feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Charité  (32)
  • F.-Ebert-Stiftung  (3)
  • SB Finsterwalde  (1)
  • SB Guben
  • 2005-2009  (36)
Type of Medium
Language
Region
Library
Year
  • 1
    UID:
    almafu_BV022378634
    Format: XXI, 563 S. : , Ill., graph. Darst.
    Edition: 2., überarb. und erw. Aufl.
    ISBN: 978-3-7691-0538-4
    Language: German
    Subjects: Medicine
    RVK:
    RVK:
    RVK:
    Keywords: Evidenz-basierte Medizin ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Lehrbuch ; Aufsatzsammlung
    Author information: Kunz, Regina 1962-
    Author information: Cox, Marga
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
  • 3
    Book
    Book
    Oxford [u.a.] :Oxford Univ. Press,
    UID:
    almafu_BV022948019
    Format: XXVII, 481 S. : , graph. Darst.
    Edition: 1. publ.
    ISBN: 978-0-19-922642-9
    Language: English
    Subjects: Political Science
    RVK:
    Keywords: Außenpolitik ; Aufsatzsammlung ; Lehrbuch ; Lehrbuch ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    San Francisco, CA :Elsevier/Morgan Kaufmann,
    UID:
    almahu_9949698030802882
    Format: 1 online resource (553 p.)
    Edition: 1st edition
    ISBN: 1-280-96129-5 , 9786610961290 , 0-08-047059-9
    Series Statement: The Morgan Kaufmann series in data management systems
    Content: Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration is a handbook for analysts, engineers, and managers involved in developing data mining models in business and government. As you'll discover, fuzzy systems are extraordinarily valuable tools for representing and manipulating all kinds of data, and genetic algorithms and evolutionary programming techniques drawn from biology provide the most effective means for designing and tuning these systems.You don't need a background in fuzzy modeling or genetic algorithms to benefit, for this book provides it, along with
    Note: Description based upon print version of record. , Front Cover; Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration; Copyright Page; Contents; Preface; Objectives and Audience; Organization of the Book; Algorithm Definitions and Examples; Acknowledgments; Introduction; The Modern Connected World; The Advent of Intelligent Models; Fuzzy Logic and Genetic Algorithms; Part I: Concepts and Issues; Chapter 1. Foundations and Ideas; 1.1 Enterprise Applications and Analysis Models; 1.2 Distributed and Centralized Repositories; 1.3 The Age of Distributed Knowledge; 1.4 Information and Knowledge Discovery , 1.5 Data Mining and Business Models1.6 Fuzzy Systems for Business Process Models; 1.7 Evolving Distributed Fuzzy Models; 1.8 A Sample Case: Evolving a Model for Customer Segmentation; 1.9 Review; Chapter 2. Principal Model Types; 2.1 Model and Event State Categorization; 2.2 Model Type and Outcome Categorization; 2.3 Review; Chapter 3. Approaches to Model Building; 3.1 Ordinary Statistics; 3.2 Nonparametric Statistics; 3.3 Linear Regression in Statistical Models; 3.4 Nonlinear Growth Curve Fitting; 3.5 Cluster Analysis; 3.6 Decision Trees and Classifiers; 3.7 Neural Networks , 3.8 Fuzzy SQL Systems3.9 Rule Induction and Dynamic Fuzzy Models; 3.10 Review; Further Reading; Part II: Fuzzy Systems; Chapter 4. Fundamental Concepts of Fuzzy Logic; 4.1 The Vocabulary of Fuzzy Logic; 4.2 Boolean (Crisp) Sets: The Law of Bivalence; 4.3 Fuzzy Sets; 4.4 Review; Chapter 5. Fundamental Concepts of Fuzzy Systems; 5.1 The Vocabulary of Fuzzy Systems; 5.2 Fuzzy Rule-based Systems: An Overview; 5.3 Variable Decomposition into Fuzzy Sets; 5.4 A Fuzzy Knowledge Base: The Details; 5.5 The Fuzzy Inference Engine; 5.6 Inference Engine Approaches; 5.7 Running a Fuzzy Model; 5.8 Review , Chapter 6. Fuzzy SQL and Intelligent Queries6.1 The Vocabulary of Relational Databases and Queries; 6.2 Basic Relational Database Concepts; 6.3 Structured Query Language Fundamentals; 6.4 Precision and Accuracy; 6.5 Why We Search Databases; 6.6 Expanding the Query Scope; 6.7 Fuzzy Query Fundamentals; 6.8 Measuring Query Compatibility; 6.9 Complex Query Compatibility Metrics; 6.10 Compatibility Threshold Management; 6.11 Fuzzy SQL Process Flow; 6.12 Fuzzy SQL Example; 6.13 Evaluating Fuzzy SQL Outcomes; 6.14 Review; Chapter 7. Fuzzy Clustering; 7.1 The Vocabulary of Fuzzy Clustering , 7.2 Principles of Cluster Detection7.3 Some General Clustering Concepts; 7.4 Crisp Clustering Techniques; 7.5 Fuzzy Clustering Concepts; 7.6 Fuzzy c-Means Clustering; 7.7 Fuzzy Adaptive Clustering; 7.8 Generating Rule Prototypes; 7.9 Review; Chapter 8. Fuzzy Rule Induction; 8.1 The Vocabulary of Rule Induction; 8.2 Rule Induction and Fuzzy Models; 8.3 The Rule Induction Algorithm; 8.4 The Model Building Methodology; 8.5 A Rule Induction and Model Building Example; 8.6 Measuring Model Robustness; 8.7 Technical Implementation; 8.8 External Controls; 8.9 Organization of the Knowledge Base , 8.10 Review , English
    Additional Edition: ISBN 0-12-194275-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Amsterdam ; : Morgan Kaufmann Publishers,
    UID:
    almahu_9948026252802882
    Format: 1 online resource (623 p.)
    Edition: 2nd ed.
    ISBN: 1-281-09616-4 , 9786611096168 , 0-08-055580-2
    Series Statement: The Morgan Kaufmann series in multimedia information and systems
    Content: Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition
    Note: Prev. ed. entered under Cox. , Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; 1.1 Information Hiding, Steganography, and Watermarking; 1.2 History of Watermarking; 1.3 History of Steganography; 1.4 Importance of Digital Watermarking; 1.5 Importance of Steganography; Chapter 2. Applications and Properties; 2.1 Applications of Watermarking; 2.2 Applications of Steganography; 2.3 Properties of Watermarking Systems; 2.4 Evaluating Watermarking Systems , 2.5 Properties of Steganographic and Steganalysis Systems2.6 Evaluating and Testing Steganographic Systems; 2.7 Summary; Chapter 3. Models of Watermarking; 3.1 Notation; 3.2 Communications; 3.3 Communication-Based Models of Watermarking; 3.4 Geometric Models of Watermarking; 3.5 Modeling Watermark Detection by Correlation; 3.6 Summary; Chapter 4. Basic Message Coding; 4.1 Mapping Messages into Message Vectors; 4.2 Error Correction Coding; 4.3 Detecting Multisymbol Watermarks; 4.4 Summary; Chapter 5. Watermarking with Side Information; 5.1 Informed Embedding , 5.2 Watermarking Using Side Information5.3 Dirty-Paper Codes; 5.4 Summary; Chapter 6. Practical Dirty-Paper Codes; 6.1 Practical Considerations for Dirty-Paper Codes; 6.2 Broad Approaches to Dirty-Paper Code Design; 6.3 Implementing DM with A Simple Lattice Code; 6.4 Typical Tricks in Implementing Lattice Codes; 6.5 Coding with Better Lattices; 6.6 Making Lattice Codes Survive Valumetric Scaling; 6.7 Dirty-Paper Trellis Codes; 6.8 Summary; Chapter 7. Analyzing Errors; 7.1 Message Errors; 7.2 False Positive Errors; 7.3 False Negative Errors; 7.4 ROC Curves , 7.5 The Effect of Whitening on Error Rates7.6 Analysis of Normalized Correlation; 7.7 Summary; Chapter 8. Using Perceptual Models; 8.1 Evaluating Perceptual Impact of Watermarks; 8.2 General Form of A Perceptual Model; 8.3 Two Examples of Perceptual Models; 8.4 Perceptually Adaptive Watermarking; 8.5 Summary; Chapter 9. Robust Watermarking; 9.1 Approaches; 9.2 Robustness to Valumetric Distortions; 9.3 Robustness to Temporal and Geometric Distortions; 9.4 Summary; Chapter 10. Watermark Security; 10.1 Security Requirements; 10.2 Watermark Security and Cryptography , 10.3 Some Significant Known Attacks10.4 Summary; Chapter 11. Content Authentication; 11.1 Exact Authentication; 11.2 Selective Authentication; 11.3 Localization; 11.4 Restoration; 11.5 Summary; Chapter 12. Steganography; 12.1 Steganographic Communication; 12.2 Notation and Terminology; 12.3 Information-Theoretic Foundations of Steganography; 12.4 Practical Steganographic Methods; 12.5 Minimizing the Embedding Impact; 12.6 Summary; Chapter 13. Steganalysis; 13.1 Steganalysis Scenarios; 13.2 Some Significant Steganalysis Algorithms; 13.3 Summary; Appendix A. Background Concepts , A.1 Information Theory , English
    Additional Edition: ISBN 0-12-372585-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cambridge :Royal Society of Chemistry Publishing,
    UID:
    almahu_9947358097502882
    Format: 1 online resource (467 p.)
    Edition: 1st ed.
    ISBN: 1-84755-985-9
    Content: DNA replication, the process of copying one double stranded DNA molecule to form two identical copies, is highly conserved at the mechanistic level across evolution. Interesting in its own right as a fascinating feat of biochemical regulation and coordination, DNA replication is at the heart of modern advances in molecular biology. An understanding of the process at both the biological and chemical level is essential to developing new techniques in molecular biology. Insights into the process at the molecular level provide opportunities to modulate and intervene in replication. Rapidly dividin
    Note: Description based upon print version of record. , Molecular Themes in DNA Replication_publicity; i_iv; v_vi; vii_xvi; xvii; xviii_xxii; 001_021; 022_046; 047_085; 086_111; 112_155; 156_177; 178_216; 217_268; 269_296; 297_315; 316_345; 346_362; 363_392; 393_413; 414_444 , English
    Additional Edition: ISBN 0-85404-164-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    E-Resource
    E-Resource
    Paris :OECD Publishing,
    UID:
    almafu_9958079009102883
    Format: 1 online resource (59 p. )
    Series Statement: OECD Food, Agriculture and Fisheries Papers, no.22
    Content: Developing an allocation scheme for distributing rights amongst fishing nations is a key issue in the development of stable cooperative arrangements to exploit international fish resources. Allocation within regional fisheries management organisations (RFMOs) is generally based on the historical catches of parties to the RFMOs. However, as membership of RFMOs increases and pressure to allow additional countries, particularly coastal developing countries, to participate meaningfully in international fisheries intensifies, there is increasing policy attention being paid to the issue of allocation of rights in RFMOs. This paper explores issues relating to the process of allocating participatory rights in RFMOs, especially in those cases in which one or more fisheries remain unallocated, and is intended to stimulate discussion among policy makers on possible policy directions in such situations without directly or indirectly evaluating existing allocation schemes. The paper reviews the international legal framework governing international fisheries, the economic issues underlying allocations, and the current state of play in the allocation regimes in RFMOs. A broader perspective on the allocation issue is provided by examining the experiences of other resource sectors that have wrestled policy challenges similar to those confronting international fisheries in allocating participatory rights amongst current and potential participants - water resources; and greenhouse gases – to see if they offer any transferable insights on the issue.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book
    Book
    Königswinter : H.F. Ullmann
    UID:
    kobvindex_VBRD-i97838331433730384
    Format: 384 S. : überw. Ill.
    ISBN: 9783833143373
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV042723267
    Format: 93 S., graph. Darst. , 21 cm
    Note: Cover title
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    b3kat_BV027959090
    Format: 70 S. , graph. Darst.
    Series Statement: Arbeitspapier / Hans-Böckler-Stiftung 110
    Language: German
    Author information: Brandl, Karl Heinz
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages