|
|
|
|
LEADER |
04200nmm a2200433 u 4500 |
001 |
EB002065265 |
003 |
EBX01000000000000001205355 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220901 ||| eng |
020 |
|
|
|a 9783031144639
|
100 |
1 |
|
|a Holzinger, Andreas
|e [editor]
|
245 |
0 |
0 |
|a Machine Learning and Knowledge Extraction
|h Elektronische Ressource
|b 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022, Vienna, Austria, August 23–26, 2022, Proceedings
|c edited by Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar Weippl
|
250 |
|
|
|a 1st ed. 2022
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2022, 2022
|
300 |
|
|
|a XIII, 378 p. 130 illus., 119 illus. in color
|b online resource
|
505 |
0 |
|
|a Explain to Not Forget: Defending Catastrophic Forgetting with XAI -- Approximation of SHAP values for Randomized Tree Ensembles -- Color shadows (part I): exploratory usability evaluation of activation maps in radiological machine learning -- Effects of Fairness and Explanation on Trust in Ethical AI -- Towards Refined Classifications driven by SHAP explanations -- Global Intepretable Calibration Index, a New Metric to Estimate Machine Learning Models' Calibration -- The ROC Diagonal is not Layperson’s Chance: a New Baseline Shows the Useful Area -- Debiasing MDI Feature Importance and SHAP values in Tree Ensembles -- The Influence of User Diversity on Motives and Barriers when Using Health Apps - A Conjoint Investigation of the Intention-Behavior Gap -- Identifying Fraud Rings Using Domain Aware Weighted Community Detection -- Capabilities, limitations and challenges of style transfer with CycleGANs: a study on automatic ring design generation -- Semantic Causal Abstraction for Event Prediction -- An Evaluation Study of Intrinsic Motivation Techniques applied to Reinforcement Learning over Hard Exploration Environments -- Towards Generating Financial Reports From Tabular Data Using Transformers -- Evaluating the performance of SOBEK text mining keyword extraction algorithm -- Classification of Screenshot Image Captured in Online Meeting System -- A survey on the application of virtual reality in event-related potential research -- Visualizing Large Collections of URLs Using the Hilbert Curve -- How to Reduce the Time Necessary for Evaluation of Tree-based Models -- An Empirical Analysis of and Guidelines for Synthetic-Data-based Anomaly Detection -- SECI Model in Data-Based Procedure for the Assessment of the Frailty State in Diabetic Patients -- Comparing machine learning correlations to domain experts’ causal knowledge: Employee turnover use case -- Machine learning and knowledge extraction to support work safety for smart forest operations
|
653 |
|
|
|a Software engineering
|
653 |
|
|
|a Information Storage and Retrieval
|
653 |
|
|
|a Software Engineering
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Formal Languages and Automata Theory
|
653 |
|
|
|a Database Management
|
653 |
|
|
|a Data mining
|
653 |
|
|
|a Information storage and retrieval systems
|
653 |
|
|
|a Machine theory
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Data Mining and Knowledge Discovery
|
653 |
|
|
|a Database management
|
700 |
1 |
|
|a Kieseberg, Peter
|e [editor]
|
700 |
1 |
|
|a Tjoa, A Min
|e [editor]
|
700 |
1 |
|
|a Weippl, Edgar
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Lecture Notes in Computer Science
|
028 |
5 |
0 |
|a 10.1007/978-3-031-14463-9
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-031-14463-9?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 006.3
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022, held in Vienna, Austria during August 2022. The 23 full papers presented were carefully reviewed and selected from 45 submissions. The papers are covering a wide range from integrative machine learning approach, considering the importance of data science and visualization for the algorithmic pipeline with a strong emphasis on privacy, data protection, safety and security
|