您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Identifying Malicious Code Through Reverse Engineering

  2. Identifying Malicious Code Through Reverse Engineering 2009新书,PDF,高清晰
  3. 所属分类:其它

    • 发布日期:2009-09-05
    • 文件大小:5242880
    • 提供者:F_FIRE
  1. Using Structural Information for Identifying Similar Chinese Characters.pdf

  2. Using Structural Information for Identifying Similar Chinese Characters.pdf
  3. 所属分类:其它

    • 发布日期:2010-07-04
    • 文件大小:116736
    • 提供者:shuoshuozhu
  1. ssd7 Skill builder

  2. ssd7Unit 1的skill builder答案,Identifying Keys and Integrity Constraints,90分
  3. 所属分类:其它

    • 发布日期:2011-04-20
    • 文件大小:15360
    • 提供者:hedgehogice
  1. The Art of Software Security Assessment Identifying

  2. The Art of Software Security Assessment Identifying and Preventing Software Vulnerabilities
  3. 所属分类:其它

    • 发布日期:2011-05-14
    • 文件大小:4194304
    • 提供者:muddy12345
  1. Skill Builder Identifying Keys and Integrity Constraints A

  2. Skill Builder Identifying Keys and Integrity Constraints A 有点简略。无分下载仅供参考
  3. 所属分类:数据库

    • 发布日期:2011-10-14
    • 文件大小:1024
    • 提供者:kamouswjw
  1. ssd7 unit1 Skill Builder Identifying Keys and Integrity Constraints B

  2. ssd7 unit1 Skill Builder Identifying Keys and Integrity Constraints B 有点简略。无分下载仅供参考
  3. 所属分类:数据库

    • 发布日期:2011-10-14
    • 文件大小:1024
    • 提供者:kamouswjw
  1. A bibliography on blind methods for identifying image forgery

  2. A bibliography on blind methods for identifying image forgery
  3. 所属分类:电信

    • 发布日期:2012-03-26
    • 文件大小:283648
    • 提供者:gongjiachang
  1. Hot Topic Propagation Model and Opinion Leader Identifying Model

  2. Hot Topic Propagation Model and Opinion Leader Identifying Model in Micro-blog Network
  3. 所属分类:电子商务

    • 发布日期:2016-02-18
    • 文件大小:1048576
    • 提供者:susannusas
  1. Identifying Malicious Code Through Reverse Engineering 无水印pdf

  2. Identifying Malicious Code Through Reverse Engineering 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
  3. 所属分类:其它

    • 发布日期:2017-09-24
    • 文件大小:6291456
    • 提供者:u011433684
  1. K-DBSCAN: Identifying Spatial Clusters With Differing Density Levels

  2. K-DBSCAN:Spatial clustering is a very important tool in the analysis of spatial data. In this paper, we propose a novel density based spatial clustering algorithm called K-DBSCAN with the main focus of identifying clusters of points with similar spa
  3. 所属分类:机器学习

    • 发布日期:2018-10-09
    • 文件大小:719872
    • 提供者:nick_wang94
  1. Identifying the distinct shear wrinkling behavior of woven composite preforms

  2. 论文全名《Identifying the distinct shear wrinkling behavior of woven composite preforms under bias extension and picture frame tests》
  3. 所属分类:制造

    • 发布日期:2019-02-10
    • 文件大小:1048576
    • 提供者:sinat_37819114
  1. Identifying Encrypted Malware Traffic with Contextual Flow Data.pdf

  2. Identifying Encrypted Malware Traffic with Contextual Flow Data, ETA
  3. 所属分类:网络监控

    • 发布日期:2020-01-21
    • 文件大小:771072
    • 提供者:ProComing
  1. Identifying-Medical-Diagnoses-and-Treatable-Diseases-by-Image-Based_2018_Cel.pdf

  2. Identifying-Medical-Diagnoses-and-Treatable-Diseases-by-Image-Based_2018_Cel.pdf
  3. 所属分类:深度学习

    • 发布日期:2020-07-28
    • 文件大小:4194304
    • 提供者:haimianjie2012
  1. wg-identifying-security-threats:识别安全威胁工作组的目的是使利益相关者对开源项目的安全性有充分的信心。为此,我们通过收集,管理和交流来自开源项目及其所属生态系统的相关指标和元数据来实现这一目标-源码

  2. 识别开源项目中的安全威胁 该工作组的目的是使利益相关者对开源项目的安全性有充分的信心。我们通过收集,管理和交流来自开源项目及其所属生态系统的相关指标和元数据来做到这一点。 动机 开源软件是现代软件开发以及几乎所有技术解决方案的重要组成部分。在过去的二十年中,开源软件的使用量不断增长,它为从微型“物联网”设备到世界上最先进的超级计算机的各种设备提供动力。这带来了巨大的生产率提高,从而使软件工程师可以将更多的精力放在解决业务问题上,而不必将精力集中在创建和重新创建许多情况下所需的相同构造块上。 但是
  3. 所属分类:其它

    • 发布日期:2021-03-21
    • 文件大小:4194304
    • 提供者:weixin_42133452
  1. Identifying-Genes-Associated-with-Symptom-Status-源码

  2. 识别与症状状态相关的基因
  3. 所属分类:其它

    • 发布日期:2021-03-19
    • 文件大小:347136
    • 提供者:weixin_42129412
  1. Research on identifying the order of fringe pattern traces using angular scan and zone search method

  2. A method for automatically identifying the order of fringe pattern traces is presented. It uses the simplified Otsu algorithm for obtaining the threshold, the angular scan in the range of 45 angle for searching the trace positions, and the zone searc
  3. 所属分类:其它

    • 发布日期:2021-03-04
    • 文件大小:909312
    • 提供者:weixin_38571603
  1. A Community-Based Approach to Identifying Influential Spreaders

  2. A Community-Based Approach to Identifying Influential Spreaders
  3. 所属分类:其它

    • 发布日期:2021-02-21
    • 文件大小:1048576
    • 提供者:weixin_38740144
  1. Identifying Image Composites Through Shadow Matte Consistency

  2. Identifying Image Composites Through Shadow Matte Consistency
  3. 所属分类:其它

    • 发布日期:2021-02-20
    • 文件大小:393216
    • 提供者:weixin_38586942
  1. GPCR-GIA: a web-server for identifying G-protein coupled receptors and their families with grey incidence analysis

  2. GPCR-GIA: a web-server for identifying G-protein coupled receptors and their families with grey incidence analysis
  3. 所属分类:其它

    • 发布日期:2021-02-20
    • 文件大小:208896
    • 提供者:weixin_38635323
  1. Identifying Key Opinion Leaders in Social Media via Modality-Consistent Harmonized Discriminant Embedding

  2. Identifying Key Opinion Leaders in Social Media via Modality-Consistent Harmonized Discriminant Embedding
  3. 所属分类:其它

    • 发布日期:2021-02-11
    • 文件大小:1048576
    • 提供者:weixin_38677306
« 12 3 4 5 6 7 8 9 10 ... 20 »