欢迎访问行业研究报告数据库

报告分类

重点报告推荐

当前位置:首页 > 行业导航

找到报告 44191 篇 当前为第 4295 页 共 4420

所属行业:信息传输、软件和信息技术服务业

  • 42941.在批发分销中从哪里开始数据挖掘——分布在从开始到大数据的应用预测分析

    [信息传输、软件和信息技术服务业] [2013-12-19]

    Large distributors are blazing the way in predictive analytics for distribution, which puts midsized distributors in a great position to take advantage of the larger companies' successes and failures. In this article, discover examples of how predictive analytics can be used to improve business operations in several different function departments in a wholesale distributor, and learn about the IBM product set, which works from exploration and first applications to big data as your skills and data grow in the future.
    关键词:批发开销;数据挖掘;IBM产品集;大数据
  • 42942.InfoSphere流介绍

    [信息传输、软件和信息技术服务业] [2013-12-19]

    Learn about InfoSphere Streams, part of the IBM big data platform. InfoSphere Streams addresses a crucial emerging need for platforms and architectures that can process vast amounts of generated streaming data in real time. Find out what the product is designed to do, when it can be useful, how it works, and how it can complement InfoSphere BigInsights? to perform highly complex analytics.
    关键词:介绍;InfoSphere;流
  • 42943.在InfoSphereBigInsights平台上关于的Cognos10.2商业智能报告

    [信息传输、软件和信息技术服务业] [2013-12-19]

    Learn how to consume IBM InfoSphere BigInsights data through IBM Cognos Business Intelligence 10.2.
    关键词:InfoSphere BigInsights ;商业智能报告;Cognos 10.2
  • 42944.用InfoSphereBigInsights开发、发布和展开你的第一个大数据应用程序

    [信息传输、软件和信息技术服务业] [2013-12-18]

    Developing your first Big Data application and deploying it across your distributed computing environment doesn't have to be a daunting task. Learn how to use Eclipse-based tools for InfoSphere? BigInsights? to expedite application development, package your application for publication in a web-based catalog, and deploy your application so that business staff and others can easily launch it.
    关键词:InfoSphere BigInsights;大数据应用程序;Jaql
  • 42945.在哺乳动物DNA甲基化研究中的统计算法

    [医药制造业,信息传输、软件和信息技术服务业] [2013-12-18]

    DNA methylation is a dynamic chemical modification that is abundant on DNA sequences and plays a central role in the regulatory mechanisms of cells. This modification can be inherited across cell divisions and generations, providing a “memory mechanism” for regulatory programs that is more flexible than that coded in the DNA sequence. In recent years, high-throughput sequencing technologies have enabled genome-wide annotation of DNA methylation. Coupled with novel computational machinery, these developments have enabled unperceivable insight to the characteristics,biological function and disease association of this phenomenon.
    关键词:DNA甲基化;统计算法
  • 42946.从历史数据估计数据中心的热相关指数

    [信息传输、软件和信息技术服务业] [2013-12-18]

    In order to better manage the cooling infrastructure in a data center with multiple computer room air conditioning (CRAC) units, the relationship between CRAC settings and temperature at various locations in the data center needs to be accurately and reliably determined. Usually this is done via a commissioning process which is both time consuming and disruptive. In this paper, we describe a machine learning based technique to model rack inlet temperature sensors in a data center as a function of CRAC settings. These models can then be used to automatically estimate thermal correlation indices (TCI) at any particular CRAC settings. We have implemented a prototype of our methodology in a real data center with eight CRACs and several hundred sensors. The temperature sensor models developed have high accuracy (mean RMSE error is 0.2 C). The results are validated using manual commissioning, demonstrating the effectiveness of our techniques in estimating TCI and in determining thermal zones or regions of influence of the CRACs.
    关键词:数据中心;温度传感器;裂纹;热区域的热相关指数;回归树;随机森林;机器学习
  • 42947.安全性分析:对一个组织的事件管理流程的风险分析

    [信息传输、软件和信息技术服务业] [2013-12-18]

    This document is an example of the type of report an organisation would receive at the end of a HP Security Analytics engagement. The focus is on the analysis of the security risks and performance of the organisation's Security Incident Management Processes and related Security Operation Centre (SOC)'s activities. HP Labs carried out the underlying R&D work in collaboration with HP Enterprise Security Services (HP ESS) and involved analysis of processes, probabilistic modeling, simulation and "what-if" analysis for some of HP's key customers. The outcome of this was a set of case studies from which we have been able to create this more general anonymised report illustrating the richness of the risk assessment and "what-if" analysis that has been carried out. The lifecycle management of security is critical for organisations to protect their key assets, ensure a correct security posture and deal with emerging risks and threats. It involves various steps, usually carried out on an ongoing, regular basis, including: risk assessment; policy definition; deployment of controls within the IT infrastructure; monitoring and governance. In this context, Security Information & Events Management (SIEM) solutions play a key role. Even the best information security practices and investments in security controls cannot guarantee that intrusions – accidental and criminal activities – and/or other malicious acts will not happen. Controls can fail, be bypassed or become inadequate over time; new threats emerge. Managing such incidents requires detective and corrective controls to minimise adverse impacts, gather evidence, and learn from previous situations in order to improve over time. These incident management processes are usually run in the context of a SOC and/or as part of specialised Computer Security Incident Response Teams (CSIRTS), built on top of SOCs. Even with SIEM solutions in place, a potential major risk for the organisation arises due to delays introduced in assessing and handling known incidents: this may postpone the successful resolution of critical security incidents (e.g. devices exposed on the Internet, exploitation of privileged accounts, deployed malware, etc.) and allow for further exploitation. Another related risk can be introduced by sudden and/or progressive changes of the threat landscape, due to changing economic and social scenarios, new business activities or process failings within the existing IT services. This might create unexpected volumes of new events and alerts to be processed by the security team and as such, introduce additional delays. Hence, it is important for an organisation to understand the risk exposure due to their Incident Management processes, explore potential future scenarios (e.g. changes in available resources or threats landscapes or adoption of Cloud solutions) and identify suitable ways to address related issues, e.g. by introducing process changes and/or making investments in security controls
    关键词:信息安全;安全分析;风险分析;如果分析;事件管理流程;SOC
  • 42948.文本摘要的凸方法

    [信息传输、软件和信息技术服务业] [2013-12-18]

    This dissertation presents techniques for the summarization and exploration of text documents. Many approaches taken towards analysis of news media can be analogized to well-de ned, well-studied problems from statistical machine learning. The problem of feature selection, for classi cation and dimensionality reduction tasks, is formulated to help assist with these media analysis tasks. Taking advantage of `1 regularization, convex programs can be used to eciently solve these feature selection problems eciently. There is a demon-strated potential to conduct media analysis at a scale commensurate with the growing volume of data available to news consumers.
    关键词:文本摘要;文本文档;机器学习
  • 42949.为实现可扩展性和灵活性的多代理集群调度

    [信息传输、软件和信息技术服务业] [2013-12-18]

    This dissertation presents a taxonomy and evaluation of three cluster scheduling architectures for scalability and exibility using a common high level taxonomy of cluster scheduling, a Monte Carlo simulator, and a real system implementation. We begin with the popular Monolithic State Scheduling (MSS), then consider two new architectures: Dynamically Partitioned State Scheduling (DPS) and Replicated State Scheduling (RSS). We describe and evaluate DPS, which uses pessimistic concurrency control for cluster resource sharing. We then present the design, implementation, and evaluation of Mesos, a real-world DPS cluster scheduler that allows diverse cluster computing frameworks to eciently share resources.
    关键词:可扩展性;灵活性;多代理集群调度
  • 42950.建立基于知识IE系统的俄语提取模板的方法学

    [信息传输、软件和信息技术服务业] [2013-12-18]

    In this technical report we describe methodology for building information extraction (IE) rules. Rules are usually developed by experts and are widely used in knowledge-based IE systems. They consist of two parts: the left-hand side (LHS) of a rule is a template that matches a certain syntactico-semantic structure (SSS) and the right-hand side is an action that is executed when LHS template is matched against a particular text fragment. In the report we describe the process of building a more complex LHS part (template). This methodology was used for developing the information extraction system that extracts business events from news articles written in Russian language.
    关键词:信息提取规则;事件抽取;词典;规则;模式;意义文本模式;乔姆斯基语法
首页  上一页  ...  4290  4291  4292  4293  4294  4295  4296  4297  4298  4299  ...  下一页  尾页  
© 2016 武汉世讯达文化传播有限责任公司 版权所有
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服