"computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" OR "artificial intelligence"

Google Scholar
3,820,000 results  

"computer science" OR "information science" OR "computer programming" OR informatics OR
"data management" OR "information security" OR "network security" OR forensics OR
"visual computing" OR "data mining" OR "machine learning" OR "multimedia databases"

Content Sample

Genetic algorithms and machine learning

DE Goldberg, JH Holland - Machine learning, 1988 - Springer

There is no a priori reason why machine learning must borrow from nature. A field could 
exist, complete with well-defined algorithms, data structures, and theories of learning, 
without once referring to organisms, cognitive or genetic structures, and psychological or 

  Cited by 1427 Related articles All 8 versions


An introduction to MCMC for machine learning

C AndrieuN De FreitasA DoucetMI Jordan - Machine learning, 2003 - Springer

Abstract This purpose of this introductory paper is threefold. First, it introduces the Monte 
Carlo method with emphasis on probabilistic 
machine learning. Second, it reviews the main 
building blocks of modern Markov chain Monte Carlo simulation, thereby providing and 

  Cited by 1766 Related articles All 66 versions


Machine learning for the detection of oil spills in satellite radar images

M Kubat, RC HolteS Matwin - Machine learning, 1998 - Springer

Abstract During a project examining the use of machine learning techniques for oil spill 
detection, we encountered several essential questions that we believe deserve the attention 
of the research community. We use our particular case study to illustrate such issues as 

  Cited by 980 Related articles All 27 versions


[HTML] Research electronic data capture (REDCap)—a metadata-driven methodology and workflow process for providing translational research informatics support

PA Harris, R Taylor, R Thielke, J Payne… - … of biomedical informatics, 2009 - Elsevier

Research electronic data capture (REDCap) is a novel workflow methodology and software 
solution designed for rapid development and deployment of electronic data capture tools to 
support clinical and translational research. We present:(1) a brief description of the REDCap 

  Cited by 5562 Related articles All 16 versions


[BOOK] Data mining: concepts and techniques

J HanJ Pei, M Kamber - 2011 -

Data Mining: Concepts and Techniques provides the concepts and techniques in processing 
gathered data or information, which will be used in various applications. Specifically, it 
data mining and the tools used in discovering knowledge from the collected data. 

  Cited by 37250 Related articles All 99 versions 


[BOOK] Data Mining: Practical machine learning tools and techniques

IH WittenE FrankMA HallCJ Pal - 2016 -

Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a 
thorough grounding in 
machine learning concepts, along with practical advice on applying 
these tools and techniques in real-world 
data mining situations. This highly anticipated 

  Cited by 31650 Related articles All 31 versions 


[HTML] UCI machine learning repository

A Asuncion, D Newman - 2007 -

I'll round out the end of my ISIT blogging with very brief takes on a few more papers. I took it 
pretty casually this year in terms of note taking, and while I attended many more talks, my 
notes for most of them consist of a title and a star next to the ones where I want to look at the 

  Cited by 3679 Related articles All 4 versions 


[BOOK] How we became posthuman: Virtual bodies in cybernetics, literature, and informatics

NK Hayles - 2008 -

In this age of DNA computers and artificial intelligence, information is becoming 
disembodied even as the" bodies" that once carried it vanish into virtuality. While some 
marvel at these changes, envisioning consciousness downloaded into a computer or 

  Cited by 6465 Related articles All 26 versions 


[BOOK] Algorithms on strings, trees and sequences: computer science and computational biology

D Gusfield - 1997 -

String algorithms are a traditional area of study in computer science. In recent years their 
importance has grown dramatically with the huge increase of electronically stored text and of 
molecular sequence data (DNA or protein sequences) produced by various genome 

  Cited by 6277 Related articles All 13 versions 


The Gene Ontology (GO) database and informatics resource

Gene Ontology Consortium - Nucleic acids research, 2004 - Oxford Univ Press

Abstract The Gene Ontology (GO) project (http://www. geneontology. org/) provides 
structured, controlled vocabularies and classifications that cover several domains of 
molecular and cellular biology and are freely available for community use in the annotation 

  Cited by 2795 Related articles All 11 versions













 [BOOK] Data mining techniques: for marketing, sales, and customer support

MJ Berry, G Linoff - 1997 -

Data Mining Techniques thoroughly acquaints you with the new generation of data mining 
tools and techniques and shows you how to use them to make better business decisions. 
One of the first practical guides to mining business data, it describes techniques for detecting 

  Cited by 2793 Related articles All 3 versions 


NHECD-Nano health and environmental commented database

O Maimon, A Browarnik - Data mining and knowledge discovery …, 2009 - Springer

Summary The impact of nanoparticles on health and the environment is a significant 
research subject, driving increasing interest from the scientific community, regulatory bodies 
and the general public. We present a smart repository system with text and 
data mining for 

  Cited by 1240 Related articles All 17 versions 


[BOOK] Pattern recognition and machine learning

CM Bishop - 2006 -

1.2 Probability Theory . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.2.1 Probabilitydensities . . . . . . . . . . . 
. . . . . . . . . . 17 1.2.2 Expectationsand covariances . . . . . . . . . . . . . . . . 19 1.2.3 Bayesianprobabilities 
. . . . . . . . . . . . . . . . . . . . 21 1.2.4 The Gaussian distribution . . . . . . . . . . . . . . . . . . 24 1.2.5 

  Cited by 26646 Related articles All 26 versions 

[BOOK] Advances in knowledge discovery and data mining

UM Fayyad, G Piatetsky-Shapiro, P Smyth… - 1996 -

Page 1. Advances in Knowledge Discovery and Data Mining Edited by Usama M. Fayyad Jet
Propulsion Laboratory, California Institute of Technology Gregory Piatetsky-Shapiro GTE
Laboratories Incorporated Padhraic Smyth Jet Propulsion Laboratory, California Institute of

  Cited by 5253 Related articles All 4 versions 


Scikit-learn: Machine learning in Python

F PedregosaG VaroquauxA Gramfort… - … of Machine Learning …, 2011 -

Abstract Scikit-learn is a Python module integrating a wide range of state-of-the-art machine 
learning algorithms for medium-scale supervised and unsupervised problems. This package 
focuses on bringing 
machine learning to non-specialists using a general-purpose high-level 

  Cited by 7081 Related articles All 28 versions


The WEKA data mining software: an update

M HallE FrankG HolmesB Pfahringer… - ACM SIGKDD …, 2009 -

Abstract More than twelve years have elapsed since the first public release of WEKA. In that 
time, the software has been rewritten entirely from scratch, evolved substantially and now 
accompanies a text on 
data mining [35]. These days, WEKA enjoys widespread acceptance 

  Cited by 15214 Related articles All 20 versions 

Data Mining

WMP Van der Aalst - Process Mining, 2011 - Springer

Abstract Process mining builds on two pillars:(a) process modeling and analysis (as 
described in Chap. 2) and (b) 
data mining. This chapter introduces some basic data mining 
approaches and structures the field. The motivation for doing so is twofold. On the one hand, 

  Cited by 1983 Related articles All 15 versions 


[PDF] Data Mining: Concepts and Techniques

WID Mining - Morgan Kaufinann, 2006 -

Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign ©2006 Jiawei Han and Micheline Kamber, All rights reserved 
... October 
22, 2007 
Data Mining: Concepts and Techniques 2 ... October 22, 2007 Data Mining: Concepts 

  Cited by 257 Related articles All 9 versions 


Theoretical and empirical analysis of ReliefF and RReliefF

M Robnik-Šikonja, I Kononenko - Machine learning, 2003 -

Abstract Relief algorithms are general and successful attribute estimators. They are able to 
detect conditional dependencies between attributes and provide a unified view on the 
attribute estimation in regression and classification. In addition, their quality estimates have 

  Cited by 1497 Related articles All 20 versions


Machine learning in automated text categorization

F Sebastiani - ACM computing surveys (CSUR), 2002 -

Abstract The automated categorization (or classification) of texts into predefined categories 
has witnessed a booming interest in the last 10 years, due to the increased availability of 
documents in digital form and the ensuing need to organize them. In the research 

  Cited by 8237 Related articles All 99 versions


[BOOK] Gaussian processes for machine learning

CE RasmussenCKI Williams - 2006 -

abstract={Gaussian processes (GPs) provide a principled, practical, probabilistic approach 
to learning in kernel machines. GPs have received increased attention in the 
learning community over the past decade, and this book provides a long-needed systematic 

  Cited by 10049 Related articles All 13 versions 


Learnable evolution model: Evolutionary processes guided by machine learning

RS Michalski - Machine Learning, 2000 - Springer

A new class of evolutionary computation processes is presented, called Learnable Evolution 
Model or LEM. In contrast to Darwinian-type evolution that relies on mutation, recombination, 
and selection operators, LEM employs 
machine learning to generate new populations. 

  Cited by 235 Related articles All 15 versions


[HTML] High-throughput functional annotation and data mining with the Blast2GO suite

S GötzJM García-GómezJ Terol… - Nucleic acids …, 2008 -

Abstract Functional genomics technologies have been widely adopted in the biological 
research of both model and non-model species. An efficient functional annotation of DNA or 
protein sequences is a major requirement for the successful application of these approaches 

  Cited by 1497 Related articles All 25 versions


From data mining to knowledge discovery in databases

U Fayyad, G Piatetsky-Shapiro, P Smyth - AI magazine, 1996 -

Abstract Data mining and knowledge discovery in databases have been attracting a 
significant amount of research, industry, and media attention of late. What is all the 
excitement about? This article provides an overview of this emerging field, clarifying how 

  Cited by 9152 Related articles All 75 versions 


Experimental evaluation in computer science: A quantitative study

WF TichyP LukowiczL Prechelt, EA Heinz - Journal of Systems and …, 1995 - Elsevier

A survey of 400 recent research articles suggests that computer scientists publish relatively 
few papers with experimentally validated results. The survey includes complete volumes of 
several refereed 
computer science journals, a conference, and 50 titles drawn at random 

  Cited by 370 Related articles All 45 versions

[BOOK] Bioinformatics: the machine learning approach

P BaldiS Brunak - 2001 -

An unprecedented wealth of data is being generated by genome sequencing projects and 
other experimental efforts to determine the structure and function of biological molecules. 
The demands and opportunities for interpreting these data are expanding rapidly. 

  Cited by 1679 Related articles All 12 versions 


[BOOK] The art of computer programming: sorting and searching

DE Knuth - 1998 -

The bible of all fundamental algorithms and the work that taught many of today's software 
developers most of what they know about 
computer programming.-Byte, September 1995 I 
can't begin to tell you how many pleasurable hours of study and recreation they have 

  Cited by 42397 Related articles All 38 versions 

[BOOK] C4. 5: programs for machine learning

JR Quinlan - 2014 -

Classifier systems play a major role in machine learning and knowledge-based systems, 
and Ross Quinlan's work on ID3 and C4. 5 is widely acknowledged to have made some of 
the most significant contributions to their development. This book is a complete guide to the 

  Cited by 31882 Related articles All 9 versions 


C4. 5: Programs for machine learning 
by j. ross quinlan. morgan kaufmann publishers, inc., 1993

SL Salzberg - Machine Learning, 1994 - Springer

Algorithms for constructing decision trees are among the most well known and widely used 
of all 
machine learning methods. Among decision tree algorithms, J. Ross Quinlan's ID3 and 
its successor, C4. 5, are probably the most popular in the 
machine learning community. 

  Cited by 197 Related articles All 10 versions


[CITATION] Introduction to data mining

PN Tan - 2006 - Pearson Education India

  Cited by 9552 Related articles All 36 versions 

Thumbs up?: sentiment classification using machine learning techniques

B PangL Lee, S Vaithyanathan - … of the ACL-02 conference on …, 2002 -

Abstract We consider the problem of classifying documents not by topic, but by overall 
sentiment, eg, determining whether a review is positive or negative. Using movie reviews as 
data, we find that standard 
machine learning techniques definitively outperform human-

  Cited by 6580 Related articles All 54 versions

The data warehouse and data mining

WH Inmon - Communications of the ACM, 1996 -

Abstract: Data mining processes are directly related to data warehouses in the sense that 
warehouses allow an easier and more complete processing of information. Data 
warehouses include several important elements that may improve chances for success. 

  Cited by 339 Related articles All 6 versions


[BOOK] Biomedical informatics:
computer applications in health care and biomedicine

EH ShortliffeJJ Cimino - 2013 -

The practice of modern medicine and biomedical research requires sophisticated 
information technologies with which to manage patient information, plan diagnostic 
procedures, interpret laboratory results, and carry out investigations. Biomedical 

  Cited by 1299 Related articles All 26 versions 


Challenges in ubiquitous data management

MJ Franklin - Informatics, 2001 - Springer

Abstract. Ubiquitous computing is a compelling vision for the future that is moving closer to 
realization at an accelerating pace. The combination of global wireless and wired 
connectivity along with increasingly small and powerful devices enables a wide array of new 

  Cited by 85 Related articles All 23 versions


An axiomatic basis for computer programming

CAR Hoare - Communications of the ACM, 1969 -

Abstract In this paper an attempt is made to explore the logical foundations of computer 
programming by use of techniques which were first applied in the study of geometry and 
have later been extended to other branches of mathematics. This involves the elucidation of 

  Cited by 6831 Related articles All 115 versions 


[HTML] Recent advances: Consumer health informatics

G Eysenbach - BMJ: British Medical Journal, 2000 -

Methods This non-exhaustive review focuses on topics from the field of consumer health 
informatics because there has been a markedly increased interest in this field (additional 
information is available on the BMJ's website). Medline was searched using the terms 

  Cited by 837 Related articles All 22 versions

[BOOK] Feature extraction, construction and selection:
data mining perspective

H LiuH Motoda - 1998 -

There is broad interest in feature extraction, construction, and selection among practitioners 
from statistics, pattern recognition, and 
data mining to machine learning. Data preprocessing 
is an essential step in the knowledge discovery process for real-world applications. This 

  Cited by 877 Related articles All 4 versions 


[HTML] A reference ontology for biomedical informatics:
the Foundational Model of Anatomy

C Rosse, JLV Mejino - Journal of biomedical informatics, 2003 - Elsevier

The Foundational Model of Anatomy (FMA), initially developed as an enhancement of the 
anatomical content of UMLS, is a domain ontology of the concepts and relationships that 
pertain to the structural organization of the human body. It encompasses the material objects 

  Cited by 1182 Related articles All 16 versions


[CITATION] Cryptography and network security: principles and practices

W Stallings - 2006 - Pearson Education India

  Cited by 8012 Related articles All 71 versions 


Digital game-based learning in high school computer science education:
Impact on educational effectiveness and student motivation

M Papastergiou - Computers & Education, 2009 - Elsevier

The aim of this study was to assess the learning effectiveness and motivational appeal of a 
computer game for learning computer memory concepts, which was designed according to 
the curricular objectives and the subject matter of the Greek high school 
Computer Science 

  Cited by 1119 Related articles All 8 versions


machine learning approach to coreference resolution of noun phrases

WM Soon, HT Ng, DCY Lim - Computational linguistics, 2001 - MIT Press

In this paper, we present a learning approach to coreference resolution of noun phrases in 
unrestricted text. The approach learns from a small, annotated corpus and the task includes 
resolving not just a certain type of noun phrase (eg, pronouns) but rather general noun 

  Cited by 1031 Related articles All 34 versions


Data mining with big data

X WuX Zhu, GQ Wu, W Ding - IEEE transactions on …, 2014 -

Abstract: Big Data concern large-volume, complex, growing data sets with multiple, 
autonomous sources. With the fast development of networking, data storage, and the data 
collection capacity, Big Data are now rapidly expanding in all science and engineering 

  Cited by 1175 Related articles All 12 versions


The security of machine learning

M Barreno, B Nelson, AD Joseph, JD Tygar - Machine Learning, 2010 - Springer

Abstract Machine learning's ability to rapidly evolve to changing and complex situations has 
helped it become a fundamental tool for computer security. That adaptability is also a 
vulnerability: attackers can exploit 
machine learning systems. We present a taxonomy 

  Cited by 206 Related articles All 30 versions


Improving Markov chain Monte Carlo model search for data mining

P GiudiciR Castelo - Machine learning, 2003 - Springer

Abstract The motivation of this paper is the application of MCMC model scoring procedures 
data mining problems, involving a large number of competing models and other relevant 
model choice aspects. To achieve this aim we analyze one of the most popular Markov 

  Cited by 184 Related articles All 11 versions


[BOOK] Community Informatics: Enabling Communities with Information
and Communications Technologies: Enabling Communities with Information and …

M Gurstein - 1999 -

Community Informatics is developing as an approach for linking economic and social 
development efforts at the community level to the opportunities that information and 
communication's technologies present. Areas such as SMEs and electronic commerce, 

  Cited by 596 Related articles All 22 versions 


Relevance: A review of and a framework
for the thinking on the notion in 
information science

T Saracevic - Journal of the Association for Information Science …, 1975 - Wiley Online Library

Abstract Information science emerged as the third subject, along with logic and philosophy, 
to deal with relevance-an elusive, human notion. The concern with relevance, as a key 
notion in 
information science, is traced to the problems of scientific communication. 

  Cited by 990 Related articles All 10 versions

Machine learning, neural and statistical classification

D Michie, DJ SpiegelhalterCC Taylor - 1994 - Citeseer

CiteSeerX logo. Documents: Advanced Search Include Citations. Authors: Advanced Search
Include Citations. Tables: 
Machine Learning, Neural and Statistical Classification (1994). ... BibTeX.
@MISC{Michie94machinelearning,, author = {D. Michie and DJ Spiegelhalter and CC Taylor},

  Cited by 3228 Related articles All 7 versions 


[CITATION] Concrete mathematics: a foundation for computer science

RL Graham - 1994 - Pearson Education India

  Cited by 7090 Related articles All 16 versions 

[CITATION] Network security: private communication in a public world

R Perlman, C Kaufman, M Speciner - 2016 - Pearson Education India

  Cited by 1417 Related articles All 6 versions 


[HTML] Selection of relevant features and examples in machine learning

AL BlumP Langley - Artificial intelligence, 1997 - Elsevier

In this survey, we review work in machine learning on methods for handling data sets 
containing large amounts of irrelevant information. We focus on two key issues: the problem 
of selecting relevant features, and the problem of selecting relevant examples. We describe 

  Cited by 2900 Related articles All 39 versions




11,600 results

"computer science" OR "information science" OR
"computer programming" OR informatics OR
"data management" OR "information security" OR
"network security" OR forensics OR "visual computing"
OR "data mining" OR "machine learning" OR "multimedia databases"


Marzano v. Computer Science Corp. Inc.

91 F. 3d 497 - Court of Appeals, 3rd Circuit, 1996 - Google Scholar

Even by the standards of the acrimonious world of litigation, there is little in this case about which 
the parties agree. They agree that appellant, Catherine Marzano, was hired by one of the 
Computer Science Corp., in September 1990; that she went on maternity leave in 

  Cited by 255 How cited Related articles

Allied Informatics, Inc. v. Yeruva

554 SE 2d 550, 251 Ga. App. 404 - Ga: Court of Appeals, 2001 - Google Scholar

2. TERMS—If EMPLOYEE voluntarily terminate[s] his/her services during continuity of 
project, he/she shall owe Allied the sum of 5,000 dollars as liquidated damages for time and 
money spent by [A]llied to procure and start the project. If EMPLOYEE voluntarily terminates 

  Cited by 17 How cited Related articles

Data Informatics, Inc. v. Amerisource Partners

768 A. 2d 210, 338 NJ Super. 61 - NJ: Appellate Div., 2001 - Google Scholar

The underlying facts presented by the parties on the motions for summary judgment were not 
in significant dispute. Plaintiff, a Delaware Corporation with its principal place of business in 
Delaware, maintains "an office" in New Jersey. AmeriSOURCE is a "computer consulting 

  Cited by 17 How cited Related articles

Data Management, Inc. v. Greene

757 P. 2d 62 - Alaska: Supreme Court, 1988 - Google Scholar

The first approach is to hold that a covenant which is overbroad, and hence unconscionable, 
will not be enforced. This strict view was adopted by Arkansas in Rector-Phillips-Morse, Inc. 
v. Vroman, 253 Ark. 750, 489 SW2d 1 (1973). In that case, the court held that a three year covenant 

  Cited by 86 How cited Related articles

Informatics Applications Group, Inc. v. Shkolnikov

836 F. Supp. 2d 400 - Dist. Court, ED Virginia, 2011 - Google Scholar

TIAG develops and delivers information technology services and products to the federal government 
and the private sector. (Amended Complaint [Dkt. 19] ("Am. Compl.") ¶¶ 1, 11.) Shkolnikov was 
employed by TIAG from March 1, 2002 until his employment was terminated on March 17, 

  Cited by 16 How cited Related articles All 2 versions

Buffler v. Electronic Computer Programming Inst., Inc.

466 F. 2d 694 - Court of Appeals, 6th Circuit, 1972 - Google Scholar

In a letter dated September 17, 1971, the president of ECPI informed Buffler that the franchise 
agreements between the parties had expired and that these agreements were terminated as 
of October 8, 1971. Apparently in the same letter, Buffler was advised that it owed ECPI $38,450.77 

  Cited by 59 How cited Related articles

Vegesina v. Allied Informatics, Inc.

572 SE 2d 51, 257 Ga. App. 693 - Ga: Court of Appeals, 2002 - Google Scholar

Following a bench trial, Ravikanth Vegesina appeals from the trial court's order finding that he 
breached an employment agreement with Allied 
Informatics, Inc. ("Allied"), and denying his counterclaim 
for alleged violations of federal law. He claims on appeal that (1) the trial court erred by failing 

  Cited by 9 How cited Related articles


97 A. 3d 1233 - Pa: Superior Court, 2014 - Google Scholar

[Plaintiffs] filed a complaint on May 7, 2012 arising from the embezzlement of funds by Defendant 
Mark Zampelli (Zampelli). On June 19, 2012, Plaintiffs filed an amended complaint. In the amended 
complaint, Plaintiffs allege conversion and fraud against Zampelli, negligence and fraud against 

  Cited by 12 How cited Related articles All 2 versions


274 AD 2d 516, 715 NYS 2d 414 - NY: Appellate Div., 2nd Dept., 2000 - Google Scholar

The instant proceedings arose as a result of an acrimonious pending matrimonial action between 
Vladimir Yakovlevich Ostashko and Tanya Ostashko. Pursuant to a pendente lite order dated 
December 21, 1998, Tanya was awarded temporary exclusive use and occupancy of the 

  Cited by 11 How cited Related articles


458 F. Supp. 2d 716 - Dist. Court, ND Indiana, 2006 - Google Scholar

This matter is before the court on the "Motion to Dismiss All Defamation Claims Against Medical 
Informatics Engineering, Inc. and Doug Horner" filed by Plaintiff/Counterclaim Defendant Medical 
Informatics Engineering, Inc. ("MIE") and Third Party Defendant Doug Horner ("Horner") on July 

  Cited by 9 How cited Related articles













Google Books
4,860,000 results 

Content Sample

Forensics: What Bugs, Burns, Prints, DNA and More Tell Us About Crime
Val McDermid is one of the finest crime writers we have, whose novels have captivated millions of readers worldwide with their riveting narratives of characters who solve complex crimes and confront unimaginable evil.

Information Science
The book contains vivid examples, illustrations, exercises, and points of historic interest, all of which bring to life the analytic methods presented: Presents a unified approach to the field of information science Emphasizes basic ...

Python Machine Learning
Unlock deeper insights into Machine Leaning with this vital guide to cutting-edge predictive analytics About This Book Leverage Python's most powerful open-source libraries for deep learning, data wrangling, and data visualization Learn ...

The Book of Informatics
These and many other applications of informatics in traditional disciplines are becoming more important as IT/IS becomes fully mainstreamed. This book is also a response to developments in IT/IS curricula in Australia and internationally.

Data Mining Techniques: For Marketing, Sales, and Customer ...
Many companies have invested in building large databases and data warehouses capable of storing vast amounts of information. This book offers business, sales and marketing managers a practical guide to accessing such information.

Artificial Intelligence
Kevin Knight - 1991 - ‎Snippet view - ‎More editions
This text explores the range of problems which have been and remain to be solved using A. I. tools and techniques. The second half of this text is an excellent reference.

Data Mining: Practical Machine Learning Tools and Techniques
The book is targeted at information systems practitioners, programmers, consultants, developers, information technology managers, specification writers, data analysts, data modelers, database R&D professionals, data warehouse engineers, ...

Machine Learning: A Multistrategy Approach
Ryszard S. Michalski, ‎Ryszard Stanisław Michalski, ‎Gheorghe Tecuci - 1994 - ‎Preview - ‎More editions
This volume is the first book in this fast growing field. It contains a selection of contributions by leading researchers specializing in this area. See below for earlier volumes in the series.

Data Mining and Analysis: Fundamental Concepts and Algorithms
A comprehensive overview of data mining from an algorithmic perspective, integrating related concepts from machine learning and statistics.

Principles of Data Mining
Measuremente and Data.

Search Results

Principles of Data Mining
Measuremente and Data.

AP Computer Science A
Provides diagnostic tools to assess strengths and weaknesses, explains the current Level A test and the elimination of the Level AB, offers subject reviews on static variables and other topics, and includes three practice tests.

Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available.

The Pharmacy Informatics Primer
Doina Dumitru - 2008 - ‎Preview - ‎More editions
This introductory resource outlines key concepts in understanding, developing, implementing, and maintaining clinical information and automation systems.This essential guide is designed for all pharmacists and covers an introduction to ...

Computer Forensics
Updated to include the most current events and information on cyberterrorism, the second edition of Computer Forensics: Cybercriminals, Laws, and Evidence continues to balance technicality and legal analysis as it enters into the world of ...

The Master Algorithm: How the Quest for the Ultimate Learning ...
He assembles a blueprint for the future universal learner-the Master Algorithm-and discusses what it will mean for business, science, and society. If data-ism is today's philosophy, this book is its bible.

Milestones in Computer Science and Information Technology
Contains over 650 entries detailing the evolution of computing, including companies, machines, developments, inventions, parts, languages, and theories.

Human Factors for Informatics Usability
B. Shackel, ‎S. J. Richardson - 1991 - ‎Preview - ‎More editions
Objectives are to review knowledge available to improve the usability of information systems; to present recent theoretical and methodological developments; to stimulate application of these developments.

Practical Imaging Informatics: Foundations and Applications for PACS ...
Society for Imaging - 2009 - ‎Preview - ‎More editions
Practical Imaging Informatics describes the foundations of information technology and clinical image management, details typical daily operations, and discusses rarer complications and issues.

Data Mining: Concepts and Techniques
Jiawei Han, ‎Micheline Kamber - 2001 - ‎No preview - ‎More editions
Data warehouse and OLAP technology for data mining. Data preprocessing. Data mining primitives, languages, and system architecture. Concept description: characterization and comparison. Mining association rules in large databases.

Data Mining: Concepts and Techniques
Jiawei Han, ‎Micheline Kamber - 2001 - ‎No preview - ‎More editions
Data warehouse and OLAP technology for data mining. Data preprocessing. Data mining primitives, languages, and system architecture. Concept description: characterization and comparison. Mining association rules in large databases.

Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource ...

Data Mining, Southeast Asia Edition
Like the first edition, voted the most popular data mining book by KD Nuggets readers, this book explores concepts and techniques for the discovery of patterns hidden in large data sets, focusing on issues relating to their feasibility, ...

Food Forensics: The Hidden Toxins Lurking in Your Food and How You ...
Mike Adams - 2016 - ‎Preview - ‎More editions
Food Forensics discloses how food contamination happens and why it matters, and provides valuable information on how you can protect yourself. If the FDA and the USDA won't safeguard us from food contamination, the Health Ranger will.

Superintelligence: Paths, Dangers, Strategies
Read the book and learn about oracles, genies, singletons; about boxing methods, tripwires, and mind crime; about humanity's cosmic endowment and differential technological development; indirect normativity, instrumental convergence, whole ...

Machine Learning: An Algorithmic Perspective
Written in an easily accessible style, this book bridges the gaps between disciplines, providing the ideal blend of theory and practical, applicable knowledge.

Artificial Intelligence for Games
Creating robust artificial intelligence is one of the greatest challenges for game developers, yet the commercial success of a game is often dependent upon the quality of the AI. In this book, Ian Millington brings extensive professional ...

Introduction to Machine Learning
An introductory text in machine learning that gives a unified treatment of methods based on statistics, pattern recognition, neural networks, artificial intelligence, signal processing, control, and data mining.

Computer Forensics: Investigating Network Intrusions and Cyber Crime
EC-Council - 2009 - ‎Preview - ‎More editions
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal.

Oncology Informatics: Using Health Information Technology to Improve ...
This book is a formational guide for turning clinical systems into engines of discovery as well as a translational guide for moving evidence into practice.

Computer Forensics: Investigating Network Intrusions and Cyber Crime
EC-Council - 2009 - ‎Preview - ‎More editions
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal.

Oncology Informatics: Using Health Information Technology to Improve ...
This book is a formational guide for turning clinical systems into engines of discovery as well as a translational guide for moving evidence into practice.

Information Science 101
With this text, author Anthony Debons, one of the early founders of the discipline of Information Science, gives attention to the role of various disciplines in the field: library/documentation, tele-transmission, computer science and ...

Network Security: Private Communication in a Public World
The classic guide to network security—now fully updated!

Android Forensics: Investigation, Analysis, and Mobile Security for ...
Andrew Hoog - 2011 - ‎Preview - ‎More editions
This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, data storage and other low ...

Machine Learning: A Bayesian and Optimization Perspective
This tutorial text gives a unifying perspective on machine learning by covering both probabilistic and deterministic approaches -which are based on optimization techniques – together with the Bayesian inference approach, whose essence ...

Handbook of Theoretical Computer Science - Volume 1
Jan Leeuwen - 1990 - ‎Preview - ‎More editions
This first part presents chapters on models of computation, complexity theory, data structures, and efficient computation in many recognized sub-disciplines of Theoretical Computer Science.

Applied Information Security: A Hands-on Approach
This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software.

Machine Learning: The New AI
"A concise overview of machine learning, a type of artificial intelligence that enables computers to learn from large data sets and is the basis of numerous developments, from speech recognition to driverless cars.

Paradigms of Artificial Intelligence Programming: Case Studies in ...
This volume is an excellent text for a course on AI programming, a useful supplement for general AI courses and an indispensable reference for the professional programmer.

Paradigms of Artificial Intelligence Programming: Case Studies in ...
This volume is an excellent text for a course on AI programming, a useful supplement for general AI courses and an indispensable reference for the professional programmer.

Information Security Management Handbook, Sixth Edition - Volume 6
Harold F. Tipton, ‎Micki Krause Nozaki - 2012 - ‎Preview - ‎More editions
This handbook is also available on CD.

A First Course in Machine Learning
Requiring minimal mathematical prerequisites, the classroom-tested material in this text offers a concise, accessible introduction to machine learning.

Vampire Forensics: Uncovering the Origins of an Enduring Legend
A history of the vampire legend prior to Bram Stoker's Dracula draws on myriad sources to offer insight into vampire lore from ancient civilizations, recounting key stories while describing recent archaeological findings of reputed vampire ...

Museum Informatics: People, Information, and Technology in Museums
Museum Informatics explores the sociotechnical issues that arise when people, information, and technology interact in museums.

Artificial Intelligence Illuminated
Ben Coppin - 2004 - ‎Preview
The book covers a range of AI techniques, algorithms, and methodologies, including game playing, intelligent agents, machine learning, genetic algorithms, and Artificial Life.

Principles of Artificial Intelligence
Although certain topics treated in my previous book, Problem solving Methods in Artificial Intelligence, are covered here as well, this book contains many additional topics such as rule-based systems, robot problem-solving systems, and ...

Artificial Intelligence and Soft Computing: Behavioral and Cognitive ...
Amit Konar - 1999 - ‎Preview - ‎More editions
Beginning with the behavioral perspective of "human cognition," the text covers the tools and techniques required for its intelligent realization on machines.

Data Mining and Predictive Analytics
Data Mining and Predictive Analytics: Offers comprehensive coverage of association rules, clustering, neural networks, logistic regression, multivariate analysis, and R statistical programming language Features over 750 chapter exercises, ...

Discovering Knowledge in Data: An Introduction to Data Mining
This book provides the tools needed to thrive in today’s big data world.

Penn State Summon Search
24,585,691 results

Content Sample

Google Domain Limited Web Search (SCIENCEDIRECT)
 1,460,000 results

"computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR 
"machine learning" OR "multimedia databases" OR 
"artificial intelligence" AND SITE: SCIENCEDIRECT

Content Sample

Computer Science Review -
The online version of Computer Science Review at, the world's leading platform for high quality peer-reviewed full-text journals.

Artificial Intelligence -
The online version of Artificial Intelligence at, the world's leading platform for high quality peer-reviewed full-text journals.

Journal of Computer and System Sciences -
... version of Journal of Computer and System Sciences at, the ... 11th International Workshop on Coalgebraic Methods in Computer Science, ...

Computer Science - Elsevier › Physical Sciences
Welcome to the Computer Science area of Elsevier. ... to Jules Vern to Stephen W. Hawking to Sergey Brin and Larry Page – have also published with Elsevier.

Text and data mining policy - Elsevier › About › Our business › Policies
Elsevier's policy on text and data mining full text content.

Artificial Intelligence - Journal - Elsevier
Artificial Intelligence, which commenced publication in 1970, is now the generally accepted premier international forum for the publication of results of current ...

Science of Computer Programming - Journal - Elsevier
Science of Computer Programming is dedicated to the distribution of research results in the areas of software systems development, use and maintenance, ...

ScienceDirect | Elsevier's leading information solution | Elsevier › All Solutions
Thousands of Elsevier journals, articles and book chapters are available on ScienceDirect as open access. For a full list, visit our open access site.

Visual Informatics - Journal - Elsevier
Visual Informatics is a peer-reviewed online journal published on the platform of Elsevier. It is dedicated to the development and application of theories, ...

Engineering Applications of Artificial Intelligence - Journal - Elsevier
Artificial Intelligence (AI) techniques are now being used by the practicing engineer to solve a whole range of hitherto intractable problems. This journal provides ...


Searches related to "computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" OR "artificial intelligence" AND SITE: SCIENCEDIRECT

Google Domain Limited Web Search (PUBMED)
1,330,000 results 

Content Sample

Welcome to PubMed Data Management - NCBI - NIH
Welcome to the PubMed Data Management System (PMDM). PubMed citation data providers may use PMDM to securely manage their citation data at any time, ...

MEDLINE/PubMed Production Improvements Underway. NLM ...
Jul 11, 2016 - PubMed Data Management system (PMDM) ... the publisher site and on PubMed; the correction made by the publisher would be sent to NLM.

PubMed Data Management (PMDM) Help - NCBI - NIH
Home page. Using the PubMed Data Management (PMDM) system, data providers can create, review, and edit any of their citation data at any time, regardless ...

Archive of "Applied Clinical Informatics". - NCBI - NIH
Articles from this journal are generally available in PMC after a 12-month delay (embargo); however, the delay may vary at the discretion of the publisher.

Machine Learning in Medicine. - NCBI - NIH
by RC Deo - ‎2015 - ‎Cited by 58 - ‎Related articles
Nov 17, 2015 - Machine Learning in Medicine. ... might benefit from such learning approaches and use examples from the literature to introduce basic concepts in machine learning. ... PMID: 26572668; [PubMed - indexed for MEDLINE] ...

NCBI Text Mining Tools - NIH
PubTator is a text-mining tool for annotating the entire PubMed articles with key ... DNorm is the first technique to use machine learning to recognize and ...

Data management in clinical research: An overview - NCBI - NIH › NCBI › Literature › PubMed Central (PMC)
by B Krishnankutty - ‎2012 - ‎Cited by 58 - ‎Related articles
Clinical Data Management (CDM) is a critical phase in clinical research, which .... will be logging into the CDM system and entering the data directly at the site.

Data Mining of Web-Based Documents on Social Networking Sites ...
by J Song - ‎2016 - ‎Cited by 1 - ‎Related articles
Sep 29, 2016 - Data Mining of Web-Based Documents on Social Networking Sites That Included Suicide-Related Words Among Korean Adolescents.

Data Mining and Privacy of Social Network Sites' Users: Implications of ...
by Y Al-Saggaf - ‎2015 - ‎Cited by 10 - ‎Related articles
Sci Eng Ethics. 2015 Aug;21(4):941-66. doi: 10.1007/s11948-014-9564-6. Epub 2014 Jun 12. Data Mining and Privacy of Social Network Sites' Users: ...

The Cornerstones of Medical Informatics - NCBI - NIH › NCBI › Literature › PubMed Central (PMC)
by NM Lorenzi - ‎2000 - ‎Cited by 33 - ‎Related articles
The changes in the health care system over the next decade are goint to make the last 20 years seem like good old days of relative stability. We will continue to ...

Searches related to "computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" OR "artificial intelligence" AND SITE: PUBMED

Nursing informatics year in review. - NCBI
by JM Carrington - ‎2013 - ‎Cited by 29 - ‎Related articles
Nurs Adm Q. 2013 Apr-Jun;37(2):136-43. doi: 10.1097/NAQ.0b013e3182869deb. Nursing informaticsyear in review. Carrington JM(1), Tiase VL.

Medical Informatics Education - NCBI - NIH › NCBI › Literature › PubMed Central (PMC)
by GA Patton - ‎1999 - ‎Cited by 33 - ‎Related articles
Medical Informatics Course Offerings at the University of Utah. The department has 14 full-time faculty and 14 adjunct faculty. A wide variety of sites are available ...

Data mining tools for biological sequences. - NCBI
by H Liu - ‎2003 - ‎Cited by 74 - ‎Related articles
We describe a methodology, as well as some related data mining tools, for ... illustrate this methodology on the problem of recognizing translation initiation sites.

Remediating radium contaminated legacy sites: Advances made ...
by A Varley - ‎2015 - ‎Cited by 6 - ‎Related articles
Apr 3, 2015 - Remediating radium contaminated legacy sites: Advances made through machine learningin routine monitoring of "hot" particles. Varley A(1) ...

The handbook of medical informatics and its web site. - NCBI
by JH van Bemmel - ‎1998 - ‎Cited by 1 - ‎Related articles
Since the new Handbook of Medical Informatics was published in 1997, a beta-version of a web site("MI WEB") has been opened that supports the teaching of ...

Data management and quality assurance for an International project ...
by R Pandav - ‎2002 - ‎Cited by 9 - ‎Related articles
Responsibility for data management and quality assurance was shared between the two sites. A cooperative system was instituted for forms and edit ...

Artificial intelligence in medicine. - NCBI
by P Hamet - ‎2017 - ‎Cited by 5 - ‎Related articles
Metabolism. 2017 Apr;69S:S36-S40. doi: 10.1016/j.metabol.2017.01.011. Epub 2017 Jan 11. Artificial intelligence in medicine. Hamet P(1), Tremblay J(2).

DephosSite: a machine learning approach for discovering ... - NCBI
by X Wang - ‎2016 - ‎Cited by 2 - ‎Related articles
Mar 22, 2016 - DephosSite: a machine learning approach for discovering phosphotase-specific dephosphorylation sites. Wang X(1), Yan R(2), Song J(3,)(4 ...

Informatics in radiology (infoRAD): HTML and Web site design for the ...
by AG Ryan - ‎2005 - ‎Cited by 7 - ‎Related articles
Radiographics. 2005 Jul-Aug;25(4):1101-18. Informatics in radiology (infoRAD): HTML and Web sitedesign for the radiologist: a primer. Ryan AG(1), Louis LJ, ...

Website review: The Jackson Laboratory Mouse Genome Informatics ...
by J Wixon - ‎2000 - ‎Cited by 2 - ‎Related articles
Yeast. 2000 Jun 30;17(2):134-45. Website review: The Jackson Laboratory Mouse Genome Informatics Site: version 2.3.2. Wixon J(1). Author information:


Searches related to "computer science" OR "information science" OR
"computer programming" OR informatics OR "data management" OR
"information security" OR "network security" OR forensics OR "visual computing"
OR "data mining" OR "machine learning" OR "multimedia databases"
OR "artificial intelligence" AND SITE: PUBMED

Google Domain Limited Web Search (GOV)
62,500,000 results 

Content Sample

Computer and Information Research Scientists - Bureau of Labor ...
... DC 20212-0001. | Telephone: 1-202-691-5700 | Contact OOH · View this page on regular · Permanently disable mobile site ...

Forensic Sciences | National Institute of Justice
May 19, 2017 - From crime scene to courtroom, forensics plays a vital role in the criminal ... Forensic science topics on the NIJ website are divided into main ...

Data Mining - FDA
Jump to Skip to main page content - Data Mining by FDA Product Centers: CBER · CDER · CDRH · CVM · NCTR. Article: Use of Data mining at the Food ...

[PDF]Artificial Intelligence, Automation, and the Economy -
Dec 20, 2016 - Advances in Artificial Intelligence (AI) technology and related fields have ..... ( ...

Computer Science For All |
Jan 30, 2016 - Computer Science for All is the President's bold new initiative to .... apps, websites, and games in the hopes of reducing the gender gap in ...

Preparing for the Future of Artificial Intelligence |
May 3, 2016 - There is a lot of excitement about artificial intelligence (AI) and how to ... to the eventwebsites below, and each workshop will be livestreamed:.

Directorate for Computer & Information Science & Engineering (CISE ...
NSF's mission is to advance the progress of science, a mission accomplished by funding proposals for research and education made by scientists, engineers, ...

HSRIC: Health Informatics - National Library of Medicine - NIH
Access health informatics data, publications, webcasts, and domestic and international key ... This CMSsite acts as a one-stop source for all things ICD-10. ..... - (Office of the National Coordinator for Health Information Technology ...

No Longer an Idea of the Future, Artificial Intelligence Is Here and You ...
Sep 15, 2016 - It might surprise some of you to know that artificial intelligence (AI) is already in use and a routine part of our daily lives, but we leverage this ...

[PDF]Computer Forensics - US-Cert
States Department of Justice's Cyber Crime web site. 4. 4 The site lists recent court cases involving computer forensics and computer ...

Searches related to "computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" OR "artificial intelligence" AND SITE: GOV

Google Domain Limited Web Search (NEWS)

Google Domain Limited Web Search (BLOGS)

Google Domain Limited Web Search (VIDEOS)

Google Domain Limited Web Search (IMAGES)






David Dillard



Research Guides



Research Paper Writing


Disabilities And Employment

Indoor Gardening







Research Guide:

Information Literacy


Twitter: davidpdillard



Bushell, R. & Sheldon, P. (Eds),

Wellness and Tourism: Mind, Body, Spirit,

Place, New York: Cognizant Communication Books.

Wellness Tourism: Bibliographic and Webliographic Essay

David P. Dillard


Railtram Discussion Group

from the union pacific to britrail and beyond


Indoor Gardening

improve your chances for indoor gardening success




Health Diet Fitness Recreation Sports Tourism