|
|
|
|
LEADER |
05679nam a22004575i 4500 |
001 |
000283990 |
005 |
20210813100349.0 |
007 |
cr nn 008mamaa |
008 |
171229s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319712468
|
024 |
7 |
|
|a 10.1007/978-3-319-71246-8
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Machine Learning and Knowledge Discovery in Databases :
|b European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18–22, 2017, Proceedings, Part II /
|c edited by Michelangelo Ceci, Jaakko Hollmén, Ljupčo Todorovski, Celine Vens, Sašo Džeroski.
|
250 |
|
|
|a 1st ed. 2017.
|
260 |
# |
# |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XXXIII, 866 p. 213 illus. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Artificial Intelligence ;
|v 10535
|
505 |
0 |
|
|a Pattern and Sequence Mining -- BeatLex: Summarizing and Forecasting Time Series with Patterns -- Behavioral Constraint Template-Based Sequence Classification -- Efficient Sequence Regression by Learning Linear Models in All-Subsequence Space -- Subjectively Interesting Connecting Trees -- Privacy and Security -- Malware Detection by Analysing Encrypted Network Traffic with Neural Networks -- PEM: Practical Differentially Private System for Large-Scale Cross-Institutional Data Mining -- Probabilistic Models and Methods -- Bayesian Heatmaps: Probabilistic Classification with Multiple Unreliable Information Sources -- Bayesian Inference for Least Squares Temporal Difference Regularization -- Discovery of Causal Models that Contain Latent Variables through Bayesian Scoring of Independence Constraints -- Labeled DBN learning with community structure knowledge -- Multi-view Generative Adversarial Networks -- Online Sparse Collapsed Hybrid Variational-Gibbs Algorithm for Hierarchical Dirichlet Process Topic Models -- PAC-Bayesian Analysis for a two-step Hierarchical Multiview Learning Approach -- Partial Device Fingerprints -- Robust Multi-view Topic Modeling by Incorporating Detecting Anomalies -- Recommendation -- A Regularization Method with Inference of Trust and Distrust in Recommender Systems -- A Unified Contextual Bandit Framework for Long- and Short-Term Recommendations -- Perceiving the Next Choice with Comprehensive Transaction Embeddings for Online Recommendation -- Regression -- Adaptive Skip-Train Structured Regression for Temporal Networks -- ALADIN: A New Approach for Drug-Target Interaction Prediction -- Co-Regularised Support Vector Regression -- Online Regression with Controlled Label Noise Rate -- Reinforcement Learning -- Generalized Inverse Reinforcement Learning with Linearly Solvable MDP -- Max K-armed bandit: On the ExtremeHunter algorithm and beyond -- Variational Thompson Sampling for Relational Recurrent Bandits -- Subgroup Discovery -- Explaining Deviating Subsets through Explanation Networks -- Flash points: Discovering exceptional pairwise behaviors in vote or rating data -- Time Series and Streams -- A Multiscale Bezier-Representation for Time Series that Supports Elastic Matching -- Arbitrated Ensemble for Time Series Forecasting -- Cost Sensitive Time-series Classification -- Cost-Sensitive Perceptron Decision Trees for Imbalanced Drifting Data Streams -- Efficient Temporal Kernels between Feature Sets for Time Series Classification -- Forecasting and Granger modelling with non-linear dynamical dependencies -- Learning TSK Fuzzy Rules from Data Streams -- Non-Parametric Online AUC Maximization -- On-line Dynamic Time Warping for Streaming Time Series -- PowerCast: Mining and Forecasting Power Grid Sequences -- UAPD: Predicting Urban Anomalies from Spatial-Temporal Data -- Transfer and Multi-Task Learning -- A Novel Rating Pattern Transfer Model for Improving Non-Overlapping Cross-Domain Collaborative Filtering -- Distributed Multi-task Learning for Sensor Network -- Learning task structure via sparsity grouped multitask learning -- Lifelong Learning with Gaussian Processes -- Personalized Tag Recommendation for Images Using Deep Transfer Learning -- Ranking based Multitask Learning of Scoring Functions -- Theoretical Analysis of Domain Adaptation with Optimal Transport -- TSP: Learning Task-Speci_c Pivots for Unsupervised Domain Adaptation -- Unsupervised and Semisupervised Learning -- k2-means for fast and accurate large scale clustering -- A Simple Exponential Family Framework for Zero-Shot Learning -- DeepCluster: A General Clustering Framework based on Deep Learning -- Multi-view Spectral Clustering on Conflicting Views -- Pivot-based Distributed K-Nearest Neighbor Mining.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Optical data processing.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Artificial Intelligence.
|
650 |
2 |
4 |
|a Image Processing and Computer Vision.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computing Milieux.
|
700 |
1 |
|
|a Ceci, Michelangelo.
|e editor.
|0 (orcid)0000-0002-6690-7583
|1 https://orcid.org/0000-0002-6690-7583
|
700 |
1 |
|
|a Hollmén, Jaakko.
|e editor.
|
700 |
1 |
|
|a Todorovski, Ljupčo.
|e editor.
|
700 |
1 |
|
|a Vens, Celine.
|e editor.
|
700 |
1 |
|
|a Džeroski, Sašo.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
900 |
|
|
|a Libro descargado a ALEPH en bloque (proveniente de proveedor)
|