Shichao Zhang - Böcker
Visar alla böcker från författaren Shichao Zhang. Handla med fri frakt och snabb leverans.
6 produkter
6 produkter
1 095 kr
Skickas inom 10-15 vardagar
This challenge has attracted a great many researchers including the au thors who have developed a local pattern analysis, a new strategy for dis covering some kinds of potentially useful patterns that cannot be mined in traditional multi-database mining techniques.
1 095 kr
Skickas inom 10-15 vardagar
The Web has emerged as a large, distributed data repository, & information on the Internet & in existing transaction databases can be analyzed for commercial gains in decision making. Therefore, how to efficiently identify quality knowledge from different data sources uncovers a significant challenge. Knowledge Discovery in Multiple Databases provides a comprehensive introduction to the latest advancements in multi-database mining, & presents a local-pattern analysis framework for pattern discovery from multiple data sources. Based on this framework, data preparation techniques in multiple databases, an application-independent database classification for data reduction, & efficient algorithms for pattern discovery from multiple databases are described. This book is suitable for researchers, professionals & students in data mining, distributed data analysis, and machine learning. It is also appropriate for use as a text supplement for broader courses involving knowledge discovery in databases & data mining.
Del 11168 - Lecture Notes in Computer Science
Information Retrieval
24th China Conference, CCIR 2018, Guilin, China, September 27–29, 2018, Proceedings
Häftad, Engelska, 2018
551 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 24th China Conference on Information Retrieval, CCIR 2018, held in Guilin, China, in September 2018. The 22 full papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections: Information retrieval, collaborative and social computing, natural language processing.
551 kr
Skickas inom 10-15 vardagar
Due to the popularity of knowledge discovery and data mining, in practice as well as among academic and corporate R&D professionals, association rule mining is receiving increasing attention.The authors present the recent progress achieved in mining quantitative association rules, causal rules, exceptional rules, negative association rules, association rules in multi-databases, and association rules in small databases. This book is written for researchers, professionals, and students working in the fields of data mining, data analysis, machine learning, knowledge discovery in databases, and anyone who is interested in association rule mining.
551 kr
Skickas inom 10-15 vardagar
The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e?orts of intruders, and has been widely discussed among - searchers in this ?eld. Contributions to the investigation of novel and e?cient ideas and techniques have been made through some important conferences and journals, such asESORICS,CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e?orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as ?nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice,butthey alsoposeabigchallenge to protect the information transmitted over the open network frommalicious attacks.
Applications and Techniques in Information Security
9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings
Häftad, Engelska, 2018
551 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018.The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.