虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Early-Late

  • Learning Kernel Classifiers: Theory and Algorithms, Introduction This chapter introduces the general

    Learning Kernel Classifiers: Theory and Algorithms, Introduction This chapter introduces the general problem of machine learning and how it relates to statistical inference. 1.1 The Learning Problem and (Statistical) Inference It was only a few years after the introduction of the first computer that one of man’s greatest dreams seemed to be realizable—artificial intelligence. Bearing in mind that in the early days the most powerful computers had much less computational power than a cell phone today, it comes as no surprise that much theoretical research on the potential of machines’ capabilities to learn took place at this time. This becomes a computational problem as soon as the dataset gets larger than a few hundred examples.

    标签: Introduction Classifiers Algorithms introduces

    上传时间: 2015-10-20

    上传用户:aeiouetla

  • Every day, patches are created to cover up security holes in software applications and operating sys

    Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.

    标签: applications operating security software

    上传时间: 2015-11-01

    上传用户:fhzm5658

  • This Strategic Information Systems Plan (SISP) documents a Strategic Data Model developed for the Kw

    This Strategic Information Systems Plan (SISP) documents a Strategic Data Model developed for the Kwangju Bank (KJB) in Kwangju, South Korea. Project Plans have been defined for early delivery of priority databases and application systems to support KJB management information needs.

    标签: Strategic Information documents developed

    上传时间: 2016-03-08

    上传用户:whenfly

  • This version of the book is a DRAFT! The chapters are mostly complete, but not carefully edited. Som

    This version of the book is a DRAFT! The chapters are mostly complete, but not carefully edited. Some of the debugging sections are not done, and not all chapters have exercises. If you have high-level comments about the organization of the book or the topics covered, please send me email at feedback{at}thinkpython{dot}com. It is probably too early for detailed comments like spelling errors.

    标签: carefully chapters complete version

    上传时间: 2014-08-29

    上传用户:ayfeixiao

  • DVD Demystified quickly became the bible of the industry. It has helped so many people understand D

    DVD Demystified quickly became the bible of the industry. It has helped so many people understand DVD technology. In spite of the publication of the DVD bible in late 1997, DVD technology refused to stand still. Unfinished variations such as writable DVD and DVD-Audio became less unfinished, and new applications such as WebDVD and Divx reshaped markets and perceptions.

    标签: Demystified understand the industry

    上传时间: 2013-12-21

    上传用户:黑漆漆

  • Linux_v1.0 source code, was applicable to study Linux software the personnel of the development in t

    Linux_v1.0 source code, was applicable to study Linux software the personnel of the development in the early years, there is detailed code annotation.

    标签: development applicable personnel the

    上传时间: 2013-12-22

    上传用户:zhuyibin

  • The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

    The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.

    标签: cryptography literature has Secrecy

    上传时间: 2016-12-08

    上传用户:fxf126@126.com

  • These routines model tropospheric radiowave propagation over variable terrain and calculates propaga

    These routines model tropospheric radiowave propagation over variable terrain and calculates propagation loss vs. height and range. Propagation loss is displayed in dB contours on a height vs. range plot. TPEM is based on the split-step Fourier PE method and was originally developed from an early PE model called PEPC, written by Fred Tappert. Propagation loss over variable terrain is modeled by shifting the field an appropriate number of bin widths correspondc ing to the height of the ground. The field is determined using the smooth earth PE method.

    标签: tropospheric propagation calculates radiowave

    上传时间: 2017-01-01

    上传用户:225588

  • Linux was first released into an unsuspecting world in the summer of 1991. Initially the spare-time

    Linux was first released into an unsuspecting world in the summer of 1991. Initially the spare-time hobby of a Finnish computer scientist by the name of Linus Torvalds, Linux was at first accessible only in software source code form to those with enough expertise to build and install it. Early enthusiasts (most also developers themselves by necessity) exploited the growth of the Internet in the early 1990s as a means to build online communities and drive development forward. These communities helped to build the first Linux software distributions, containing all the software components needed to install and use a Linux system without requiring users to be technical experts.

    标签: unsuspecting spare-time Initially the

    上传时间: 2013-12-12

    上传用户:dianxin61

  • learning English The following appeared in a memorandum written by the vice president of Nature s Wa

    learning English The following appeared in a memorandum written by the vice president of Nature s Way, a chain of stores selling health food and other health-related products. "Previous experience has shown that our stores are most profitable in areas where residents are highly concerned with leading healthy lives. We should therefore build our next new store in Plainsville, which has many such residents. Plainsville merchants report that sales of running shoes and exercise clothing are at all-time highs. The local health club, which nearly closed five years ago due to lack of business, has more members than ever, and the weight training and aerobics classes are always full. We can even anticipate a new generation of customers: Plainsville s schoolchildren are required to participate in a fitness for life program, which emphasizes the benefits of regular exercise at an early age.

    标签: memorandum following president learning

    上传时间: 2017-03-06

    上传用户:youth25