搜索资源列表
Semantic_Session_Analysis_for_Web_Usage_Mining
- A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain mode1 based on ontology semantic measurement is used to identi. ing which ac
BSC log export
- BSC log for omcr to tack a export masege
log
- Web日志挖掘技术应用研究相关的论文,这是一篇有代表性的文献:Query Result Clustering for Object-level Search-Web log mining techniques applied research related papers, this is a representative of the literature
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
OpenCV-Change-Logs
- Document explaining change log of OpenCV for easy reference of programmers. Using this document developer can quickly choose between the suitable version of OpenCV for his needs.
06387787.rar
- This paper deals with the modeling of the statistical distribution of the effective gain of terminals. This incorporates both the characteristics of the antenna’s radiation pattern in the situation of use, and the characteristics of the local pro
HP-Arcsight-platform
- 国内主要安全厂商的SIEM产品,原型基本上都来源于Arcsight,较业内竞争对手相比,Arcisght至少在下面三个方面具有绝对的优势:第一大优势:强大高效的日志采集功能 第二大优势:无与伦比的强大的关联分析功能 第三大优势:灵活的数据挖掘、检索、分析和报表管理功能.-Major domestic security vendors SIEM products, prototypes are basically derived from Arcsight, compared with the i
assigement-Sharp1
- 1-Log magnitude using 1024 point FFT over 25ms 2- Hamming Window at duration 1024 over 25ms 3- Log magnitude using 1024 FFT over interval 10ms
Log-Book-Kerja-Praktek
- log book for internship
3.dvcrypt_43962
- DVB dvCrypt card programmer log dumping and comments
Desktop
- 关于PBOC/EMV,写的很好的log。此log仅限个人查看,对行业没有规范要求。-A good log written about log, PBOC/EMV,This log only personal view, the industry has no specifications.
edgedetection
- LOG算子、拉普拉斯算子等几种边缘检测算子的比较-Comparison LOG operator, Laplace operator, such as several edge detection operator
06112200_2013
- Turbo codes have recently been considered for energy-constrained wireless communication applications, since they facilitate a low transmission energy consumption. How- ever, in order to reduce the overall energy consumption, lookup table-log-BCJR
Redis-deployment-on-windows
- redis是一个key-value存储系统。和Memcached类似,它支持存储的value类型相对更多,包括string(字符串)、 list(链表)、set(集合)、zset(sorted set –有序集合)和hash(哈希类型)。这些数据类型都支持push/pop、add/remove及取交集并集和差集及更丰富的操作,而且这些操作都是原 子性的。在此基础上,redis支持各种不同方式的排序。与memcached一样,为了保证效率,数据都是缓存在内存中。区别的是redis会周期性的 把更新
Log_Interpretation_Charts
- 斯伦贝谢石油公司的测井解释图版,非常全面-log interpretation chart of SLB