Design for large-scale, high-performance queries using Snowflake's query processing engine to empower data consumers with timely, comprehensive, and secure access to data.
This text covers all of the data science, machine learning, and deep learning topics relevant to materials science and engineering, accompanied by numerous examples and applications.
In today's fast-paced digital landscape, organizations face an ever-increasing volume of data that holds immense potential for driving business success.
Reinforcement learning is a powerful tool in artificial intelligence in which virtual or physical agents learn to optimize their decision making to achieve long-term goals.
Machine learning and artificial intelligence (AI) are powerful tools that create predictive models, extract information, and help make complex decisions.
From its inception, artificial intelligence (AI) has had a rather ambivalent relationship with humans-swinging between their augmentation and replacement.
This Second Volume in the series Handbook of Dynamic Data Driven Applications Systems (DDDAS) expands the scope of the methods and the application areas presented in the first Volume and aims to provide additional and extended content of the increasing set of science and engineering advances for new capabilities enabled through DDDAS.
This book of the bestselling and widely acclaimed Python Machine Learning series is a comprehensive guide to machine and deep learning using PyTorch s simple to code framework.
Machine Learning: A Constraint-Based Approach, Second Edition provides readers with a refreshing look at the basic models and algorithms of machine learning, with an emphasis on current topics of interest that include neural networks and kernel machines.
Anomaly detection in video surveillance stands at the core of numerous real-world applications that have broad impact and generate significant academic and industrial value.
The multi-volume set LNAI 12975 until 12979 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2021, which was held during September 13-17, 2021.
Learn the fundamental aspects of the business statistics, data mining, and machine learning techniques required to understand the huge amount of data generated by your organization.
Discover key information buried in the noise of data by learning a variety of anomaly detection techniques and using the Python programming language to build a robust service for anomaly detection against a variety of data types.
Anomaly detection in video surveillance stands at the core of numerous real-world applications that have broad impact and generate significant academic and industrial value.
The Encyclopedia of Social Network Analysis and Mining (ESNAM) is the first major reference work to integrate fundamental concepts and research directions in the areas of social networks and applications to data mining.
This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications.
This Springer Brief presents a basic algorithm that provides a correct solution to finding an optimal state change attempt, as well as an enhanced algorithm that is built on top of the well-known trie data structure.
Implement the Snowflake Data Cloud using best practices and reap the benefits of scalability and low-cost from the industry-leading, cloud-based, data warehousing platform.
Discover key information buried in the noise of data by learning a variety of anomaly detection techniques and using the Python programming language to build a robust service for anomaly detection against a variety of data types.
Implement the Snowflake Data Cloud using best practices and reap the benefits of scalability and low-cost from the industry-leading, cloud-based, data warehousing platform.
Understand the different access control paradigms available in the Snowflake Data Cloud and learn how to implement access control in support of data privacy and compliance with regulations such as GDPR, APPI, CCPA, and SOX.