Study Resource
Explore
Arts & Humanities
Business
Engineering & Technology
Foreign Language
History
Math
Science
Social Science
Top subcategories
Advanced Math
Algebra
Basic Math
Calculus
Geometry
Linear Algebra
Pre-Algebra
Pre-Calculus
Statistics And Probability
Trigonometry
other →
Top subcategories
Astronomy
Astrophysics
Biology
Chemistry
Earth Science
Environmental Science
Health Science
Physics
other →
Top subcategories
Anthropology
Law
Political Science
Psychology
Sociology
other →
Top subcategories
Accounting
Economics
Finance
Management
other →
Top subcategories
Aerospace Engineering
Bioengineering
Chemical Engineering
Civil Engineering
Computer Science
Electrical Engineering
Industrial Engineering
Mechanical Engineering
Web Design
other →
Top subcategories
Architecture
Communications
English
Gender Studies
Music
Performing Arts
Philosophy
Religious Studies
Writing
other →
Top subcategories
Ancient History
European History
US History
World History
other →
Top subcategories
Croatian
Czech
Finnish
Greek
Hindi
Japanese
Korean
Persian
Swedish
Turkish
other →
Profile
Documents
Logout
Upload
Engineering & Technology
Computer Science
Data Mining
Engineering & Technology
Computer Science
Data Mining
IOSR IOSR Journal of Computer Engineering (IOSR-JCE)
ioannis - Computer Science
Involving Aggregate Functions in Multi-Relational Search
Investigative Data Mining in Fraud Detection
investigations into the effectiveness of Gaussian and Nearest Mean
Investigation and Cogitation Upon Geospatial Knowledge Map
Investigating the Dark Cyberspace: Profiling
Investigating Collision Factors by Mining Microscopic Data of
Investigating Clinical Care Pathways Correlated with
Investigating and reflecting on the integration of automatic data
Investigating and Reflecting on the Integration of Automatic Data
Inverted Files for Text Search Engines 1. INTRODUCTION Text
Intuitive Representation of Decision Trees Using General Rules and
Intrusion Detection using Genetic Programming
Intrusion Detection Using Data Mining Techniques
Intrusion Detection Techniques using Machine Learning
Intrusion Detection Technique by using K
Intrusion Detection Systems - Department of Computer Science
Intrusion Detection System Using Means of Data Mining By Using C
Intrusion Detection System PPT.pdf
Intrusion Detection System by using K
<
1
...
803
804
805
806
807
808
809
810
811
...
931
>