Study Resource
Explore
Arts & Humanities
Business
Engineering & Technology
Foreign Language
History
Math
Science
Social Science
Top subcategories
Advanced Math
Algebra
Basic Math
Calculus
Geometry
Linear Algebra
Pre-Algebra
Pre-Calculus
Statistics And Probability
Trigonometry
other →
Top subcategories
Astronomy
Astrophysics
Biology
Chemistry
Earth Science
Environmental Science
Health Science
Physics
other →
Top subcategories
Anthropology
Law
Political Science
Psychology
Sociology
other →
Top subcategories
Accounting
Economics
Finance
Management
other →
Top subcategories
Aerospace Engineering
Bioengineering
Chemical Engineering
Civil Engineering
Computer Science
Electrical Engineering
Industrial Engineering
Mechanical Engineering
Web Design
other →
Top subcategories
Architecture
Communications
English
Gender Studies
Music
Performing Arts
Philosophy
Religious Studies
Writing
other →
Top subcategories
Ancient History
European History
US History
World History
other →
Top subcategories
Croatian
Czech
Finnish
Greek
Hindi
Japanese
Korean
Persian
Swedish
Turkish
other →
Profile
Documents
Logout
Upload
Engineering & Technology
Computer Science
Data Mining
Engineering & Technology
Computer Science
Data Mining
Detecting Scanners: Empirical Assessment on a 3G Network
Detecting Rule Inconsistencies in Symbiotic Simulations
Detecting Review Spam: Challenges and Opportunities
Detecting Privacy and Ethical Sensitivity in Data Mining Results
Detecting Phishing Attempts with SAS®: Cisco IronPort® Email Log
Detecting Paraphrase in Indian Languages-Malayalam
Detecting Outliers Using PAM with Normalization Factor on Yeast Data
Detecting Outliers in High-Dimensional Datasets with Mixed Attributes
Detecting Outliers in Data streams using Clustering Algorithms
Detecting Non-compliant Consumers in Spatio
Detecting Medicaid Data Anomalies Using Data Mining Techniques
detecting malicious use with unlabelled data using clustering and
Detecting localized homogeneous anomalies over spatio
Detecting Internet Phishing Attacks Using Data Mining Methods
Detecting Interesting Instances
Detecting Inference Attacks using Association
Detecting Illicit Drug Usage on Twitter
Detecting Hidden Relations in Geographic Data
Detecting Group Differences: Mining Contrast Sets
Detecting Game Player Goals with Log Data
Detecting Financial Fraud Using Data Mining Techniques: A Decade
<
1
...
65
66
67
68
69
70
71
72
73
...
931
>