Flylib.com
Index_H
Previous page
Table of content
Next page
H
HNC software, 146–47
algorithms, 146
cluster trees, 147
See also
Text mining tools
Previous page
Table of content
Next page
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors:
Jesus Mena
BUY ON AMAZON
Building Web Applications with UML (2nd Edition)
Summary
Summary
HTML to UML
Vision
Design Model
SQL Hacks
Hack 8. Filter Rows and Columns
Text Handling
Hack 18. Sort Your Email
Hack 27. Identify Overlapping Ranges
Hack 79. Identify Updates Uniquely
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Working with the Microsoft Visual Basic .NET Language
Working with Console Applications
Working with the .NET Framework
Windows Server 2003 for .NET Developers
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and the World Wide Web
Captology Looking Forward
InDesign Type: Professional Typography with Adobe InDesign CS2
When to Kern
Drop Cap Aesthetics
Tricks with Drop Caps
First Baseline Options
Type Effects
Cultural Imperative: Global Trends in the 21st Century
Culture and Climate
Cross-Century Worldviews
Cognitive Processes
Epilogue After September 11
Appendix A Cultural Categorization Characteristics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies