Search Results - stream bed~
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 2
- Big data 1
- Computer crimes 1
- Computer networks 1
- Computer-aided software engineering 1
- Cryptography 1
- Data processing 1
- Design and construction 1
- Electric power consumption 1
- Environmental aspects 1
- History 1
- Hulls (Naval architecture) 1
- Hydroelectric power plants 1
- Industries 1
- Internet advertising 1
- Java (Computer program language) 1
- Malware (Computer software) 1
- Maps 1
- Mathematical models 1
- Online information services 1
- Pollution 1
- Pollution management 1
- Semantic Web 1
- Shipbuilding 1
- Streaming technology (Telecommunications) 1
- Sustainable development 1
- Technology 1
- Tides 1
- Transportation 1
- Water 1
-
1
-
2
-
3
-
4
Big data analytics with applications in insider threat detection
Published 2018Table of Contents: “…Introduction -- Data security and privacy -- Data mining techniques -- Data mining for security applications -- Cloud computing and semantic web technologies -- Data mining and insider threat detection -- Big data management and analytics technologies -- Challenges for stream data classification -- Survey of stream data classification -- A multi-partition, multi-chunk ensemble for classifying concept-drifting data streams -- Classification and novel class detection in concept-drifting data streams -- Data stream classification with limited labeled training data -- Directions in data stream classification -- Insider threat detection as a stream mining problem -- Survey of insider threat and stream mining -- Ensemble-based insider threat detection -- Details of learning classes -- Experiments and results for nonsequence data -- Insider threat detection for sequence data -- Experiments and results for sequence data -- Scalability using big data technologies -- Stream mining and big data for insider threat detection -- Cloud query processing system for big data management -- Big data analytics for multipurpose social media applications -- Big data management and cloud for assured information sharing -- Big data management for secure information integration -- Big data analytics for malware detection -- A semantic web-based inference controller for provenance big data -- Confidentiality, privacy, and trust for big data systems -- Unified framework for secure big data management and analytics -- Big data, security, and the internet of things -- Big data analytics for malware detection in smartphones -- Toward a case study in healthcare for big data analytics and security -- Toward an experimental infrastructure and education program for BDMA and BDSP -- Directions for BDSP and BDMA -- Summary and directions…”
Book -
5
Through Magic Glasses and Other Lectures A Sequel to The Fairyland of Science
Published 2011“…The magician's chamber by moonlight -- Magic glasses and how to use them -- Fairy rings and how they are made -- The life-history of lichens and mosses -- The history of a lava stream -- An hour with the sun -- An evening among the stars -- Little beings from a miniature ocean -- The Dartmoor ponies -- The magician's dream of ancient days.…”
Get full text
Rights
Electronic eBook -
6
-
7
Bakun Malaysia's hydro powerhouse
Published 2013Table of Contents: “…The beginning of Bakun -- The real work begins -- Full speed ahead -- The end is in sight -- The finnishing touches -- Bakun goes on stream -- The logistical challenge -- Health & safety -- Protecting the environment -- Serving the community -- Bakun Hydropower project facts & figures…”
Book -
8
-
9
Sinews of war how technology, industry, and transportation won the Civil War
Published 1997Table of Contents: “…Ben Butler severs the Gordian knot -- We are coming, Father Abraham -- Flag Officer Farragut wins his Admiral's stars -- General McClellan's modest proposal -- General Burnside and the wayward pontoons -- All roads and rivers lead to Vicksburg -- We won't starve, thanks to the cracker line -- Colonel Bailey had a trick or two up his sleeve -- Cleaning up after Bedford Forrest -- If we cross the James, victory is on the other side -- "Get down, you damn fool, before you get shot!" …”
Book -
10
Water resources handbook
Published 1996Table of Contents: “…Mays -- Hydraulics for excess water management / Ben Chie Yen -- Urban stormwater management / G.V. …”
Book -
11
Introduction to Java programming and data structures comprehensive version
Published 2019Table of Contents: “…Aggregate Operations for Collection Streams Appendixes Appendix A Java Keywords Appendix B The ASCII Character Set Appendix C Operator Precedence Chart Appendix D Java Modifiers Appendix E Special Floating-Point Values Appendix F Number Systems Appendix G Bitwise Operations Appendix H Regular Expressions Appendix I Enumerated types Bonus Chapters 31-44 are available from the Companion Website 31. …”
Book -
12
Computational advertising techniques for targeting relevant ads
Published 2014Table of Contents: “…Dealing with short text in ads for contextual advertising --3.1 Expanding vocabulary to overcome vocabulary mismatch --3.2 Leveraging taxonomy --3.3 Combining semantics with the syntax --3.4 Topic modeling --3.5 Matching concepts --3.6 Machine learning approach to ad retrieval --3.7 Time-constrained retrieval of ads for web pages --3.8 Dealing with the sentiments in the content --3.9 Summary 4. …”
Electronic Book -
13
Water pollution & management
Table of Contents: “…Distribution pattern of benthic organisms in Sahastradhara stream at Dehradum -- 9. Effects of temperature and UV-B radiation on Antarctic micro flora and their adaptive responses -- 10. …”
Book -
14


