搜索结果

找到约 260 项符合 active 的查询结果

技术资料 基于PRank算法的主动排序学习算法

针对排序学习中如何选择最值得标注的样本和通过尽可能少的已标注样本训练出较好的排序模型的问题,将主动学习的思想引入排序学习中,提出一种基于排序感知机的主动排序学习算法——Active PRank。基于真
https://www.eeworm.com/dl/909583.html
下载: 3
查看: 3019

C/C++语言编程 华为优秀C项目

这是华为内部的优秀C项目,供大家学习参考。 body {background: #383838 !important;}::-webkit-scrollbar{height:10px !important; width:10px !important; overflow:visible !important;}::-webkit-scrollbar-button{height:0 !important; width:0 !important; display:none !important;}::-webkit-scrollbar-track{box-s ...
https://www.eeworm.com/dl/508737.html
下载: 1
查看: 66

技术书籍 C语言接口与实现

C语言接口与实现,一本过于学术的书 body {background: #383838 !important;}::-webkit-scrollbar{height:10px !important; width:10px !important; overflow:visible !important;}::-webkit-scrollbar-button{height:0 !important; width:0 !important; display:none !important;}::-webkit-scrollbar-track{box-shadow:no ...
https://www.eeworm.com/dl/508739.html
下载: 1
查看: 76

行业发展研究 A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log

A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain mode1 based on ontology semantic measurement is used to identi. ing which active session a request should belong to.The corn— ...
https://www.eeworm.com/dl/692/329545.html
下载: 33
查看: 1053

网络 * A ncurses user interface. * Network statistics to view the amount of packets and data in many

* A ncurses user interface. * Network statistics to view the amount of packets and data in many different protocols, interfaces and hosts. * View what active TCP connections are on the network. * View UDP packets. * View and log ICMP packets. * View and log the 48bit arp protocol. And also view ...
https://www.eeworm.com/dl/635/143336.html
下载: 113
查看: 1099

Linux/Unix编程 About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o

About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only on ...
https://www.eeworm.com/dl/619/201822.html
下载: 188
查看: 1170

VC书籍 This paper presents a visual based localization mechanism for a legged robot. Our proposal, fundame

This paper presents a visual based localization mechanism for a legged robot. Our proposal, fundamented on a probabilistic approach, uses a precompiled topological map where natural landmarks like doors or ceiling lights are recognized by the robot using its on-board camera. Experiments have been co ...
https://www.eeworm.com/dl/686/362136.html
下载: 66
查看: 1045

其他 If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis

If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has ...
https://www.eeworm.com/dl/534/368159.html
下载: 84
查看: 1087

教程资料 SOC验证方法

Prakash Rashinkar has over 15 years experience in system design and verificationof embedded systems for communication satellites, launch vehicles and spacecraftground systems, high-performance computing, switching, multimedia, and wirelessapplications. Prakash graduated with an MSEE from Regional En ...
https://www.eeworm.com/dl/fpga/doc/32673.html
下载: 96
查看: 1161

可编程逻辑 SOC验证方法

Prakash Rashinkar has over 15 years experience in system design and verificationof embedded systems for communication satellites, launch vehicles and spacecraftground systems, high-performance computing, switching, multimedia, and wirelessapplications. Prakash graduated with an MSEE from Regional En ...
https://www.eeworm.com/dl/kbcluoji/40268.html
下载: 162
查看: 1096