Hardcover. Zustand: As New. Near to new ND/J SKU AZ 25a.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 79,46
Anzahl: 3 verfügbar
In den WarenkorbZustand: New. pp. 272.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 89,92
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 113,70
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 272 pages. 9.21x6.14x0.60 inches. In Stock.
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 272 | Sprache: Englisch | Produktart: Bücher | Based on the authors' own research work, this book explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Focusing on three applications of data mining, the book takes a practical approach to the subject. A hands-on guide, it discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.
Zustand: Hervorragend. Zustand: Hervorragend | Seiten: 272 | Sprache: Englisch | Produktart: Bücher | Based on the authors' own research work, this book explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Focusing on three applications of data mining, the book takes a practical approach to the subject. A hands-on guide, it discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.
EUR 126,60
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New. Thuraisingham, Bhavani Khan, Latifur Awad, Mamoun Wang, LeiFocusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, .