Narrow your search

Library

KU Leuven (23)

ULiège (22)

ULB (20)

AP (19)

KDG (19)

Odisee (19)

Thomas More Kempen (19)

Thomas More Mechelen (19)

UCLL (19)

VIVES (19)

More...

Resource type

book (39)

digital (19)


Language

English (58)


Year
From To Submit

2022 (3)

2020 (3)

2019 (2)

2017 (4)

2015 (4)

More...
Listing 1 - 10 of 58 << page
of 6
>>
Sort by

Book
Behavior Computing : Modeling, Analysis, Mining and Decision
Authors: ---
ISBN: 1447162064 1447129687 9786613703446 1447129695 1280793058 Year: 2012 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

'Behavior' is an increasingly important concept in the scientific, societal, economic, cultural, political, military, living and virtual worlds. Behavior computing, or behavior informatics, consists of methodologies, techniques and practical tools for examining and interpreting behaviours in these various worlds. Behavior computing contributes to the in-depth understanding, discovery, applications and management of behavior intelligence. With contributions from leading researchers in this emerging field Behavior Computing: Modeling, Analysis, Mining and Decision includes chapters on: representation and modeling behaviors behavior ontology behaviour analysis behaviour pattern mining clustering complex behaviors classification of complex behaviors behaviour impact analysis social behaviour analysis organizational behaviour analysis behaviour computing applications Behavior Computing: Modeling, Analysis, Mining and Decision provides a dedicated source of reference for the theory and applications of behavior informatics and behavior computing. Researchers, research students and practitioners in behavior studies, including computer science, behavioral science, and social science communities will find this state of the art volume invaluable. .

Keywords

Behavioral assessment -- Data processing. --- Human behavior -- Computer simulation. --- Social media -- Psychological aspects. --- Social media --- Behavioral assessment --- Human behavior --- Sociology & Social History --- Engineering & Applied Sciences --- Social Sciences --- Computer Science --- Psychology --- Social Change --- Psychological aspects --- Data processing --- Computer simulation --- Data processing. --- Mathematical models. --- Computer science. --- Computers. --- Data mining. --- Information storage and retrieval. --- Artificial intelligence. --- Computer simulation. --- Computer Science. --- Models and Principles. --- Data Mining and Knowledge Discovery. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence (incl. Robotics). --- Simulation and Modeling. --- Factor analysis --- Psychometrics --- Information storage and retrieva. --- Artificial Intelligence. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Informatics --- Science --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace


Book
Heterogeneous Information Network Analysis and Applications
Authors: ---
ISBN: 3319562126 3319562118 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers researchers an understanding of the fundamental issues and a good starting point to work on this rapidly expanding field. It provides a comprehensive survey of current developments of heterogeneous information network. It also presents the newest research in applications of heterogeneous information networks to similarity search, ranking, clustering, recommendation. This information will help researchers to understand how to analyze networked data with heterogeneous information networks. Common data mining tasks are explored, including similarity search, ranking, and recommendation. The book illustrates some prototypes which analyze networked data. Professionals and academics working in data analytics, networks, machine learning, and data mining will find this content valuable. It is also suitable for advanced-level students in computer science who are interested in networking or pattern recognition. .

Keywords

Computer science. --- Computer communication systems. --- Data mining. --- Artificial intelligence. --- Pattern recognition. --- Electrical engineering. --- Computer Science. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Pattern Recognition. --- Communications Engineering, Networks. --- Computer Communication Networks. --- Computer networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Database searching --- Distributed processing --- Optical pattern recognition. --- Telecommunication. --- Artificial Intelligence. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Electric engineering --- Engineering --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception


Book
Broad Learning Through Fusions : An Application on Social Networks
Authors: ---
ISBN: 3030125289 3030125270 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers a clear and comprehensive introduction to broad learning, one of the novel learning problems studied in data mining and machine learning. Broad learning aims at fusing multiple large-scale information sources of diverse varieties together, and carrying out synergistic data mining tasks across these fused sources in one unified analytic. This book takes online social networks as an application example to introduce the latest alignment and knowledge discovery algorithms. Besides the overview of broad learning, machine learning and social network basics, specific topics covered in this book include network alignment, link prediction, community detection, information diffusion, viral marketing, and network embedding.

Keywords

Data mining. --- Artificial intelligence. --- Data structures (Computer scienc. --- Computer science. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence. --- Data Structures. --- Information Systems Applications (incl. Internet). --- Probability and Statistics in Computer Science. --- Data structures (Computer science) --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Data structures (Computer science). --- Application software. --- Mathematical statistics. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Sampling (Statistics) --- Statistical methods


Digital
Behavior Computing : Modeling, Analysis, Mining and Decision
Authors: ---
ISBN: 9781447129691 Year: 2012 Publisher: London Springer London


Digital
Heterogeneous Information Network Analysis and Applications
Authors: ---
ISBN: 9783319562124 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers researchers an understanding of the fundamental issues and a good starting point to work on this rapidly expanding field. It provides a comprehensive survey of current developments of heterogeneous information network. It also presents the newest research in applications of heterogeneous information networks to similarity search, ranking, clustering, recommendation. This information will help researchers to understand how to analyze networked data with heterogeneous information networks. Common data mining tasks are explored, including similarity search, ranking, and recommendation. The book illustrates some prototypes which analyze networked data. Professionals and academics working in data analytics, networks, machine learning, and data mining will find this content valuable. It is also suitable for advanced-level students in computer science who are interested in networking or pattern recognition. .


Book
Privacy-Preserving Data Mining : Models and Algorithms
Authors: ---
ISBN: 1281491713 9786611491710 0387709924 0387709916 Year: 2008 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals. This has caused concerns that personal data may be used for a variety of intrusive or malicious purposes. Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and inference control, query auditing methods, randomization and perturbation-based techniques. This edited volume also contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy. Privacy Preserving Data Mining: Models and Algorithms is designed for researchers, professors, and advanced-level students in computer science. This book is also suitable for practitioners in industry. .

Keywords

Data mining. --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Protection --- Security measures --- Data encryption (Computer science). --- Database management. --- Information storage and retrieva. --- Systems and Data Security. --- Data Mining and Knowledge Discovery. --- Cryptology. --- Database Management. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Information storage and retrieval. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Link Mining: Models, Algorithms, and Applications
Authors: --- ---
ISBN: 1493901478 1441965149 9786612979552 1441965157 1282979558 Year: 2010 Publisher: New York, NY : Springer New York : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the recent flourishing research activities on Web search and mining, social network analysis, information network analysis, information retrieval, link analysis, and structural data mining, research on link mining has been rapidly growing, forming a new field of data mining. Traditional data mining focuses on "flat" or “isolated” data in which each data object is represented as an independent attribute vector. However, many real-world data sets are inter-connected, much richer in structure, involving objects of heterogeneous types and complex links. Hence, the study of link mining will have a high impact in various important applications such as Web and text mining, social network analysis, collaborative filtering, and bioinformatics. Link Mining: Models, Algorithms and Applications focuses on the theory and techniques as well as the related applications for link mining, especially from an interdisciplinary point of view. Due to the high popularity of linkage data, extensive applications ranging from governmental organizations to commercial businesses to people's daily life call for exploring the techniques of mining linkage data. This book provides a comprehensive coverage of the link mining models, techniques and applications. Each chapter is contributed from some well known researchers in the field. Link Mining: Models, Algorithms and Applications is designed for researchers, teachers, and advanced-level students in computer science. This book is also suitable for practitioners in industry.


Book
Machine Learning in Cyber Trust : Security, Privacy, and Reliability
Authors: ---
ISBN: 1441946985 0387887342 9786612126956 1282126954 0387887350 Year: 2009 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms. This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work. Specific features include the following: A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures An empirical study of seven online-learning methods on the task of detecting malicious executables A novel network intrusion detection framework for mining and detecting sequential intrusion patterns A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance An overview of data privacy research, examining the achievements, challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data An approach for assessing the reliability of SOA-based systems using AI reasoning techniques The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Keywords

Algorithms. --- Computer security. --- Cyberterrorism -- Prevention. --- Machine learning. --- Cyberterrorism --- Prevention. --- Learning, Machine --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Data mining. --- Artificial intelligence. --- Computer Science. --- Systems and Data Security. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Data protection --- Security systems --- Hacking --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Informatics --- Science --- Artificial intelligence --- Computer crimes --- Terrorism --- Artificial Intelligence.


Book
Heterogeneous graph representation learning and applications
Authors: --- ---
ISBN: 9811661650 9811661669 Year: 2022 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Privacy-Preserving Data Mining : Models and Algorithms
Authors: ---
ISBN: 9780387709925 Year: 2008 Publisher: Boston, MA Springer Science+Business Media, LLC

Listing 1 - 10 of 58 << page
of 6
>>
Sort by