Data Processing
epub |eng | 2015-02-20 | Author:Nick Pentreath [Pentreath, Nick]
Your output should look like this: 0.001 L2 regularization parameter, AUC = 66.55% 0.01 L2 regularization parameter, AUC = 66.55% 0.1 L2 regularization parameter, AUC = 66.63% 1.0 L2 regularization ...
( Category:
Machine Theory
July 20,2015 )
epub, pdf |eng | 2012-11-06 | Author:Q. Ethan McCallum [Q. Ethan McCallum]
* * * [39] See, for example, Lubotsky (2007) and Schwabish (2011). [40] Perhaps the most technical presentation of our work was published in Dahl, DeLeire, and Schwabish (2011). Interested ...
( Category:
Data Processing
June 14,2015 )
epub |eng | | Author:Second Edition
Functions returning a record To return a record from a Python function, you can use: A sequence or list of values in the same order as the fields in the ...
( Category:
Data Mining
June 7,2015 )
epub, pdf |eng | 2015-03-26 | Author:Sandy Ryza, Uri Laserson, Sean Owen & Josh Wills
Parsing XML Documents with Scala’s XML Library Scala has an interesting history with XML. Since version 1.2, Scala has treated XML as a first-class data type. This means that the ...
( Category:
Java
June 2,2015 )
epub |eng | 2015-05-28 | Author:Michael Covert & Victoria Loewengart [Covert, Michael]
Note Notice in the comments the code changes/additions necessary for Hadoop mode. In the next chapter, we will talk more about local and Hadoop modes. In the later chapters, you ...
( Category:
Java
June 1,2015 )
mobi, epub, pdf |eng | 2012-05-09 | Author:Tom White
( Category:
Java
March 3,2015 )
epub, pdf |eng | 2012-09-25 | Author:Eric Sammer [Eric Sammer]
Example: 0700 See Example 6-5 for a sample hdfs-site.xml file configured for security. Example 6-5. Updating hdfs-site.xml to enable Hadoop security <?xml version="1.0"?> <configuration> <property> <name>dfs.block.access.token.enable</name> <value>true</value> </property> <!-- NameNode ...
( Category:
Java
March 3,2015 )
azw3 |eng | 2009-02-08 | Author:Reese, George [Reese, George]
FLUSH FLUSH option[, option...] Flushes or resets various internal processes depending on the options given. You must have RELOAD privileges to execute this statement. The option can be any of ...
( Category:
MySQL
February 13,2015 )
mobi, epub |eng | 2009-11-29 | Author:Petzold, Charles [Petzold, Charles]
Beginning about 1820, Babbage believed that he could design and build a machine that would automate the process of constructing a table, even to the point of setting up type ...
( Category:
Software Development
February 2,2015 )
epub |eng | 2008-08-20 | Author:Skiena, Steven S. [Skiena, Steven S.]
Bounded height priority queues are very useful in maintaining the vertices of a graph sorted by degree, which is a fundamental operation in graph algorithms. Still, they are not as ...
( Category:
Combinatorics
January 10,2015 )
azw3, epub, pdf |eng | 2014-09-26 | Author:Kirk, Matthew [Kirk, Matthew]
quick 1 brown 2 fox 3 Now that we know what indices are attached to which words, we can take our string “the fox” and make a new row vector, ...
( Category:
Machine Theory
January 5,2015 )
epub |eng | 2005-03-01 | Author:Ken Bluttman & Bluttman Ken [Bluttman, Ken & Ken, Bluttman]
Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
( Category:
Hacking
November 28,2014 )
epub, mobi, pdf |eng | 2014-10-26 | Author:Kelly Goetsch
For more information on this topic, read The Art of Scalability by Martin L. Abbott and Michael T. Fisher (Addison-Wesley Professional). Technical Rules Convert synchronous to asynchronous In synchronous processing, ...
( Category:
Electronic Data Interchange (EDI)
October 27,2014 )
epub, pdf |eng | 2013-08-21 | Author:Bruce Sutherland [Sutherland, Bruce]
Broad-Phase Filtering in Droid Runner Our needs for broad-phase filtering are much more modest. Our level is of a fixed height, and all objects exist on a 2D plane, so ...
( Category:
C & C++ Tutorials
October 8,2014 )
epub |eng | 2010-11-11 | Author:Hewitt, Eben [Eben Hewitt]
Thrift Summary If you want to use Thrift directly for your project, there are numerous prerequisites for working on Windows (see http://wiki.apache.org/thrift/ThriftInstallationWin32) and many things that can go wrong. Partly ...
( Category:
Data Mining
April 6,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9777)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8293)
Azure Data and AI Architect Handbook by Olivier Mertens & Breght Van Baelen(6689)
Building Statistical Models in Python by Huy Hoang Nguyen & Paul N Adams & Stuart J Miller(6664)
Serverless Machine Learning with Amazon Redshift ML by Debu Panda & Phil Bates & Bhanu Pittampally & Sumeet Joshi(6537)
Data Wrangling on AWS by Navnit Shukla | Sankar M | Sam Palani(6326)
Driving Data Quality with Data Contracts by Andrew Jones(6277)
Machine Learning Model Serving Patterns and Best Practices by Md Johirul Islam(6044)
Learning SQL by Alan Beaulieu(5988)
Weapons of Math Destruction by Cathy O'Neil(5778)
Big Data Analysis with Python by Ivan Marin(5338)
Data Engineering with dbt by Roberto Zagni(4340)
Solidity Programming Essentials by Ritesh Modi(3985)
Time Series Analysis with Python Cookbook by Tarek A. Atwan(3841)
Pandas Cookbook by Theodore Petrou(3551)
Blockchain Basics by Daniel Drescher(3292)
Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2900)
Feature Store for Machine Learning by Jayanth Kumar M J(2808)
Learn T-SQL Querying by Pam Lahoud & Pedro Lopes(2791)
Mastering Python for Finance by Unknown(2743)
