The user-driven dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems that should be taken into account in both the design and evaluation of any P2P application. While prior studies have shown that peer par
A comprehensive introduction to ICA for students and practitioners Independent Component Analysis (ICA) is one of the most exciting new topics in fields such as neural networks, advanced statistics, and signal processing. This is the first book to p
Product Descr iption Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable metho
The central idea of Hebbian Learning and Negative Feedback Networks is that artificial neural networks using negative feedback of activation can use simple Hebbian learning to self-organise so that they uncover interesting structures in data sets. T
很好的系统生物学书籍,下面是2008年Nature review 文章 ”Modelling and analysis of gene regulatory networks“ 的评价: An excellent book about the study of biological networks by one of the leading researchers in this field.
Preface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Requ
How well a Web site performs while receiving heavy user traffic is an essential factor in an organization's overall success. How can you be sure your site will hold up under pressure? Performance Analysis for Java(TM) Web Sites is an information-pac
This book provides a thorough introduction to the formal foundations and practical applications of Bayesian networks. It provides an extensive discussion of techniques for building Bayesian networks that model real-world situations, including techni
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest m
A great deal has been written over the last four years regarding how academics have contributed possible technological solutions for uncovering terrorist networks to enhance public safety and national security. Both the public and the Pentagon have
The main goal of this research is to demonstrate how probabilistic graphs may be used for mod- eling and assessment of credit concentration risk. The destructive power of credit concentrations essentially depends on the amount of correlation among b
The use of MATLAB is ubiquitous in the scientific and engineering communities today, and justifiably so. Simple programming, rich graphic facilities, built-in functions, and extensive toolboxes offer users the power and flexibility they need to solv
Performance Analysis for Java(TM) Web Sites is an information-packed guide to maximizing the performance of Java-based Web sites. It approaches these sites as systems, and considers how the various components involved, such as networks, Java(TM) Vir