1 - 20
Next
- NLPCC (Conference) (7th : 2018 : Hohhot, China)
- Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource (XXIX, 478 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Conversational Bot/QA/IR
- Knowledge graph/IE
- Machine Learning for NLP
- Machine Translation
- NLP Applications.
2. Artificial intelligence and robotics [2018]
- International Symposium on Artificial Intelligence and Robotics (2nd : 2017 : Kitakyūshū-shi, Japan)
- Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource (XIV, 326 pages) : 154 illustrations Digital: text file.PDF.
- Summary
-
- Identification of the Conjugate Pair to Estimating Object Distance: An Application of the Ant Colony Algorithm.-Design of Palm Acupuncture Points Indicator
- Low-rank Representation and Locality-constrained Regression for Robust Low-Resolution Face Recognition
- Face Recognition Benchmark with ID Photos
- Scene Relighting using a Single Reference Image through Material Constrained Layer Decomposition
- Applying Adaptive Actor-critic Learning to Human Upper Lime Lifting Motion
- A Demand-based Allocation Mechanism for Virtual Machine
- A Joint Hierarchy Model for Action Recognition Using Kinect
- QoS-Based Medical Program Evolution
- An Improved 3D Surface Reconstruction Method based on Three Wavelength Phase Shift Profilometry
- The Research on the Lung Tumor Imaging based on the Electrical Impedance Tomography
- Combining CNN and MRF for Road Detection
- The Increasing of Discrimination Accuracy of Waxed Apples based on Hyperspectral Imaging Optimized by Spectral Correlation Analysis
- A Diffeomorphic Demons Approach to Statistical Shape Modeling.
- Tsukerman, Emmanuel.
- Birmingham : Packt Publishing, Limited, 2019.
- Description
- Book — 1 online resource (338 pages)
- Summary
-
- Cover
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Table of Contents
- Preface
- Chapter 1: Machine Learning for Cybersecurity
- Technical requirements
- Train-test-splitting your data
- Getting ready
- How to do it ...
- How it works ...
- Standardizing your data
- Getting ready
- How to do it ...
- How it works ...
- Summarizing large data using principal component analysis
- Getting ready
- How to do it ...
- How it works ...
- Generating text using Markov chains
- Getting ready
- How to do it ...
- How it works ...
- Performing clustering using scikit-learn
- Getting ready
- How to do it ...
- How it works ...
- Training an XGBoost classifier
- Getting ready
- How to do it ...
- How it works ...
- Analyzing time series using statsmodels
- Getting ready
- How to do it ...
- How it works ...
- Anomaly detection with Isolation Forest
- Getting ready
- How to do it ...
- How it works ...
- Natural language processing using a hashing vectorizer and tf-idf with scikit-learn
- Getting ready
- How to do it ...
- How it works ...
- Hyperparameter tuning with scikit-optimize
- Getting ready
- How to do it ...
- How it works ...
- Chapter 2: Machine Learning-Based Malware Detection
- Technical requirements
- Malware static analysis
- Computing the hash of a sample
- Getting ready
- How to do it ...
- How it works ...
- YARA
- Getting ready
- How to do it ...
- How it works ...
- Examining the PE header
- Getting ready
- How to do it ...
- How it works ...
- Featurizing the PE header
- Getting ready
- How to do it ...
- How it works ...
- Malware dynamic analysis
- Getting ready
- How to do it ...
- How it works ...
- Using machine learning to detect the file type
- Scraping GitHub for files of a specific type
- Getting ready
- How to do it ...
- How it works ...
- Classifying files by type
- Getting ready
- How to do it ...
- How it works ...
- Measuring the similarity between two strings
- Getting ready
- How to do it ...
- How it works ...
- Measuring the similarity between two files
- Getting ready
- How to do it ...
- How it works ...
- Extracting N-grams
- Getting ready
- How to do it ...
- How it works ...
- Selecting the best N-grams
- Getting ready
- How to do it ...
- How it works ...
- Building a static malware detector
- Getting ready
- How to do it ...
- How it works ...
- Tackling class imbalance
- Getting ready
- How to do it ...
- How it works ...
- Handling type I and type II errors
- Getting ready
- How to do it ...
- How it works ...
- Chapter 3: Advanced Malware Detection
- Technical requirements
- Detecting obfuscated JavaScript
- Getting ready
- How to do it ...
- How it works ...
- Featurizing PDF files
- Getting ready
- How to do it ...
- How it works ...
- Extracting N-grams quickly using the hash-gram algorithm
- Getting ready
- How to do it ...
- How it works ...
- See also
- Building a dynamic malware classifier
- Lowe, Andrew author.
- Swindon BCS, The Chartered Institute for IT 2021
- Description
- Book — 1 online resource (180 pages) Sound: digital.
- Summary
-
- Introduction - Ethical and Sustainable Human and Artificial AI Artificial Intelligence and Robotics Applying The Benefits of AI and Identifying Challenges and Risks Starting AI - How to Build A Machine Learning Toolbox Algorithms The Management, Roles and Responsibilities of Humans and Machines AI in Use in Industry - Reimagining Everything in the Fourth Industrial Revolution AI Case Studies .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
- Jansen, Stefan, author.
- Second edition. - Birmingham, UK : Packt Publishing, 2020.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
- Table of Contents Machine Learning for Trading - From Idea to Execution Market and Fundamental Data - Sources and Techniques Alternative Data for Finance - Categories and Use Cases Financial Feature Engineering - How to Research Alpha Factors Portfolio Optimization and Performance Evaluation The Machine Learning Process Linear Models - From Risk Factors to Return Forecasts The ML4T Workflow - From Model to Strategy Backtesting (N.B. Please use the Look Inside option to see further chapters).
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
6. The answer machine [2012]
- Feldman, Susan.
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xvii, 119 pages) : illustrations
- Summary
-
- Introduction The Query Process and Barriers to Finding Information Online Online Search: An Evolution Search and Discovery Technologies: An Overview Information Access: A Spectrum of Needs and Uses Future Tense: The Next Era in Information Access and Discovery Answer Machines.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- López, Beatriz.
- Cham, Switzerland : Springer, ©2013.
- Description
- Book — 1 online resource (xv, 87 pages) : illustrations
- Summary
-
- Introduction The Case-Base Reasoning and Decision Making Learning Formal Aspects Summary and Beyond.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
8. Lifelong machine learning [2018]
- Chen, Zhiyuan (Computer scientist), author.
- Second edition. - Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource (xix, 187 pages) : illustrations
- Summary
-
- Preface Acknowledgments Introduction Related Learning Paradigms Lifelong Supervised Learning Continual Learning and Catastrophic Forgetting Open-World Learning Lifelong Topic Modeling Lifelong Information Extraction Continuous Knowledge Learning in Chatbots Lifelong Reinforcement Learning Conclusion and Future Directions Bibliography Authors' Biographies.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Kranakis, Evangelos.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xvi, 106 pages) : illustrations (some color)
- Summary
-
- 1. Models for mobile agent computing
- Introduction
- What is a mobile agent
- Why mobile agents
- An algorithmic model for mobile agents
- Mobile agents
- Distributed networks
- Resource measures
- Mobile agent rendezvous
- Outline of the book
- Comments and bibliographic remarks.
- 2. Deterministic rendezvous in a ring
- Introduction
- A single stationary token
- The feasibility of rendezvous
- The time complexity of rendezvous
- Memory tradeoff for rendezvous with detection
- Limits to the memory trade-off
- Movable tokens
- Comments and bibliographic remarks.
- 3. Multiple agent rendezvous in a ring
- Introduction
- Impossibility of rendezvous
- Rendezvous with detection
- Conditional solutions
- Comments and bibliographic remarks.
- 4. Randomized rendezvous in a ring
- Introduction
- Random walk algorithm
- Randomization and tokens
- Time/memory trade-offs
- Coin half tour algorithm
- Approximate counting algorithm
- Comments and bibliographic remarks.
- 5. Other models
- Introduction
- Leader election and rendezvous
- Rendezvous with failing tokens
- Rendezvous when tokens fail upon release
- Rendezvous when tokens can fail at any time
- The cost of token failure
- Flickering tokens
- Asynchronous rendezvous
- Look-compute-move
- Model and terminology
- Impossibility results
- Gathering configurations with a single multiplicity
- Gathering rigid configurations
- Gathering an odd number of robots
- Dangerous networks
- Black-hole search in an asynchronous ring
- Rendezvous in asynchronous rings in spite of a black-hole
- Comments and bibliographic remarks.
- 6. Other topologies
- Introduction
- Synchronous torus
- Memory lower bounds for rendezvous
- Rendezvous algorithms
- Trees
- Arbitrary graphs
- Comments and bibliographic remarks.
- Bibliography
- Glossary
- Authors' biographies
- Index.
10. Active learning [2012]
- Settles, Burr.
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xiii, 100 pages) : illustrations
- Summary
-
- Automating Inquiry Uncertainty Sampling Searching Through the Hypothesis Space Minimizing Expected Error and Variance Exploiting Structure in Data Theory Practical Considerations.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
11. Algorithms for reinforcement learning [2010]
- Szepesvári, Csaba.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xii, 89 pages) : illustrations
- Summary
-
- Markov Decision Processes Value Prediction Problems Control For Further Exploration.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Geffner, Hector.
- Cham, Switzerland : Springer, ©2013.
- Description
- Book — 1 online resource (xii, 129 pages) : illustrations
- Summary
-
- Preface Planning and Autonomous Behavior Classical Planning: Full Information and Deterministic Actions Classical Planning: Variations and Extensions Beyond Classical Planning: Transformations Planning with Sensing: Logical Models MDP Planning: Stochastic Actions and Full Feedback POMDP Planning: Stochastic Actions and Partial Feedback Discussion Bibliography Author's Biography.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Vlassis, Nikos.
- 1st ed. - Cham, Switzerland : Springer, ©2007.
- Description
- Book — 1 online resource (xii, 71 pages)
- Summary
-
- Introduction Rational Agents Strategic Games Coordination Partial Observability Mechanism Design Learning.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Seni, Giovanni.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xvi, 108 pages) : illustrations
- Summary
-
- Ensembles Discovered Predictive Learning and Decision Trees Model Complexity, Model Selection and Regularization Importance Sampling and the Classic Ensemble Methods Rule Ensembles and Interpretation Statistics Ensemble Complexity.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
15. Learning with support vector machines [2011]
- Campbell, Colin.
- Cham, Switzerland : Springer, ©2011.
- Description
- Book — 1 online resource (viii, 83 pages) : illustrations
- Summary
-
- Support Vector Machines for Classification Kernel-based Models Learning with Kernels.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Sun, Yizhou.
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xi, 147 pages) : illustrations (some color)
- Summary
-
- Introduction Ranking-Based Clustering Classification of Heterogeneous Information Networks Meta-Path-Based Similarity Search Meta-Path-Based Relationship Prediction Relation Strength-Aware Clustering with Incomplete Attributes User-Guided Clustering via Meta-Path Selection Research Frontiers.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Mausam.
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xvi, 194 pages) : illustrations
- Summary
-
- Introduction MDPs Fundamental Algorithms Heuristic Search Algorithms Symbolic Algorithms Approximation Algorithms Advanced Notes.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
18. Sentiment analysis and opinion mining [2012]
- Liu, Bing, 1963-
- Cham, Switzerland : Springer, ©2012.
- Description
- Book — 1 online resource (xiv, 167 pages)
- Summary
-
- Preface Sentiment Analysis: A Fascinating Problem The Problem of Sentiment Analysis Document Sentiment Classification Sentence Subjectivity and Sentiment Classification Aspect-Based Sentiment Analysis Sentiment Lexicon Generation Opinion Summarization Analysis of Comparative Opinions Opinion Search and Retrieval Opinion Spam Detection Quality of Reviews Concluding Remarks Bibliography Author Biography.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Rossi, Francesca, 1962-
- Cham, Switzerland : Springer, ©2011.
- Description
- Book — 1 online resource (ix, 90 pages) : illustrations
- Summary
-
- Introduction Preference Modeling and Reasoning Uncertainty in Preference Reasoning Aggregating Preferences Stable Marriage Problems.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
20. Trading agents [2011]
- Wellman, Michael P.
- Cham, Switzerland : Springer, ©2011.
- Description
- Book — 1 online resource (xiii, 93 pages) : illustrations
- Summary
-
- Introduction Example: Bidding on eBay Auction Fundamentals Continuous Double Auctions Interdependent Markets Conclusion.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.