- Main
- Computers - Computer Science
- Machine Learning for Hackers
Machine Learning for Hackers
Drew Conway, John Myles WhiteAvez-vous aimé ce livre?
Quelle est la qualité du fichier téléchargé?
Veuillez télécharger le livre pour apprécier sa qualité
Quelle est la qualité des fichiers téléchargés?
If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.
Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you’ll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research.
Develop a naïve Bayesian classifier to determine if an email is spam, based only on its text
Use linear regression to predict the number of page views for the top 1,000 websites
Learn optimization techniques by attempting to break a simple letter cipher
Compare and contrast U.S. Senators statistically, based on their voting records
Build a “whom to follow” recommendation system from Twitter data
Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you’ll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research.
Develop a naïve Bayesian classifier to determine if an email is spam, based only on its text
Use linear regression to predict the number of page views for the top 1,000 websites
Learn optimization techniques by attempting to break a simple letter cipher
Compare and contrast U.S. Senators statistically, based on their voting records
Build a “whom to follow” recommendation system from Twitter data
Catégories:
Année:
2012
Edition:
1
Editeur::
O'Reilly Media
Langue:
english
Pages:
322
ISBN 10:
1449303714
ISBN 13:
9781449303716
Fichier:
PDF, 23.08 MB
Vos balises:
IPFS:
CID , CID Blake2b
english, 2012
Télécharger (pdf, 23.08 MB)
- Checking other formats...
- Convertir en
- Débloquer la conversion des fichiers de plus de 8 MoPremium
Vous souhaitez ajouter une librairie ? Contactez-nous à support@z-lib.fm
Le fichier sera envoyé à votre adresse de courriel dans 1 à 5 minutes.
Dans 1-5 minutes, le fichier sera delivré à votre compte Telegram.
Note : Assurez-vous que vous avez lié votre compte au bot Telegram de Z-Library.
Dans 1-5 minutes, le fichier sera delivré à votre appareil Kindle.
Remarque: vous devez valider chaque livre avant de l'envoyer à Kindle. Veuillez vérifier votre messagerie pour voir le mail avec la confirmation par Amazon Kindle Support.
La conversion en est effectuée
La conversion en a échoué
Avantages du statut Premium
- Envoyez aux e-lecteurs
- Limite de téléchargement augmentée
- Convertissez des fichiers
- Plus de résultats de recherche
- Autres avantages