ELEMENTS OF COMPUTER SCIENCE
open-menucloseme
Home
Books
About us
  • Truly understanding logistic regression - Part 3

    calendarDec 28, 2023 · 6 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will outline the process of training the logistic regression algorithm.
    Read More
  • Truly understanding logistic regression - Part 2

    calendarDec 28, 2023 · 8 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we explore what logistic regression is and in particular unveil how its mathematical principles emerge organically within the framework of probability, elucidating why it is extensively utilized.
    Read More
  • Truly understanding logistic regression - Part 1

    calendarDec 28, 2023 · 2 min read  ·
    Share on: twitterfacebooklinkedincopy
    Starting today, we are launching a series of articles on logistic regression, taking a progressive approach: our purpose is to blend theoretical concepts with practical implementation (in C#), offering clear illustrations of the associated challenges (with a particular focus on the IRLS algorithm).
    Read More
  • Implementing the Saga pattern on Azure - Part 1

    calendarDec 18, 2023 · 2 min read  ·
    Share on: twitterfacebooklinkedincopy
    Starting today, we are launching a series of articles on the Saga pattern. Our goal is to blend theoretical concepts with practical implementation (in C#), offering clear illustrations of the associated challenges.
    Read More
  • Implementing the Saga pattern on Azure - Part 2

    calendarDec 18, 2023 · 3 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we explore why traditional transactions are not well-suited to the emerging serverless paradigm. We also emphasize some valuable definitions and concepts.
    Read More
  • Implementing the Saga pattern on Azure - Part 3

    calendarDec 18, 2023 · 5 min read  ·
    Share on: twitterfacebooklinkedincopy
    We will now delve into the Saga pattern, providing its definitions and exploring how it is conventionally presented in the industry.
    Read More
  • Implementing the Saga pattern on Azure - Part 4

    calendarDec 18, 2023 · 7 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this concluding post, we will enact the implementation of the Saga pattern on Azure using C#.
    Read More
  • Implementing decision trees with the C4.5 algorithm - Part 1

    calendarDec 14, 2023 · 2 min read  ·
    Share on: twitterfacebooklinkedincopy
    Starting today, we are launching a series of articles on decision trees, taking a progressive approach with a particular focus on the C4.5 algorithm. Our goal is to blend theoretical concepts with practical implementation (in C#), offering clear illustrations of the associated challenges.
    Read More
  • Implementing decision trees with the C4.5 algorithm - Part 2

    calendarDec 14, 2023 · 6 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we provide a precise definition of entropy to better prepare for the upcoming articles.
    Read More
  • Implementing decision trees with the C4.5 algorithm - Part 3

    calendarDec 14, 2023 · 6 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this article, we delve into the intricacies of the ID3 algorithm, applying the knowledge we've acquired to gain a profound understanding of its workings.
    Read More
    • ««
    • «
    • 9
    • 10
    • 11
    • 12
    • 13
    • »
    • »»

Nicolas DESCARTES

This blog gathers the contributions of a passionate software engineer convinced that getting to the bottom of things is the best way to truly understand the big picture. Follow @EOCS_Descartes
Read More

Don't miss new articles

/* Real people should not fill this in and expect good things - do not remove this or risk form bot signups. */

Recent Posts

  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Implementing Azure Key Vault
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Implementing managed identities
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - The traditional approach and its drawbacks
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Introduction
  • Engineering a compiler through examples: building a mathematical expression engine - Part 6
  • Engineering a compiler through examples: building a mathematical expression engine - Part 5
  • Engineering a compiler through examples: building a mathematical expression engine - Part 4
  • Engineering a compiler through examples: building a mathematical expression engine - Part 3
Nicolas DESCARTES

Copyright  NICOLAS DESCARTES

to-top