Browse Results

Showing 16,376 through 16,400 of 58,358 results

Deskriptives Data-Mining

by David L. Olson Georg Lauhoff

Dieses Buch bietet einen Überblick über Data-Mining-Methoden, die durch Software veranschaulicht werden. Beim Wissensmanagement geht es um die Anwendung von menschlichem Wissen (Erkenntnistheorie) mit den technologischen Fortschritten unserer heutigen Gesellschaft (Computersysteme) und Big Data, sowohl bei der Datenerfassung als auch bei der Datenanalyse. Es gibt drei Arten von Analyseinstrumenten. Die deskriptive Analyse konzentriert sich auf Berichte über das, was passiert ist. Bei der prädiktiven Analyse werden statistische und/oder künstliche Intelligenz eingesetzt, um Vorhersagen treffen zu können. Dazu gehört auch die Modellierung von Klassifizierungen. Die diagnostische Analytik kann die Analyse von Sensoreingaben anwenden, um Kontrollsysteme automatisch zu steuern. Die präskriptive Analytik wendet quantitative Modelle an, um Systeme zu optimieren oder zumindest verbesserte Systeme zu identifizieren. Data Mining umfasst deskriptive und prädiktive Modellierung. Operations Research umfasst alle drei Bereiche. Dieses Buch konzentriert sich auf die deskriptive Analytik.Das Buch versucht, einfache Erklärungen und Demonstrationen einiger deskriptiver Werkzeuge zu liefern. Es bietet Beispiele für die Auswirkungen von Big Data und erweitert die Abdeckung von Assoziationsregeln und Clusteranalysen. Kapitel 1 gibt einen Überblick im Kontext des Wissensmanagements. Kapitel 2 erörtert einige grundlegende Softwareunterstützung für die Datenvisualisierung. Kapitel 3 befasst sich mit den Grundlagen der Warenkorbanalyse, und Kapitel 4 demonstriert die RFM-Modellierung, ein grundlegendes Marketing-Data-Mining-Tool. Kapitel 5 demonstriert das Assoziationsregel-Mining. Kapitel 6 befasst sich eingehender mit der Clusteranalyse. Kapitel 7 befasst sich mit der Link-Analyse. Die Modelle werden anhand geschäftsbezogener Daten demonstriert. Der Stil des Buches ist beschreibend und versucht zu erklären, wie die Methoden funktionieren, mit einigen Zitaten, aber ohne tiefgehende wissenschaftliche Referenzen. Die Datensätze und die Software wurden so ausgewählt, dass sie für jeden Leser, der über einen Computeranschluss verfügt, weithin verfügbar und zugänglich sind.

Desktop Grid Computing

by Christophe Cérin Gilles Fedak

Desktop Grid Computing presents common techniques used in numerous models, algorithms, and tools developed during the last decade to implement desktop grid computing. These techniques enable the solution of many important sub-problems for middleware design, including scheduling, data management, security, load balancing, result certification, and f

Desktop Publishing with Adobe Pagemaker 6.5 for Windows

by James E. Shuman Marcia Williams

Designed for use in front of the computer, this spiral-bound text offers a top down approach, showing students the completed project first, then leading them through its creation.

Después del trabajo: El empleo argentino en la cuarta Revolución Industrial

by Eduardo Levy Yeyati

¿Hay vida después del trabajo? Con optimismo o desesperanza, con retórica académica o de charla de café, hace tiempo sabemos, escuchamos o intuimos que el trabajo, como lo conocemos, seguirá siendo desplazado por la tecnología. ¿Preocupación "de países desarrollados"? Cada vez tenemos más evidencia para afirmar que no: la pregunta por el futuro del empleo en la Argentina no solo es relevante, también es urgente. Y tal vez no se trate de si seremos reemplazados por robots y cuándo, sino de discutir las consecuencias de una sustitución inevitable sobre nuestro bienestar y nuestra cultura. ¿Somos capaces de convertir progreso tecnológico en herramienta liberadora? Este libro apuesta a esa posibilidad y brinda los insumos para pensarla y formularla en términos de política pública. Basado en una investigación sin precedentes, traza un mapa del trabajo en la Argentina de hoy, presenta sus perspectivas a futuro y, sobre todo, invita a entender las consecuencias de un cambio de dimensiones históricas que golpea cada vez más cerca de casa.

Destination Recommendation Systems: Behavioral Foundations and Applications

by Daniel R. Fesenmaier Karl W. Wöber Hannes Werthner

An emerging area of study within technology and tourism focuses on the development of technologies which enable Internet users to quickly and effectively find relevant information about selected topics including travel destination, transportation, etc.

Destiny: The Exotic Collection, Volume One

by Insight Editions

Discover all of the Exotic weapons from the world of Destiny 2 in this comprehensive visual guide, loaded with stunning artwork!From the Thorn and Hawkmoon hand cannon, to the Outbreak Perfected rifle, Destiny 2 features an incredible arsenal of exotic weaponry. Now, fans of the hit series can experience these weapons like never before, with this definitive guide to the exotic weapons of Destiny 2. Featuring magnificent art from Destiny 2, it is the ultimate book on the most unique weapons in Destiny 2. BEAUTIFUL EXOTIC WEAPON ARTWORK: From the Thorn and Hawkmoon hand cannon, to the Outbreak Perfected rifle, this book features the beautiful art of Destiny 2. The incredible detail of the illustrations featured in this book will give fans an unparalleled experience of the entire Destiny 2 exotic weapon arsenal. OWN THE DEFINITIVE DESTINY 2 EXOTIC WEAPONS GUIDE: This book will be the ultimate word on the exotic weapons of Destiny 2. COMPLETE YOUR DESTINY LIBRARY: Destiny: The Exotic Collection, Volume One stands alongside fan-favorite books such as Destiny: The Official Cookbook and Art of Destiny Volume One and Two.

Destruction in the Desert: An Unofficial Minecrafters Time Travel Adventure, Book 3 (An Unofficial Minecrafters Time Travel Adventure #3)

by Winter Morgan

Things have started to return to normal in Brett’s life, and he’s happily participating in a practical joke competition with Poppy and Joe. But when Joe goes missing, Brett wonders if it’s just his next joke, or something more serious. And then they discover the crater. Another portal has opened, and Brett and Poppy have to jump in to find their friend. This time, they are taken to a desert, into a world that they believed only existed in stories, to a city that is doomed. But they find Joe, who is fearlessly helping them survive as an evil villain cuts off their supplies. Brett and Poppy join in, teaching the residents of the city the elements of crafting potions. But even armed with this new knowledge, they worry that it would be enough to save the city. Join Brett and his friends as they work to save the Desert City in the third installment of the Unofficial Minecrafters Time Travel Adventure series from bestselling author Winter Morgan!

Detached-Eddy Simulation Series Methods for Compressor Internal Flow: Method, Development and Application

by Ruiyu Li Limin Gao Lei Zhao

This book concentrates on high-fidelity numerical methods for predicting internal flows within aeroengines’ compressors. A distinctive features of this work is the establishment of a comprehensive research framework. Specifically, it starts with engineering application requirements and integrates high-performance parallel algorithms to develop detached eddy simulation (DES)-series methods tailored to the needs of compressor design. Additionally, it encompasses the development of data analysis methods suitable for handling the "vast" amounts of high-fidelity unsteady flow data in compressors and the high spatial resolution experimental results. This book takes us from making the intricate details of compressor flow field structures "visible" to “explainable”. Another noteworthy aspect of this book is its practical orientation, seamlessly intergrating theoretical concepts with practical applications. Herein, it addresses three major engineering problems in detail and elucidates the technical approaches involving advanced numerical methods and data analysis techniques for solving these physical problems. The book highlights the challenging issues associated with complex internal flows in compressors, the governing equations for DES-series methods, and the implementation strategies for numerical simulations of internal compressor flows. They also delve into data-driven analysis methods for unsteady flow field data, high-fidelity numerical simulations of flow in the blade root region of compressors, dynamic flow capture methods in the tip region of compressor blades, and simulation and analysis of flow fields in inlet distortion generators. This book serves as a valuable reference for researchers and engineering professionals in the aerospace, computational fluid dynamics, and high-performance turbomachinery fields. Additionally, it can be used as a specialized textbook for doctoral and master's students in disciplines such as aerospace science and technology, power engineering, and engineering thermophysics.

Detecting Peripheral-based Attacks on the Host Memory

by Patrick Stewin

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.

Detecting Regime Change in Computational Finance: Data Science, Machine Learning and Algorithmic Trading

by Jun Chen Edward P Tsang

This is the first book of its kind to build on the framework of Directional Change. The concept of Directional Change opens a whole new area of research. – From the Foreword by Dr Richard Olsen, Founder and CEO of Lykke, Co-founder of OANDA and pioneer in high-frequency finance and fintech A creative start at a novel and difficult problem for investors large and small. – Professor M. A. H. Dempster, University of Cambridge and Cambridge Systems Associates Limited Financial markets technology and the practice of trading are in a state of constant change. A book that details a completely new concept in trading, however, is very rare. This is one such book, and the authors should be applauded for producing this exciting new work. The concept and framework of Directional Change in prices is an area of research with much promise! – Dr David Norman, Founder of TTC Institute and author This book shows how AI could be a game-changer in finance. – Dr Amadeo Alentorn, Head of Research/Fund Manager at Merian Global Investors Based on interdisciplinary research into "Directional Change", a new data-driven approach to financial data analysis, Detecting Regime Change in Computational Finance: Data Science, Machine Learning and Algorithmic Trading applies machine learning to financial market monitoring and algorithmic trading. Directional Change is a new way of summarising price changes in the market. Instead of sampling prices at fixed intervals (such as daily closing in time series), it samples prices when the market changes direction ("zigzags"). By sampling data in a different way, this book lays out concepts which enable the extraction of information that other market participants may not be able to see. The book includes a Foreword by Richard Olsen and explores the following topics: Data science: as an alternative to time series, price movements in a market can be summarised as directional changes Machine learning for regime change detection: historical regime changes in a market can be discovered by a Hidden Markov Model Regime characterisation: normal and abnormal regimes in historical data can be characterised using indicators defined under Directional Change Market Monitoring: by using historical characteristics of normal and abnormal regimes, one can monitor the market to detect whether the market regime has changed Algorithmic trading: regime tracking information can help us to design trading algorithms It will be of great interest to researchers in computational finance, machine learning and data science. About the Authors Jun Chen received his PhD in computational finance from the Centre for Computational Finance and Economic Agents, University of Essex in 2019. Edward P K Tsang is an Emeritus Professor at the University of Essex, where he co-founded the Centre for Computational Finance and Economic Agents in 2002.

Detecting Trust and Deception in Group Interaction (Terrorism, Security, and Computation)

by V. S. Subrahmanian Judee K. Burgoon Norah E. Dunbar

This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings. This book develops statistical results linking different types of facial expressions (e.g. smile, pursed lips, raised eyebrows), vocal features (e.g., pitch, loudness) and linguistic features (e.g., dominant language, turn length) with both unary behaviors (e.g. is person X lying?) to binary behaviors (Is person X dominant compared to person Y? Does X trust Y? Does X like Y?). In addition, this book describes machine learning and computer vision-based algorithms that can be used to predict deception, as well as the visual focus of attention of people during discussions that can be linked to many binary behaviors. It is written by a multidisciplinary team of both social scientists and computer scientists.Meetings are at the very heart of human activity. Whether you are involved in a business meeting or in a diplomatic negotiation, such an event has multiple actors, some cooperative and some adversarial. Some actors may be deceptive, others may have complex relationships with others in the group. This book consists of a set of 11 chapters that describe the factors that link human behavior in group settings and attitudes to facial and voice characteristics.Researchers working in social sciences (communication, psychology, cognitive science) with an interest in studying the link between human interpersonal behavior and facial/speech/linguistic characteristics will be interested in this book. Computer scientists, who are interested in developing machine learning and deep learning based models of human behavior in group settings will also be interested in purchasing this book.

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Wireless Networks)

by Beibei Li Rongxing Lu Gaoxi Xiao

​This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals.Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.

Detection of Intrusions and Malware, and Vulnerability Assessment

by Magnus Almgren Vincenzo Gulisano Federico Maggi

This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.

Detection of Intrusions and Malware, and Vulnerability Assessment

by Juan Caballero Urko Zurutuza Ricardo J. Rodríguez

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings (Lecture Notes in Computer Science #13358)

by Lorenzo Cavallaro Daniel Gruss Giancarlo Pellegrino Giorgio Giacinto

This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021. The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.

Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings (Lecture Notes in Computer Science #10885)

by Cristiano Giuffrida Sébastien Bardin Gregory Blanc

This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.

Detection of Intrusions and Malware, and Vulnerability Assessment: 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12–14, 2023, Proceedings (Lecture Notes in Computer Science #13959)

by Daniel Gruss Federico Maggi Mathias Fischer Michele Carminati

This book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2023, held in Hamburg, Germany, in July 2023. The 12 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 43 submissions. The papers are organized in thematical sections named: Side Channels Attacks; Security and Machine Learning; Cyber Physical System Security; Security Issues when Dealing with Users; Analysis of Vulnerable Code; Flow Integrity and Security.

Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings (Lecture Notes in Computer Science #9721)

by Juan Caballero, Urko Zurutuza and Ricardo J. Rodríguez

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Detection of Intrusions and Malware, and Vulnerability Assessment: 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17–19, 2024, Proceedings (Lecture Notes in Computer Science #14828)

by Federico Maggi Mathias Payer Michele Carminati Manuel Egele

This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17–19, 2024. The 22 full papers and 6 short paper presented in this volume were carefully reviewed and selected from 110 submissions. The papers are organized in thematical sections named: vulnerability detection and defense; malware and threats; mobile and web application security; AI for security; hardware and firmware security; cyber physical systems and IoT.

Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings (Lecture Notes in Computer Science #12223)

by Clémentine Maurice Leyla Bilge Gianluca Stringhini Nuno Neves

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. ​*The conference was held virtually due to the COVID-19 pandemic.

Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, July 14–16, 2021, Proceedings (Lecture Notes in Computer Science #12756)

by Nuno Neves Leyla Bilge Lorenzo Cavallaro Giancarlo Pellegrino

This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2021, held virtually in July 2021.The 18 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 65 submissions. DIMVA serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas.Chapter “SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings (Lecture Notes in Computer Science #11543)

by Roberto Perdisci Clémentine Maurice Giorgio Giacinto Magnus Almgren

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019.The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.

Detection of Intrusions and Malware, and Vulnerability Assessment

by Michalis Polychronakis Michael Meier

This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.

Detection of Karst Voids at Deep Pile Foundation

by Liu Liu Zhenming Shi Ming Peng Shaojun Li Fengjuan Tao

Karst voids at pile locations can have a significant negative impact on the bearing capacity and overall safety of cast-in-place pile foundations. This book introduces a state-of-the-art detection system, comprising of specialized equipment, algorithms, and software, designed to identify karst voids during deep cast-in-place pile foundation construction. The system includes a unique multifrequency borehole sonic probe, a single borehole radar, two pile hole sonar probes, and a corresponding signal analysis method. Several field and synthetic tests have been conducted to detect karst voids during cast-in-place pile foundation construction, and the results demonstrate that this technology can offer detailed geological information for pile design and ensure the safety of foundation construction. The work presented in this book has received the First Prize for Technological Invention in Shanghai, China in 2022.

Determining Project Requirements: Mastering the BABOK and the CBAP Exam (Esi International Project Management Ser.)

by Hans Jonasson

Good requirements do not come from a tool, or from a customer interview. They come from a repeatable set of processes that take a project from the early idea stage through to the creation of an agreed-upon project and product scope between the customer and the developer.From enterprise analysis and planning requirements gathering to documentation,

Refine Search

Showing 16,376 through 16,400 of 58,358 results