搜索结果
找到约 878 项符合
NetWork-shy 的查询结果
Linux/Unix编程 fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be releas
fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be released at the DEFCON 12 conference in July, 2004 in Las Vegas.
fwknop implements network access controls (via iptables) based on a flexible port knocking mini-language, but with a twist it combines port ...
其他书籍 This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page
This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active
Server Pages environment, but most of the techniques discussed have equivalents in other
database environments. It should be viewed as a "follow up", or perhaps an appendix, to
the previous paper, "Advanced SQL ...
其他书籍 15篇光流配准经典文献
15篇光流配准经典文献,目录如下:
1、A Local Approach for Robust Optical Flow Estimation under Varying
2、A New Method for Computing Optical Flow
3、Accuracy vs. Efficiency Trade-offs in Optical Flow Algorithms
4、all about direct methods
5、An Introduction to OpenCV and Optical Flow
6、Bayesian Real ...
其他书籍 rhce linux learning guide 1.01 Basic Linux Knowledge 1.02 Linux Filesystem Hierarchy and Structur
rhce linux learning guide
1.01 Basic Linux Knowledge
1.02 Linux Filesystem Hierarchy
and Structure
1.03 Basic Commands
1.04 Printing
1.05 The Linux/Unix Shell
1.06 Basic Security
1.07 Linux/Unix System Administration
1.08 Basic TCP/IP Networking
1.09 Standard Network Services
1.10 Basic Network Secu ...
通讯编程文档 H.264/AVC, the result of the collaboration between the ISO/IEC Moving Picture Experts Group and the
H.264/AVC, the result of the collaboration between the ISO/IEC
Moving Picture Experts Group and the ITU-T Video Coding
Experts Group, is the latest standard for video coding. The goals
of this standardization effort were enhanced compression efficiency,
network friendly video representation for inte ...
数值算法/人工智能 Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs
Batch version of the back-propagation algorithm.
% Given a set of corresponding input-output pairs and an initial network
% [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the
% network with backpropagation.
%
% The activation functions must be either linear or tanh. The network
...
matlab例程 This function calculates Akaike s final prediction error % estimate of the average generalization e
This function calculates Akaike s final prediction error
% estimate of the average generalization error.
%
% [FPE,deff,varest,H] = fpe(NetDef,W1,W2,PHI,Y,trparms) produces the
% final prediction error estimate (fpe), the effective number of
% weights in the network if the network has been train ...
人工智能/神经网络 This function calculates Akaike s final prediction error % estimate of the average generalization e
This function calculates Akaike s final prediction error
% estimate of the average generalization error for network
% models generated by NNARX, NNOE, NNARMAX1+2, or their recursive
% counterparts.
%
% [FPE,deff,varest,H] = nnfpe(method,NetDef,W1,W2,U,Y,NN,trparms,skip,Chat)
% produces the fin ...
Java书籍 Distributed applications, devices, and services appear in many different arrangements in an enterpr
Distributed applications, devices, and services appear in many different arrangements in an
enterprise. At your company, you probably access data from your intranet services, from
computers distributed throughout the company network, and from services across the firewall out
on the Web. For example, ...
其他 In this computer arriving and infecting through MIRC disseminates and duplicates worm s noumenonn of
In this computer arriving and infecting through MIRC disseminates and duplicates worm s noumenonn of worm file, in mirc catalogue , will produce a script.ini file , will let the worm be disseminated through Mirc communication software by this. In addition, sweet-smelling neighbor which the worm will ...