- Coverage of novel methods for software testing and software quality assurance - Introduction to state-of-the-art data mining models and techniques - Analyses of new and promising application domains of artificial intelligence and data mining in software quality engineering - Contributions from leading authors in the fields of software engineering and data mining.
- Coverage of novel methods for software testing and software quality assurance - Introduction to state-of-the-art data mining models and technique...
This book describes exciting new opportunities for utilizing robust graph representations of data with common machine learning algorithms. Graphs can model additional information which is often not present in commonly used data representations, such as vectors. Through the use of graph distance -- a relatively new approach for determining graph similarity -- the authors show how well-known algorithms, such as k-means clustering and k-nearest neighbors classification, can be easily extended to work with graphs instead of vectors. This allows for the utilization of additional information found...
This book describes exciting new opportunities for utilizing robust graph representations of data with common machine learning algorithms. Graphs can ...
As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack...
As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propagan...
A sharp increase in the computing power of modern computers has triggered the development of powerful algorithms that can analyze complex patterns in large amounts of data within a short time period. Consequently, it has become possible to apply pattern recognition techniques to new tasks. The main goal of this book is to cover some of the latest application domains of pattern recognition while presenting novel techniques that have been developed or customized in those domains.
A sharp increase in the computing power of modern computers has triggered the development of powerful algorithms that can analyze complex patterns ...
Today, in the middle of the ?rst decade of the 21st century, the Internet has become a major communication medium, where virtually any kind of content can be transferred instantly and reliably between individual users and entire - ganizations located in any part of the globe. The World Wide Web (WWW) has a tremendous e?ect on our daily activities at work and at home. Consequently, more e?ective and e?cient methods and technologies are needed to make the most of the Web's nearly unlimited potential. The new Web-related research directions include intelligent methods usually associated with the...
Today, in the middle of the ?rst decade of the 21st century, the Internet has become a major communication medium, where virtually any kind of content...
Graph theory has strong historical roots in mathematics, especially in topology. Its birth is usually associated with the "four-color problem" posed by Francis Guthrie 1 in 1852, but its real origin probably goes back to the Seven Bridges of Konigsber ] g 2 problem proved by Leonhard Euler in 1736. A computational solution to these two completely different problems could be found after each problem was abstracted to the level of a graph model while ignoring such irrelevant details as country shapes or cross-river distances. In general, a graph is a nonempty set of points (vertices) and the...
Graph theory has strong historical roots in mathematics, especially in topology. Its birth is usually associated with the "four-color problem" posed b...
An examination of state-of-the-art methodology for mining time series databases. The data mining methods presented include techniques for efficient segmentation, indexing, and classification of noisy and dynamic time series. A graph-based method for anomaly detection in time series is described.
An examination of state-of-the-art methodology for mining time series databases. The data mining methods presented include techniques for efficient se...
Many business decisions are made in the absence of complete information about the decision consequences. Credit lines are approved without knowing the future behavior of the customers; stocks are bought and sold without knowing their future prices; parts are manufactured without knowing all the factors affecting their final quality; etc. All these cases can be categorized as decision making under uncertainty. Decision makers (human or automated) can handle uncertainty in different ways. Deferring the decision due to the lack of sufficient information may not be an option, especially in...
Many business decisions are made in the absence of complete information about the decision consequences. Credit lines are approved without knowing the...
Graph theory has strong historical roots in mathematics, especially in topology. Its birth is usually associated with the "four-color problem" posed by Francis Guthrie 1 in 1852, but its real origin probably goes back to the Seven Bridges of Konigsber ] g 2 problem proved by Leonhard Euler in 1736. A computational solution to these two completely different problems could be found after each problem was abstracted to the level of a graph model while ignoring such irrelevant details as country shapes or cross-river distances. In general, a graph is a nonempty set of points (vertices) and the...
Graph theory has strong historical roots in mathematics, especially in topology. Its birth is usually associated with the "four-color problem" posed b...