搜索结果
找到约 309 项符合
BEst-known 的查询结果
Internet/网络编程 The tool presented below tries to detect from remote if the target machine was compromised with the
The tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender rootkit. The tool connect to the remote host, and compares the reply to several known replies. The rootkits that can be detected by the tool are: HACKER Defender v1.0.0 and below.
电子书籍 we shall examine nonparametric procedures that can be used with arbitrary distributions and without
we shall examine nonparametric procedures that can be used with arbitrary distributions and without the assumption that the forms of theunderlying densities are known.
Java书籍 DESIGN PATTERNS JAVA COMPANION Design patterns began to be recognized more formally in the early 1
DESIGN PATTERNS JAVA COMPANION
Design patterns began to be recognized more formally in the early
1990s by Helm (1990) and Erich Gamma (1992), who described patterns
incorporated in the GUI application framework, ET++. The culmination of
these discussions and a number of technical meetings was the pu ...
matlab例程 % This program calculates Dilution of Precision with respect to a GPS * % receiver given its Cartes
% This program calculates Dilution of Precision with respect to a GPS *
% receiver given its Cartesian ECEF position and the positions of four or *
% more visible GPS satellites. It is a validation of the DOP algorithm and *
% contains reference positions for which the DOP results are known. * ...
文章/文档 QoS in ternet IP revolution - from “IP over everything” to “everything over IP” Current Internet g
QoS in ternet
IP revolution - from “IP over everything” to “everything over IP”
Current Internet guarantee: Best Effort only.
软件设计/软件工程 Just what is a regular expression, anyway? Take the tutorial to get the long answer. The short answ
Just what is a regular expression, anyway?
Take the tutorial to get the long answer. The short answer is that a regular expression
is a compact way of describing complex patterns in texts. You can use them to search
for patterns and, once found, to modify the patterns in complex ways. You can also u ...
数学计算 When working with mathematical simulations or engineering problems, it is not unusual to handle curv
When working with mathematical simulations or engineering problems, it is not unusual to handle curves that contains thousands of points. Usually, displaying all the points is not useful, a number of them will be rendered on the same pixel since the screen precision is finite. Hence, you use a lot o ...
人工智能/神经网络 模式识别学习综述.该论文的英文参考文献为303篇.很有可读价值.Abstract— Classical and recent results in statistical pattern recog
模式识别学习综述.该论文的英文参考文献为303篇.很有可读价值.Abstract— Classical and recent results in statistical pattern
recognition and learning theory are reviewed in a two-class
pattern classification setting. This basic model best illustrates
intuition and analysis techniques while still contain ...
Linux/Unix编程 1994年
1994年,Young和Mark Ewing创建了Red Hat公司,并创造了全球使用最广泛的Red Hat Linux套件,为Linux的普及立下了汗马功劳,笔者也是跟随着Red Hat的带领下走进Linux世界的。Red Hat取得了辉煌的成绩,甚至许多Linux发行公司还采用了许多Red Hat Linux的代码,如Mandrake、SOT Best、Connectiva、Abit和Kondara。可以说,Re ...
SQL Server Here we are at the crossroads once again Youre telling me youre so confused You cant make up your
Here we are at the crossroads once again
Youre telling me youre so confused
You cant make up your mind
Is this meant to be
Youre asking me
Trademark
But only love can say - try again or walk away
But I believe for you and me
The sun will shine one day
So Ill just play my part
And pray you ll have a ...