Account
Orders
Advanced search
This open access book provides a basic introduction to feature modelling and analysis as well as to the integration of AI methods with feature modelling. It is intended as an introduction for researchers and practitioners who are new to the field and will also serve as...
This open access book provides information how to choose and collect the appropriate metrics for a software project in an organization. There are several kinds of metrics, based on the analysis of source code and developed for different programming paradigms such as...
Emerging machine learning techniques bring new opportunities to flexible network control and management. This book focuses on using state-of-the-art machine learning-based approaches to improve the performance of Software-Defined Networking (SDN). It will apply several...
This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which...
Shortly after it was ?rst introduced in 2006, di?erential privacy became the ?agship data privacy de?nition. Since then, numerous variants and extensions were proposed to adapt it to di?erent scenarios and attacker models. In this work, we propose a systematic...
This book provides a comprehensive analysis of fundamental topics related to blockchain. Throughout, the authors explore different vital issues and specific areas of blockchain. For convenience, the authors present the elementary description, visualize the working...
Opinion mining is a prevalent research issue in many domains. In the financial domain, however, it is still in the early stages. Most of the researches on this topic only focus on the coarse-grained market sentiment analysis, i.e., 2-way classification for...
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
The author considers the problem of sequential probability forecasting in the most general setting, where the observed data may exhibit an arbitrary form of stochastic dependence. All the results presented are theoretical, but they concern the foundations of some...
This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Further, it analyses sentiments in Twitter blogs from both textual and visual content using hierarchical deep learning networks: hierarchical gated feedback...
This SpringerBrief provides an overview within data mining of spatiotemporal frequent pattern mining from evolving regions to the perspective of relationship modeling among the spatiotemporal objects, frequent pattern mining algorithms, and data access...
This book explains how to use a data-driven approach to design strategies for social media content delivery. It first introduces readers to how social information can be effectively gathered for big data analysis, which provides content delivery intelligence. Secondly,...
The book discusses data and energy integrated communication networking technologies, including the latest research contributions in this promising area. It firstly provides an overview of data and energy integrated communication networks (DEINs) and introduces the key...
This book presents a study on how thread and data mapping techniques can be used to improve the performance of multi-core architectures.It describes how the memory hierarchy introduces non-uniform memory access, and how mapping can be used to reduce the memory...
The author first introduces the basic framework for cultural algorithms and he then explains the social structure of a cultural system as a mechanism for the distribution of problem-solving information throughout a population. Three different models for social...
The application of bioinformatics approaches in drug design involves an interdisciplinary array of sophisticated techniques and software tools to elucidate hidden or complex biological data. This work reviews the latest bioinformatics approaches used for drug discovery....
This book provides a gentle introduction to redescription mining, a versatile data mining tool that is useful to find distinct common characterizations of the same objects and, vice versa, to identify sets of objects that admit multiple shared descriptions. It is...
This book provides a frequentist semantics for conditionalization on partially known events, which is given as a straightforward generalization of classical conditional probability via so-called probability testbeds. It analyzes the resulting partial conditionalization,...
This book analyzes unexpected preference query results for three problems: causality and responsibility problems, why-not and why questions, and why-few and why-many questions. Further, it refines preference queries and discusses how to modify the original preference...
This book introduces readers to an advanced combinatorial testing approach and its application in the cloud environment. Based on test algebra and fault location analysis, the proposed combinatorial testing method can support experiments with 250 components (with 2 *...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers