Farrokh Alemi,Sanja Avramovic,Mark D Schwartz
Farrokh Alemi
Existing methods of screening for substance abuse (standardized questionnaires or clinician's simply asking) have proven difficult to initiate and maintain in primary care settings. This article reports on how predictive modeling can be use...
Data-Driven Investment Strategies for Peer-to-Peer Lending: A Case Study for Teaching Data Science [0.03%]
基于数据的点对点借贷投资策略研究——数据科学研究教学案例
Maxime C Cohen,C Daniel Guetta,Kevin Jiao et al.
Maxime C Cohen et al.
We develop a number of data-driven investment strategies that demonstrate how machine learning and data analytics can be used to guide investments in peer-to-peer loans. We detail the process starting with the acquisition of (real) data fro...
David J Hand
David J Hand
Ready data availability, cheap storage capacity, and powerful tools for extracting information from data have the potential to significantly enhance the human condition. However, as with all advanced technologies, this comes with the potent...
On Building Online Visualization Maps for News Data Streams by Means of Mathematical Optimization [0.03%]
基于数学优化的新闻数据流在线可视化地图构造方法研究
Emilio Carrizosa,Vanesa Guerrero,Daniel Hardt et al.
Emilio Carrizosa et al.
In this article we develop a novel online framework to visualize news data over a time horizon. First, we perform a Natural Language Processing analysis, wherein the words are extracted, and their attributes, namely the importance and the r...
Pablo Basanta-Val,Luis Sánchez-Fernández
Pablo Basanta-Val
The proliferation of new data sources, stemmed from the adoption of open-data schemes, in combination with an increasing computing capacity causes the inception of new type of analytics that process Internet of things with low-cost engines ...
An Interview with Bart Baesens, One of the Authors of Principles of Database Management [0.03%]
数据库管理原理一书作者Bart Baesens访谈记
Wilfried Lemahieu,Seppe Vanden Broucke,Bart Baesens
Wilfried Lemahieu
Deep Learning Method for Denial of Service Attack Detection Based on Restricted Boltzmann Machine [0.03%]
基于限制波尔茨曼机的深度学习dos攻击检测方法
Yadigar Imamverdiyev,Fargana Abdullayeva
Yadigar Imamverdiyev
In this article, the application of the deep learning method based on Gaussian-Bernoulli type restricted Boltzmann machine (RBM) to the detection of denial of service (DoS) attacks is considered. To increase the DoS attack detection accurac...
Collective Behavior of Social Bots Is Encoded in Their Temporal Twitter Activity [0.03%]
社交机器人的集体行为反映在其推文的时序活动中
Andrej Duh,Marjan Slak Rupnik,Dean Korošak
Andrej Duh
Computational propaganda deploys social or political bots to try to shape, steer, and manipulate online public discussions and influence decisions. Collective behavior of populations of social bots has not been yet widely studied, although ...
How Heterogeneity Affects the Design of Hadoop MapReduce Schedulers: A State-of-the-Art Survey and Challenges [0.03%]
异构性如何影响Hadoop MapReduce调度器的设计:现状调查与挑战
Vaibhav Pandey,Poonam Saini
Vaibhav Pandey
MapReduce (MR) computing paradigm and its open source implementation Hadoop have become a de facto standard to process big data in a distributed environment. Initially, the Hadoop system was homogeneous in three significant aspects, namely,...
Editorial Message [0.03%]
编者按
Zoran Obradovic
Zoran Obradovic