SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Stefano Dalla Palma

Stefano Dalla Palma

0 Followers
11 SlideShares 1 Clipboard 0 Followers 0 Followings
  • Unblock User Block User
11 SlideShares 1 Clipboard 0 Followers 0 Followings

Tags
classification machine learning software security software testing mutation testing perceptron artificial neural networks decision tree discriminant analysis logistic regression polynomial regression linear regression hierachical clustering kmeans knn regression reinforcement learning unsupervised learning supervised learning introduction software architecture mahout apache software vulnerability cbmc study bmc documentation database uml model modelling tools controversial analysis social media sentiment analysis twitter nlp prolog programming
See more
Presentations (11)
See all
Prolog in a nutshell
5 years ago • 168 Views
Detecting controversy in microposts: an approach based on word similarity with an application to the analysis of tweets
5 years ago • 111 Views
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
4 years ago • 274 Views
UML, ER and Dimensional Modelling
4 years ago • 180 Views
An Empirical Study on Bounded Model Checking
4 years ago • 57 Views
Apache Mahout Architecture Overview
4 years ago • 729 Views
Introduction to Machine Learning concepts
5 months ago • 8 Views
Introduction to Machine Learning with examples in R
5 months ago • 10 Views
Decision Tree learning
5 months ago • 12 Views
Artificial Neural Networks
5 months ago • 14 Views
Introduction to Mutation Testing
5 months ago • 16 Views
Likes (2)
Noonic Guides - Tecnologia Blockchain
Noonic Agency • 4 years ago
LinkedIn API Possibilities
LinkedIn Europe • 9 years ago
  • Activity
  • About

Presentations (11)
See all
Prolog in a nutshell
5 years ago • 168 Views
Detecting controversy in microposts: an approach based on word similarity with an application to the analysis of tweets
5 years ago • 111 Views
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
4 years ago • 274 Views
UML, ER and Dimensional Modelling
4 years ago • 180 Views
An Empirical Study on Bounded Model Checking
4 years ago • 57 Views
Apache Mahout Architecture Overview
4 years ago • 729 Views
Introduction to Machine Learning concepts
5 months ago • 8 Views
Introduction to Machine Learning with examples in R
5 months ago • 10 Views
Decision Tree learning
5 months ago • 12 Views
Artificial Neural Networks
5 months ago • 14 Views
Introduction to Mutation Testing
5 months ago • 16 Views
Likes (2)
Noonic Guides - Tecnologia Blockchain
Noonic Agency • 4 years ago
LinkedIn API Possibilities
LinkedIn Europe • 9 years ago
Tags
classification machine learning software security software testing mutation testing perceptron artificial neural networks decision tree discriminant analysis logistic regression polynomial regression linear regression hierachical clustering kmeans knn regression reinforcement learning unsupervised learning supervised learning introduction software architecture mahout apache software vulnerability cbmc study bmc documentation database uml model modelling tools controversial analysis social media sentiment analysis twitter nlp prolog programming
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.