Outlier Analysis (Record no. 59208)

000 -LEADER
fixed length control field 03644nam a22005535i 4500
001 - CONTROL NUMBER
control field 978-1-4614-6396-2
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112557.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130109s2013 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781461463962
-- 978-1-4614-6396-2
082 04 - CLASSIFICATION NUMBER
Call Number 006.312
100 1# - AUTHOR NAME
Author Aggarwal, Charu C.
245 10 - TITLE STATEMENT
Title Outlier Analysis
300 ## - PHYSICAL DESCRIPTION
Number of Pages XV, 446 p.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 An Introduction to Outlier Analysis -- Probabilistic and Statistical Models for Outlier Detection -- Linear Models for Outlier Detection -- Proximity-based Outlier Detection -- High-Dimensional Outlier Detection: The Subspace Method -- Supervised Outlier Detection -- Outlier Detection in Categorical, Text and Mixed Attribute Data -- Time Series and Multidimensional Streaming Outlier Detection -- Outlier Detection in Discrete Sequences -- Spatial Outlier Detection -- Outlier Detection in Graphs and Networks -- Applications of Outlier Analysis.
520 ## - SUMMARY, ETC.
Summary, etc With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions- the data can be of any type, structured or unstructured, and may be extremely large. Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists. The book has been organized carefully, and emphasis was placed on simplifying the content, so that students and practitioners can also benefit. Chapters will typically cover one of three areas: methods and techniques  commonly used in outlier analysis, such as linear methods, proximity-based methods, subspace methods, and supervised methods; data  domains, such as, text, categorical, mixed-attribute, time-series, streaming, discrete sequence, spatial and network data; and key applications of these methods as applied to diverse domains such as  credit card fraud detection, intrusion detection, medical diagnosis, earth science, web log analytics, and social network analysis are covered.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4614-6396-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- New York, NY :
-- Springer New York :
-- Imprint: Springer,
-- 2013.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Database management.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data mining.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information storage and retrieval.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Statistics.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Mining and Knowledge Discovery.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial Intelligence (incl. Robotics).
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Statistics and Computing/Statistics Programs.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Database Management.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Storage and Retrieval.
912 ## -
-- ZDB-2-SCS

No items available.