-
-
-
-
Statistical Language Models for Information Retrieval
Springer 出版As online information grows dramatically, search engines such as Google are playing a more and more
-
Linguistic Structure Prediction
Springer 出版A major part of natural language processing now depends on the use of text data to build linguistic
-
Differential Privacy
Springer 出版Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion
-
Semantic Role Labeling
Springer 出版This book is aimed at providing an overview of several aspects of semantic role labeling. Chapter 1
-
Blocks and Chains
Springer 出版The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchain
-
Computational Modeling of Human Language Acquisition
Springer 出版Human language acquisition has been studied for centuries, but using computational modeling for suc
-
Natural Language Processing for the Semantic Web
Springer 出版This book introduces core natural language processing (NLP) technologies to non-experts in an easil
-
Recognizing Textual Entailment
Springer 出版In the last few years, a number of NLP researchers have developed and participated in the task of R
-
Finite-State Text Processing
Springer 出版Weighted finite-state transducers (WFSTs) are commonly used by engineers and computational linguist
-
-
Linguistic Fundamentals for Natural Language Processing II
Springer 出版Meaning is a fundamental concept in Natural Language Processing (NLP), in the tasks of both Natural
-
Cross-Lingual Word Embeddings
Springer 出版The majority of natural language processing (NLP) is English language processing, and while there i
-
-
-
Privacy in Social Networks
Springer 出版This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This
-
Efficient Processing of Deep Neural Networks
Springer 出版This book provides a structured treatment of the key principles and techniques for enabling efficie
-
Phrase Mining from Massive Text and Its Applications
Springer 出版A lot of digital ink has been spilled on "big data" over the past few years. Most of this surge owe
-
A Social Media Survival Guide
Ingram 出版The every person's guide to social media... how to use it and what never to do. Are you trying to
-
Cyber Security, Cryptology, and Machine Learning
Springer 出版This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security
-
React and React Native - Fourth Edition
Packt 出版PUBLISHER'S NOTE: An updated 2024 edition of this book, with new emphasis on TypeScript, is now ava
-
-
TCP Congestion Control
Ingram 出版TCP Congestion Control has been a research topic for over 30 years. Since the pioneering work of Ja
-
Fraud Investigation and Forensic Accounting in the Real World
Ingram 出版This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investi
-
Mobile Offensive Security Pocket Guide
Ingram 出版In order to protect and defend mobile application and device deployments, you need to be able to ef
-
Step Into the Metaverse
Wiley 出版An incisive glimpse into the future of the internet In Step into the Metaverse: How the Immersive I
-
Greenedge: New Perspectives to Energy Management and Supply in Mobile Edge Computing
Springer 出版1 Introduction.- 2 Investigating Low-Battery Anxiety of Mobile Users.- 3 User Energy and LBA Aware
-
Purple Team Strategies
Packt 出版Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, d
-
Cloud Computing
Ingram 出版In the past decade, cloud computing and managed infrastructure services have rapidly become the lea
-
A Network Architect’s Guide to 5g
Addison-Wesl 出版THE NETWORK PROFESSIONAL'S GUIDE TO PLANNING, DESIGNING, AND DEPLOYING 5G TRANSPORT NETWORKS As 5G
-
Beyond Accessibility Compliance
Apress 出版Take a deep look at accessibility as it applies to mobile and wearables. This book covers topics wi
-
Basics of Health Blogging
Ingram 出版This book is intended to provide the knowledge of writing blogs to those who haven't been introduce
-
101 UX Principles - Second Edition
Packt 出版Improve user experience by avoiding common frustrations and focusing on what matters Book Descripti
-
OPNsense Beginner to Professional
Packt 出版Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to sec
-
-
Incident Response with Threat Intelligence
Packt 出版Learn everything you need to know to respond to advanced cybersecurity incidents through threat hun
-
-
JavaScript Absolute Beginners Guide
Ingram 出版Make the most of today's JavaScript--even if you've never programmed anything before. JavaScript Ab
-
Practical WebAssembly
Packt 出版Understand the basic building blocks of WebAssembly and learn, install, and use various tools from
-
What to Do When You Get Hacked
Ingram 出版What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century tea
-
Cissp
John Kembrey 出版The book includes additional information on difficult topics as the beginners should have a proper
-
What to Do When You Get Hacked
Ingram 出版This book teaches you everything that you need to know about preparing your company for a potential
-
A Dismantle Approach of Likes, Retweets and Forwards
A Dismantle Approach of Likes, Retweets, and Forwards by Bhavya Jain is a representation of the dar
-
The Foundations of Threat Hunting
Packt 出版Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversa
-
China and Middle East Conflicts
Routledge 出版How do aspiring and established rising global powers respond to conflict? Using China, the book stu
-
Operationalizing Threat Intelligence
Packt 出版Learn cyber threat intelligence fundamentals to implement and operationalize an organizational inte