This volume presents the state of the art concerning quality and interestingness measures for data mining. The book summarizes recent developments and presents original research on this topic. The chapters include surveys, comparative studies of existing measures, proposals of new measures, simulations, and case studies. Both theoretical and applied chapters are included. Papers for this book were selected and reviewed for correctness and completeness by an international review committee.
标签: interestingness concerning the presents
上传时间: 2014-01-19
上传用户:ve3344
The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.
标签: foundations The consists sections
上传时间: 2017-06-22
上传用户:lps11188
SensorSimII is the framework of a simulator that I have been working on to study how future sensor networks should operate. the simulator is written in a modular fashion so that it can be adapted to serve a number of needs. However, please remember that it is still a work in progress. This web page is here just to give a glimpse of the approach we ve taken with this simulator. Likewise this web page is simply preliminary information to attempt to answer some of the questions that researchers might have about this project.
标签: SensorSimII framework simulator working
上传时间: 2013-12-26
上传用户:wsf950131
This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive.
标签: up-to-date only cutting-edge material
上传时间: 2017-07-09
上传用户:comua
wxPython In Action,By combining introductions, overviews, and how-to examples, the In Action books are designed to help learning and remembering. According to research in cognitive science, the things people remember are things they discover during self-motivated exploration.
上传时间: 2013-12-20
上传用户:a6697238
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.
标签: keys Aircrack-ng cracking WPA-PSK
上传时间: 2013-12-25
上传用户:bruce
The main function of the traffic detection system is to examine the speed, the flow, the vehicle type and the lane occupancy of the motor vehicles. The method based on ARM embedded system in this paper provides a new means for the traffic detection system research.
标签: the detection function examine
上传时间: 2013-12-18
上传用户:busterman
FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seapage". The average machine broadcasts a lot of information about itself on open networks. This tool captures and organizes this information. This code is extremely low quality, hacked together in order to demonstrate the problem at the BlackHat Federal 2007 conference. Higher quality code should be available around May 2007 on our website at http://www.erratasec.com.
标签: tool demonstrate broadcast analysis
上传时间: 2013-11-30
上传用户:1101055045
dynamic time warp Matlab speech recognition source code DTW (dynamic time consolidation), the Speech Recognition Research counterparts can be downloaded
标签: dynamic time consolidation recognition
上传时间: 2013-12-29
上传用户:edisonfather
Model for Opnet. Use this model to generate traffic between source and destination pairs. The resultant traffic file can then be imported into the networks to mimic traffic patterns and represent background loading on a network
标签: destination generate between traffic
上传时间: 2017-08-06
上传用户:gaome