نتایج جستجو برای: only data

تعداد نتایج: 3410144  

Journal: :IEEE Signal Processing Magazine 2021

Big data can be a blessing: with very large training sets it becomes possible to perform complex learning tasks unprecedented accuracy. Yet, this improved performance comes at the price of enormous computational challenges. Thus, one may wonder: Is leverage information content huge while keeping resources under control? Can also help solve some privacy issues raised by large-scale learning? Thi...

Journal: :Journal of Systems Architecture 2006
Alberto Sillitti Giancarlo Succi Stefano De Panfilis

Software measures are of paramount importance to evaluate both processes and products. However, collecting such data requires a large effort and this activity produces benefits only in the long term. For these reasons, companies have to use automated tools able to collect data without affecting both the productivity and the process. This approach is useful to reduce the effort related to the me...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده صنایع و سیستمها 1387

فعالیت های نگهداری و تعمیرات اطلاعاتی را تولید می کند که می تواند در تعیین زمان های بیکاری و ارایه یک برنامه زمان بندی شده یا تعیین هشدارهای خرابی به پرسنل نگهداری و تعمیرات کمک کند. وقتی که مقدار داده های تولید شده زیاد باشند، فهم بین متغیرها بسیار مشکل می شوند. این پایان نامه به کاربردی از داده کاوی برای کاوش پایگاه های داده چندبعدی در حوزه نگهداری و تعمیرات، برای پیدا کردن خرابی هایی که موجب...

2010
Abuzer Yakaryilmaz Rusins Freivalds A. C. Cem Say Ruben Agadzanyan

In classical computation, a “write-only memory” (WOM) is little more than an oxymoron, and the addition of a WOM to a (deterministic or probabilistic) classical computer brings no advantage. We demonstrate a setup where a quantum computer using a WOM can solve problems that neither a classical computer with a WOM nor a quantum computer without a WOM can solve, when all other resource bounds are...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1393

due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...

2012
SEWARD BRISBANE

G o o d l o o k i n g . 5 4 y e a r Old William Francis McDon­ ough wears horn-rimmed spec­ tacles, lias steel-gray eyes, talks In a soft, modest way, and is Unmarried. In his day Bill McDonough ^35 been a farmer’s son, soltlier, Merit Man and top execu­ tive of a big-time employees' Sroup. He likes to walk, play golf, and bowl. He once bowled 300, which is as thrilling as ̂ l^ole-in-one is to a...

2009
Mykola Pechenizkiy Nikola Trcka Ekaterina Vasilyeva Wil M. P. van der Aalst Paul De Bra

Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated through the use of different information systems. The results of data mining can be used for getting a better understanding of the underlying educational processes, for generating recommendations and advice to students, for...

Journal: :CoRR 2014
Ittay Eyal Kenneth P. Birman Robbert van Renesse

In-memory read-only caches are widely used in cloud infrastructure to reduce access latency and to reduce load on backend databases. Operators view coherent caches as impractical at genuinely large scale and many clientfacing caches are updated in an asynchronous manner with best-effort pipelines. Existing incoherent cache technologies do not support transactional data access, even if the backe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید