مصادر الجداول

  • (2-1) Fraud dataset with known classifications.
  • (3-1) Key−value database.
  • (3-2) A coded character string.
  • (4-1) 10-bit array.
  • (4-2) Summary of hash function results.
  • (4-3) Bloom filter for malicious email addresses.
  • (4-4) Votes cast for each webpage.
  • (6-1) Books bought by Smith, Jones, and Brown.
  • (6-2) Jaccard index and distance.
  • (6-3) Star ratings for purchases.

جميع الحقوق محفوظة لمؤسسة هنداوي © ٢٠٢٤