虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

decisions

  • Learning and Making decisions When Costs and Probabilities are Both Unknown

    Learning and Making decisions When Costs and Probabilities are Both Unknown

    标签: Probabilities decisions and Learning

    上传时间: 2014-01-21

    上传用户:waitingfy

  • Java has become a confusing world. Five years ago, there were few decisions to make once you start

    Java has become a confusing world. Five years ago, there were few decisions to make once you started programming in Java—you used AWT for graphical user interfaces, sockets for network programming, and hacked together everything else you needed. Since then, though, the APIs available for the Java language have grown, and grown. . . and grown. Now you can dabble in Swing, servlets, Enterprise JavaBeans (EJB), JavaMail, and more. Additionally, there are now packages of APIs, like the Java 2 Micro Edition (J2ME) and Java 2 Enterprise Edition (J2EE). While these packages seem to be nicely wrapped bundles of useful APIs, they don t help the average developer figure out how to piece together the APIs contained in these packages. Though it s simple to find documentation on the individual APIs, getting the "big picture" is difficult, at best. One of the most interesting, but difficult, aspects of Java today is building Java enterprise applications using the J2EE package.

    标签: confusing decisions become world

    上传时间: 2013-12-30

    上传用户:haoxiyizhong

  • Quality, object.oriented architecture is the product of careful study, decision making, and experim

    Quality, object.oriented architecture is the product of careful study, decision making, and experimentation. At a minimum, the object.oriented architecture process includes farming of requirements, architecture mining, and hands.on experience. Ideally, object.oriented architecture comprises a set of high.quality design decisions that provide benefits throughout the life cycle of the system.

    标签: architecture decision oriented Quality

    上传时间: 2014-10-28

    上传用户:love_stanford

  • Expert Choice represents a significant contribution to the decision making process 工t assists a deci

    Expert Choice represents a significant contribution to the decision making process 工t assists a decision maker in solving complex problems involving many criteria and several courses of action . An Expert Choice solution to a problem reflects the expertise of the decision maker , not the computer . Behavioral scientists have spent many years studying the human mind and how it makes decisions . They have found that humans are influenced by their previous experiences and this causes them to have biases . Basic instincts , preferences and environmental factors also play key roles in how we analyze data and make decisions . There 15 way to remove these factors from human decision making , nor would we necessarily want to , but as the problems of our world become more and more complex , it 15 necessary for us to employ a framework to help make more logical and less biased decisions while still taking our feelings and intuition into consideration .

    标签: contribution significant represents decision

    上传时间: 2015-06-02

    上传用户:gmh1314

  • This book keeps the exposition as straightforward as possible and enables you to cut through the maz

    This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN."

    标签: straightforward exposition the possible

    上传时间: 2014-01-07

    上传用户:851197153

  • 《为Windows Vista编写安全的代码》

    《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    标签: Windows Vista 编写 代码

    上传时间: 2016-01-07

    上传用户:zxc23456789

  • After an introduction to the history of mobile communications, this guide considers the basics of mo

    After an introduction to the history of mobile communications, this guide considers the basics of mobile radio, the design of cellular and private radio systems, and issues of interworking with the fixed network. It then looks at the role of the mobile radio operator, the design and operation of mobile radio networks, the needs of large user groups, and relevant regulatory and government decisions. A final section focuses on career development through resolution of conflicts, understanding managerial issues, and professional vehicles.

    标签: communications introduction considers the

    上传时间: 2016-06-24

    上传用户:nanshan

  • Learn how to build a custom Linux® distribution to use in an embedded environment, in this case

    Learn how to build a custom Linux® distribution to use in an embedded environment, in this case to drive a Technologic Systems TS-7800 single-board computer. In this tutorial, you learn about cross-compiling, the boot loader, file systems, the root file system, disk images, and the boot process, all with respect to the decisions you make as you re building the system and creating the distribution.

    标签: distribution environment embedded custom

    上传时间: 2013-12-23

    上传用户:stella2015

  • Java technology is both a programming language and a platform. The Java programming language origina

    Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop

    标签: programming language Java technology

    上传时间: 2014-01-03

    上传用户:huangld

  • 卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章

    卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.

    标签: 大学 数据

    上传时间: 2017-08-29

    上传用户:thinode