Search ResultsElectronic Resources 
by
Shi, Ningxin, author.
Format:
Excerpt:
the Third International Knowledge Discovery and Data Mining Tools Competition dataset (KDD 1999). The
by
Cooper, Harry R., author.
Format:
Excerpt:
successful. Material analyzed in this study not only identified the specific tools or tool sets, but also
by
Kumari, Poonam, author. (orcid)0000-0002-3940-6986
Format:
Excerpt:
best practices for conveying uncertainty will be necessary for ODC tools to be effective. This thesis
by
Brown, Matthew S., author. (orcid)0000-0002-6535-8877
Format:
Excerpt:
cloud collection tools now readily available, it is not difficult to create point cloud representations
by
Bähr, Benjamin. author.
Format:
Excerpt:
prototyping mobile app tools that identifies the most important criteria such tools should meet at different
by
Wrigley, Joseph, author.
Format:
Excerpt:
-social engineering tools and techniques. The findings reported even though security conscious organizations are
by
Maddinani, Sarath Kumar, author.
Format:
Excerpt:
, namely, structured and unstructured. Standard techniques and tools are available to handle structured
by
Yanduru, Srinivas Abhishek, author.
Format:
Excerpt:
and unstructured. Standard techniques and tools are available to handle structured data. Most of the
by
Pfeiffer, Jella.
Format:
Excerpt:
. Interactive decision aids are tools that help online shoppers to compare and evaluate product information
by
Han, Jiawei.
ScienceDirect http://www.sciencedirect.com/science/book/9780123814791
Format:
Excerpt:
sophisticated tools. Although advances in data mining technology have made extensive data collection much easier
by
Anderson, David, author.
Format:
Excerpt:
useful for future work on building program understanding and transformation tools to renovate PHP code
by
Thomas, Tyler William, author.
Format:
Excerpt:
. Consequently, these tools are often used only by security experts or abandoned entirely. In this dissertation

Select an Action





