资源列表

« 1 2 ... .69 .70 .71 .72 .73 15974.75 .76 .77 .78 .79 ... 16929 »

[软件工程GC

说明:Computer graphics ... simpe exmaple
<cearly> 在 2024-11-18 上传 | 大小:60kb | 下载:0

[编程文档WDM-CWDM-DWDM-Segmentation-Primer

说明:WDM CWDM DWDM Segmentation Primer
<ahmed > 在 2024-11-18 上传 | 大小:1.19mb | 下载:0

[编程文档BackTrack-5-Wireless-Penetration-Testing---2011.r

说明:Wireless Networks have become ubiquitous in today s world. Millions of people use them worldwide every day at their homes, offices, and public hotspots to log on to the Internet and do both personal and professional work
<ahmed > 在 2024-11-18 上传 | 大小:12.72mb | 下载:0

[编程文档Social-Network-Analysis-in-Construction-(PDF)

说明:This book responds to, and builds upon, two previous books: The Management of Complex Projects: A Relationship Approach and Collaborative Relationships in
<ahmed > 在 2024-11-18 上传 | 大小:2.47mb | 下载:0

[行业发展研究Detection-of-Syn-Flooding-Attacks-using-Linear-Pr

说明:This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection
<ahmed > 在 2024-11-18 上传 | 大小:3.36mb | 下载:0

[行业发展研究Discrete-choice-analysis-of-spatial-attack-sites.

说明:This paper presents an algorithm for the complete specification of multinomial discrete choice models to predict the spatial preferences of attackers. The formulation employed is a modification of models previously
<ahmed > 在 2024-11-18 上传 | 大小:531kb | 下载:0

[行业发展研究EFFECTIVENESS-OF-SUPPORT-VECTOR-MACHINE-FOR-CRIME

说明:Crime hot-spot location prediction is important for public safety. The output from the prediction can provide useful information to improve the activities aimed at detecting and preventing safety and security problem
<ahmed > 在 2024-11-18 上传 | 大小:443kb | 下载:0

[行业发展研究GAPatrol--An-Evolutionary-Multiagent-Approach-for

说明:In this work, we present a novel evolutionary multiagent-based simulation tool, named as GAPatrol. Such system is devoted to the specification of effective police patrol route strategies for coping with criminal acti
<ahmed > 在 2024-11-18 上传 | 大小:226kb | 下载:0

[行业发展研究Insider-threat-mitigation--preventing-unauthorize

说明:This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines vari
<ahmed > 在 2024-11-18 上传 | 大小:549kb | 下载:0

[行业发展研究Internet-Threat-Detection--Prediction-and-Relevan

说明:With the development of Internet technology, the popularity of the malicious threat has grown beyond our imagination. The emergence of intelligent, sophisticated attack techniques makes the Internet services more v
<ahmed > 在 2024-11-18 上传 | 大小:308kb | 下载:0

[行业发展研究Mapping-crime--Understanding-hot-spots

说明:Much of crime mapping is devoted to detecting high-crime-density areas known as hot spots. Hot spot analysis helps police identify high-crime areas, types of crime being committed, and the best way to respond.
<ahmed > 在 2024-11-18 上传 | 大小:1.05mb | 下载:0

[行业发展研究New-tools-in-non-linear-modelling-and-prediction.

说明:In this paper we give an account of a new change of perspective in nonlinear modelling and prediction as applied to smooth systems. The core element of these developments is the Gamma test a non-linear modelling and
<ahmed > 在 2024-11-18 上传 | 大小:946kb | 下载:0
« 1 2 ... .69 .70 .71 .72 .73 15974.75 .76 .77 .78 .79 ... 16929 »

源码中国 www.ymcn.org