Search Results for -- UYGARLIK, ORTAÇAĞ, EDEBİYATTA. - Narrowed by: 2011 - Machine learning.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d--$002bUYGARLIK$00252C$002bORTA$0025C3$002587A$0025C4$00259E$00252C$002bEDEB$0025C4$0025B0YATTA.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026qf$003dSUBJECT$002509Subject$002509Machine$002blearning.$002509Machine$002blearning.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-09-10T07:30:35ZEvaluating Learning Algorithms A Classification Perspectiveent://SD_ILS/0/SD_ILS:2352732024-09-10T07:30:35Z2024-09-10T07:30:35ZAuthor Japkowicz, Nathalie. Shah, Mohak.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511921803">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bayesian artificial intelligenceent://SD_ILS/0/SD_ILS:2851792024-09-10T07:30:35Z2024-09-10T07:30:35ZAuthor Korb, Kevin B. Nicholson, Ann E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439815922">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data mining and machine learning in cybersecurityent://SD_ILS/0/SD_ILS:2907432024-09-10T07:30:35Z2024-09-10T07:30:35ZAuthor Dua, Sumeet. Du, Xian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439839430">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mining software specifications methodologies and applicationsent://SD_ILS/0/SD_ILS:2897522024-09-10T07:30:35Z2024-09-10T07:30:35ZAuthor Lo, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439806272">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:2852212024-09-10T07:30:35Z2024-09-10T07:30:35ZAuthor Mena, Jesus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mining software specifications : methodologies and applicationsent://SD_ILS/0/SD_ILS:2702322024-09-10T07:30:35Z2024-09-10T07:30:35ZAuthor Lo, David.<br/>Preferred Shelf Number QA76.9.D343 M558 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Self-adaptive systems for machine intelligenceent://SD_ILS/0/SD_ILS:2988732024-09-10T07:30:35Z2024-09-10T07:30:35ZAuthor He, Haibo, 1976- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118025604">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10484685">http://site.ebrary.com/lib/alltitles/Doc?id=10484685</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>