, ©2013.
- Description
- Book — 1 online resource (xii, 129 pages) : illustrations
- Summary
-
- Preface Planning and Autonomous Behavior Classical Planning: Full Information and Deterministic Actions Classical Planning: Variations and Extensions Beyond Classical Planning: Transformations Planning with Sensing: Logical Models MDP Planning: Stochastic Actions and Full Feedback POMDP Planning: Stochastic Actions and Partial Feedback Discussion Bibliography Author's Biography.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Seni, Giovanni.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xvi, 108 pages) : illustrations
- Summary
-
- Ensembles Discovered Predictive Learning and Decision Trees Model Complexity, Model Selection and Regularization Importance Sampling and the Classic Ensemble Methods Rule Ensembles and Interpretation Statistics Ensemble Complexity.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
13. Learning with support vector machines [2011]
- Campbell, Colin.
- Cham, Switzerland : Springer, ©2011.
- Description
- Book — 1 online resource (viii, 83 pages) : illustrations
- Summary
-
- Support Vector Machines for Classification Kernel-based Models Learning with Kernels.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Sun, Yizhou.
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xi, 147 pages) : illustrations (some color)
- Summary
-
- Introduction Ranking-Based Clustering Classification of Heterogeneous Information Networks Meta-Path-Based Similarity Search Meta-Path-Based Relationship Prediction Relation Strength-Aware Clustering with Incomplete Attributes User-Guided Clustering via Meta-Path Selection Research Frontiers.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Mausam.
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xvi, 194 pages) : illustrations
- Summary
-
- Introduction MDPs Fundamental Algorithms Heuristic Search Algorithms Symbolic Algorithms Approximation Algorithms Advanced Notes.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
16. Sentiment analysis and opinion mining [2012]
- Liu, Bing, 1963-
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xiv, 167 pages)
- Summary
-
- Preface Sentiment Analysis: A Fascinating Problem The Problem of Sentiment Analysis Document Sentiment Classification Sentence Subjectivity and Sentiment Classification Aspect-Based Sentiment Analysis Sentiment Lexicon Generation Opinion Summarization Analysis of Comparative Opinions Opinion Search and Retrieval Opinion Spam Detection Quality of Reviews Concluding Remarks Bibliography Author Biography.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Rossi, Francesca, 1962-
- Cham, Switzerland : Springer, ©2011.
- Description
- Book — 1 online resource (ix, 90 pages) : illustrations
- Summary
-
- Introduction Preference Modeling and Reasoning Uncertainty in Preference Reasoning Aggregating Preferences Stable Marriage Problems.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Mishra, Sakti, author.
- Birmingham : Packt Publishing, Limited, 2022.
- Description
- Book — 1 online resource (430 p.)
- Summary
-
- Table of Contents An Overview of Amazon EMR Exploring the Architecture and Deployment Options Common Use Cases and Architecture Patterns Big Data Applications and Notebooks Available in Amazon EMR Setting Up and Configuring EMR Clusters Monitoring, Scaling, and High Availability Understanding Security in Amazon EMR Understanding Data Governance in Amazon EMR Implementing Batch ETL Pipeline with Amazon EMR and Apache Spark Implementing Real-Time Streaming with Amazon EMR and Spark Streaming Implementing UPSERT on S3 Data Lake with Apache Spark and Apache Hudi Orchestrating Amazon EMR Jobs with AWS Step Functions and Apache Airflow/MWAA Migrating On-Premises Hadoop Workloads to Amazon EMR Best Practices and Cost Optimization Techniques.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- BUELTA, JAIME.
- [S.l.] : PACKT PUBLISHING LIMITED, 2022.
- Description
- Book — 1 online resource
- Summary
-
- Table of Contents Introduction to Software Architecture API Design Data Modeling The Data Layer The Twelve-Factor App Methodology Web Server Structures Event-Driven Structures Advanced Event-Driven Structures Microservices vs Monolith Testing and TDD Package Management Logging Metrics Profiling Debugging Ongoing Architecture.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Amsterdam : IOS Press, 2011.
- Description
- Book — 1 online resource (196 pages) Digital: data file.
- Summary
-
- Title page; Preface; Contents; Part I. Foundations of Well-Being; Part II. Supporting the Well-Being Through Care Taking in Smart Environments; Part III. Improving the Well-Being Through Life-Style and Entertainment; Subject Index; Author Index.
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.