Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi...
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi...
基于chord算法的p2p文件系统。A p2p file system based on chord....
A data-based tool that can produce questionnaires dynamically which will be used to investigate clie...
Bing is a point-to-point bandwidth measurement tool (hence the b ), based on ping. Bing determines t...
This folder contains all the codes based on Matlab Language for the book <《Iterative Methods for ...
上下文无关文法(Context-Free Grammar, CFG)是一个4元组G=(V, T, S, P),其中,V和T是不相交的有限集,S∈V,P是一组有限的产生式规则集,形如A→α,其中A∈V,...
there are some newly released Neural Network Example Programs for Character Recognition, which based...
Ontology based personalized search A master thesis...
Gabor Transformation based on a Exocortex dsp d...
Second and Higher-Order Statistics based Multiple-Input-Multiple-Output System Blind Identification...