The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra- group similarity while minimizing the inter-group similarity. The first and foremost question needed to be considered in clustering W b sessions is how to measure the similarity between Web sessions.However.there are many shortcomings in traditiona1 measurements.This paper introduces a new method for measuring similarities between Web pages that takes into account not only the URL but also the viewing time of the visited web page.Yhen we give a new method to measure the similarity of Web sessions using sequence alignment and the similarity of W eb page access in detail Experiments have proved that our method is valid and e币cient.
标签: sessions clustering similarity Web
上传时间: 2014-01-11
上传用户:songrui
The sample software includes, common library, peripheral APIs, and test modules for the APIs. The common library include startup file, standard definition and header files, processor specific setup module, generic interrupt related APIs, timer routine, and scatter loading file. The peripheral directories include, GPIO, PWM, Real-time clock, timer, SPI, I2C, Watchdog timer, UART, external interrupt, etc.
标签: APIs peripheral The includes
上传时间: 2014-01-15
上传用户:zl5712176
As the source code name, this code is writing in Verilog and also inside the folder there is a c code to see the simulation results from verilog.
上传时间: 2013-12-27
上传用户:wangdean1101
UC/OS-II的源代码注释的中英文对照版,对于想学习UC/OS-II而又英语欠佳的GGMM来说可是天大的福音噢!
上传时间: 2014-01-24
上传用户:3到15
本题要完成的是一组简单C表达的运算。所有表达式存放在文件 CExpression.txt 中,每个表达式一行。每行的长度不会超过80个字符。文件最后有一个空行表示结束。 每个表达式,只包含简单的整数变量和限定的一些操作符,表达式中没有常量。总共有26个可能出现在表达式中的变量,分别命名为 a,b,...,z。每个变量最多出现一次。26个变量的初值分别为1,2,...,26。 表达式中的操作符,包括:两个二元操作符 +, -,表示加,减运算。例如,表达式a+c-d+b(即1+3-4+2)的结果为2。 单独一个-号不能放在变量前面,表示负数。 表达式中还包含两个一元运算符:++,--,表示加一和减一运算。它们既可以出现在一个变量的前面、也可以出现在后面。如果出现在变量前面,则表示先对变量进行加一/减一运算,然后变量值参与表达式计算。如果出现在变量后面,则表示变量的原值参与表达式计算,表达式计算完之后,变量值加一/减一。 例如,表达式 -- c + b-- 的结果为 4, 表达式计算完之后, b,c的值分别为1,2 输出格式要求:输出直接显示在屏幕上。对于每个表达式,第一行输出表达式的内容。第二行输出表达式的值,后面几行输出参与运算的各个变量的结果值。
标签: CExpression txt 运算 表达式
上传时间: 2017-01-17
上传用户:cjf0304
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/
标签: open-source encryption Features software
上传时间: 2013-12-20
上传用户:123啊
anb 版的LBM程序 This code was written to show beginners in a simple and c short way the relevant procedures of a lattice Boltzmann solver, c pointing on how everything works "in principle". Nearly all c procedures could be implemented other (and better) as it is done c here, and even the algorithms used here could be changed to c save memory and increase performance. But the code works correct, c and we hope it will be good starting point for the first steps c in the lattice Boltzmann field. Good luck !
标签: beginners relevant written simple
上传时间: 2017-02-11
上传用户:wlcaption
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop
标签: programming language Java technology
上传时间: 2014-01-03
上传用户:huangld
C++ XML is a book exclusively devoted to the pow er and complexities of integrating XML standards into C++. As a developer,this is a book you cannot miss. C++ XML addresses all major standards,toolkits,and types of applications dealing with XML as a format for representing and exchanging data,as well as XML behavior,from a C++ standpoint. It explains the implementation of applications and reusuable frameworks for all major XML purposes exclusively using C/C++ parsers and toolkits, such as expat,Xerces,Xalan,libxml2,and Microsoft’s MSXML.
标签: complexities exclusively integrating XML
上传时间: 2014-03-11
上传用户:zhaiyanzhong
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
标签: effectiveness analytically numerically cloaking
上传时间: 2017-03-30
上传用户:zxc23456789