نتایج جستجو برای: only data
تعداد نتایج: 3410144 فیلتر نتایج به سال:
Big data can be a blessing: with very large training sets it becomes possible to perform complex learning tasks unprecedented accuracy. Yet, this improved performance comes at the price of enormous computational challenges. Thus, one may wonder: Is leverage information content huge while keeping resources under control? Can also help solve some privacy issues raised by large-scale learning? Thi...
Software measures are of paramount importance to evaluate both processes and products. However, collecting such data requires a large effort and this activity produces benefits only in the long term. For these reasons, companies have to use automated tools able to collect data without affecting both the productivity and the process. This approach is useful to reduce the effort related to the me...
فعالیت های نگهداری و تعمیرات اطلاعاتی را تولید می کند که می تواند در تعیین زمان های بیکاری و ارایه یک برنامه زمان بندی شده یا تعیین هشدارهای خرابی به پرسنل نگهداری و تعمیرات کمک کند. وقتی که مقدار داده های تولید شده زیاد باشند، فهم بین متغیرها بسیار مشکل می شوند. این پایان نامه به کاربردی از داده کاوی برای کاوش پایگاه های داده چندبعدی در حوزه نگهداری و تعمیرات، برای پیدا کردن خرابی هایی که موجب...
In classical computation, a “write-only memory” (WOM) is little more than an oxymoron, and the addition of a WOM to a (deterministic or probabilistic) classical computer brings no advantage. We demonstrate a setup where a quantum computer using a WOM can solve problems that neither a classical computer with a WOM nor a quantum computer without a WOM can solve, when all other resource bounds are...
due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...
G o o d l o o k i n g . 5 4 y e a r Old William Francis McDon ough wears horn-rimmed spec tacles, lias steel-gray eyes, talks In a soft, modest way, and is Unmarried. In his day Bill McDonough ^35 been a farmer’s son, soltlier, Merit Man and top execu tive of a big-time employees' Sroup. He likes to walk, play golf, and bowl. He once bowled 300, which is as thrilling as ̂ l^ole-in-one is to a...
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated through the use of different information systems. The results of data mining can be used for getting a better understanding of the underlying educational processes, for generating recommendations and advice to students, for...
In-memory read-only caches are widely used in cloud infrastructure to reduce access latency and to reduce load on backend databases. Operators view coherent caches as impractical at genuinely large scale and many clientfacing caches are updated in an asynchronous manner with best-effort pipelines. Existing incoherent cache technologies do not support transactional data access, even if the backe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید