Books on the topic 'Data detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Data detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Varshney, Pramod K. Distributed Detection and Data Fusion. New York, NY: Springer New York, 1997.
Find full textGupta, Manish, Jing Gao, Charu Aggarwal, and Jiawei Han. Outlier Detection for Temporal Data. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-01905-0.
Full textVarshney, Pramod K. Distributed Detection and Data Fusion. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-1904-0.
Full textVarshney, Pramod K. Distributed detection and data fusion. Edited by Burrus C. S. Berlin: Springer, 1996.
Find full textVarshney, Pramod K. Distributed detection and data fusion. Edited by Burrus C. S. New York: Springer, 1997.
Find full textSamy, Ihab, and Da-Wei Gu. Fault Detection and Flight Data Measurement. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24052-2.
Full textLatifur, Khan, and Thuraisingham Bhavani M, eds. Data mining tools for malware detection. Boca Raton, FL: CRC Press, 2012.
Find full textYang, Chenggang. Precipitation detection with satellite microwave data. Washington, D.C: U.S. Dept. of Commerce, National Oceanic and Atmospheric Administration, National Environmental Satellite, Data, and Information Service, 1988.
Find full textChen, Zhiwen. Data-Driven Fault Detection for Industrial Processes. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-16756-1.
Full textM, Breipohl Arthur, ed. Random signals: Detection, estimation, and data analysis. New York: Wiley, 1988.
Find full textK, Kokula Krishna Hari, ed. Data Duplication Prevention and Detection: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.
Find full textInternational Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.
Find full textInternational Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.
Find full textInternational Conference on Data Mining (9th 2008 Cadiz, Spain). Data mining IX: Data mining, protection, detection and other security technologies. Edited by Zanasi A. Southampton: WIT, 2008.
Find full textInternational Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.
Find full textNarasimhan, Shankar. Data reconciliation & gross error detection: An intelligent use of process data. Houston: Gulf Publishing Co., 2000.
Find full textInternational Conference on Data Mining (9th 2008 Cadiz, Spain). Data mining IX: Data mining, protection, detection and other security technologies. Edited by Zanasi A. Southampton: WIT, 2008.
Find full textInternational Conference on Data Mining (10th 2009 Crete, Greece). Data mining X: Data mining, protection, detection and other security technologies. Edited by Zanasi A, Ebecken N. F. F, and Brebbia C. A. Southampton, UK: WIT Press, 2009.
Find full textInvestigative data mining for security and criminal detection. Amsterdam: Butterworth-Heinemann, 2003.
Find full textProvder, Theodore, ed. Detection and Data Analysis in Size Exclusion Chromatography. Washington, DC: American Chemical Society, 1987. http://dx.doi.org/10.1021/bk-1987-0352.
Full textCorley, Kenneth Rainer. Detection, Data Analysis, and Astrophysics of Gravitational Waves. [New York, N.Y.?]: [publisher not identified], 2020.
Find full text1939-, Provder Theodore, American Chemical Society. Division of Polymeric Materials: Science and Engineering., and American Chemical Society Meeting, eds. Detection and data analysis in size exclusion chromatography. Washington, DC: The Society, 1987.
Find full textAdams, Richard Arthur. Distributed deadlock detection for communicating processes. Urbana, Ill: Dept. of Computer Science, University of Illinois at Urbana-Champaign, 1986.
Find full textGil, Neiger, and United States. National Aeronautics and Space Administration., eds. Detection of global state predicates. Ithaca, N.Y: Dept. of Computer Science, Cornell University, 1991.
Find full textHaering, Niels. Visual Event Detection. Boston, MA: Springer US, 2001.
Find full textMelanie, Herschel, ed. An introduction to duplicate detection. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2010.
Find full textWang, Jing, Jinglin Zhou, and Xiaolu Chen. Data-Driven Fault Detection and Reasoning for Industrial Monitoring. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8044-1.
Full textWeller, René. New Geometric Data Structures for Collision Detection and Haptics. Heidelberg: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01020-5.
Full textShabtai, Asaf, Yuval Elovici, and Lior Rokach. A Survey of Data Leakage Detection and Prevention Solutions. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-2053-8.
Full textYuval, Elovici, Rokach Lior, and SpringerLink (Online service), eds. A Survey of Data Leakage Detection and Prevention Solutions. Boston, MA: Springer US, 2012.
Find full textJaijit, Bhattacharya, and Indian Institute of Management, Ahmedabad., eds. PRIVDAM: Privacy violation detection and monitoring using data mining. Ahmedabad: Indian Institute of Management, 2005.
Find full textCenter, Ames Research, ed. Activity tracking for pilot error detection from flight data. Moffett Field, CA: National Aeronautcs and Space Administration, Ames Research Center, 2002.
Find full textCentre, Bhabha Atomic Research, ed. Seismic signal detection by fractal dimension approach. Mumbai: Bhabha Atomic Research Centre, 2003.
Find full textvan Haasteren, Rutger. Gravitational Wave Detection and Data Analysis for Pulsar Timing Arrays. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-39599-4.
Full textKim, Kyusung. Use of SCADA data for failure detection in wind turbines. Golden, CO: National Renewable Energy Laboratory, 2011.
Find full textMeredith, John. Circle detection for non-gridded data utilising the Hough transform. Leicester: De Montfort University, 2003.
Find full textScalable Community Detection in Massive Networks using Aggregated Relational Data. [New York, N.Y.?]: [publisher not identified], 2019.
Find full textHan, Jiawei, Manish Gupta, Jing Gao, and Charu Aggarwal. Outlier Detection for Temporal Data. Morgan & Claypool Publishers, 2014.
Find full textHan, Jiawei, Manish Gupta, Jing Gao, and Charu Aggarwal. Outlier Detection for Temporal Data. Springer International Publishing AG, 2014.
Find full textHOFBAUER, Zimmermann. Single Photon Detection Data Communica. Institute of Physics Publishing, 2021.
Find full textHan, Jiawei, Manish Gupta, Jing Gao, and Charu Aggarwal. Outlier Detection for Temporal Data. Morgan & Claypool Publishers, 2014.
Find full textFraud Detection. Global Audit Publications, 1999.
Find full textSengupta, Nandita, and Jaya Sil. Intrusion Detection: A Data Mining Approach. Springer Singapore Pte. Limited, 2021.
Find full textThuraisingham, Bhavani, Latifur Khan, and Mehedy Masud. Data Mining Tools for Malware Detection. Auerbach Publishers, Incorporated, 2016.
Find full textData Reconciliation and Gross Error Detection. Elsevier, 1999. http://dx.doi.org/10.1016/b978-0-88415-255-2.x5000-9.
Full textMasud, Mehedy, Latifur Khan, and Bhavani Thuraisingham. Data Mining Tools for Malware Detection. Auerbach Publications, 2016. http://dx.doi.org/10.1201/b11298.
Full textThuraisingham, Bhavani, Latifur Khan, and Mehedy Masud. Data Mining Tools for Malware Detection. Auerbach Publishers, Incorporated, 2016.
Find full textThuraisingham, Bhavani, Latifur Khan, and Mehedy Masud. Data Mining Tools for Malware Detection. Auerbach Publishers, Incorporated, 2016.
Find full textThuraisingham, Bhavani, Latifur Khan, and Mehedy Masud. Data Mining Tools for Malware Detection. Auerbach Publishers, Incorporated, 2016.
Find full textSengupta, Nandita, and Jaya Sil. Intrusion Detection: A Data Mining Approach. Springer Singapore Pte. Limited, 2020.
Find full text