您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. mips32 4ksd内核软件用户手册

  2. mips 的 4ksd芯片手册 Unpublished work (C) MIPS Technologies, Inc. All rights reserved. Unpublished rights reserved under the copyright laws of the United States of America and other countries. This document contains information that is confidential and p
  3. 所属分类:硬件开发

    • 发布日期:2009-05-06
    • 文件大小:886784
    • 提供者:puyoupuyou
  1. Dev2000_Build_Forms_I_Student_Guide_vol01

  2. This documentation contains proprietary information of Oracle Corporation. It is provided under a license agreement containing restrictions on use and disclosure and is also protected by copyright law. Reverse engineering of the software is prohibit
  3. 所属分类:Oracle

    • 发布日期:2009-05-07
    • 文件大小:2097152
    • 提供者:apples80000
  1. 英语毕业设计论文PPT模版

  2. 英语毕业设计论文(ppt模版),欢迎下载。。 Identity theft is the unauthorized collection and use of your personal information, usually for criminal purposes. Identity thieves steal personal information. They collect Social Security numbers, banking records and telephon
  3. 所属分类:专业指导

    • 发布日期:2009-05-28
    • 文件大小:350208
    • 提供者:shouji_2009
  1. Web Security & Commerce

  2. Topics include: • User safety - browser vulnerabilities (with an emphasis on Netscape Navigator and Microsoft Internet Explorer), privacy concerns, issues with Java, Javascr ipt, ActiveX, and plug-ins. • Digital certificates - what they are, how the
  3. 所属分类:Web开发

    • 发布日期:2009-08-15
    • 文件大小:3145728
    • 提供者:vilon888
  1. 基于VRML的三维场景生成工具的设计与实现

  2. 中文摘要: VRML是Internet上标准的三维文件格式。由于VRML文件格式很复杂,对于普通的非专业用户(比如刑侦人员)来说,直接通过编辑文本来书写文件创建VRML场景是很困难的。同时,案件现场的三维表现比二维图或静态的图片、文字的现场描述更加直观、形象、全面,有利于案件的汇报、交流、进一步分析、破案指挥。本文根据案件三维现场再现的需求以及刑侦人员试用后的新的需求,设计并实现了一个可视化的所见即所得的三维场景搭建工具。任何不了解VRML文件格式的用户都可以很快掌握这种搭建工具,只用鼠标就可
  3. 所属分类:其它

    • 发布日期:2009-12-26
    • 文件大小:6291456
    • 提供者:yuanwenmao
  1. criminal profiling

  2. criminal profiling,geographic profiling
  3. 所属分类:虚拟化

    • 发布日期:2010-02-22
    • 文件大小:118784
    • 提供者:lantu214
  1. A Methodological Model

  2. Clues derived from the locations connected to violent repeat criminal offenders, such as serial murderers, rapists, and arsonists, can be of significant assistance to law enforcement. Such information allows police departments to focus their activit
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:1048576
    • 提供者:wsdsgfuqiang
  1. CRITICAL CHARACTERISTICS OF MALE

  2. Difficulties that have limited research on serial murder (i.e., definition, data, and conceptual framework) are addressed by the current study. Hickey's Trauma-Control Model is utilized as a conceptual framework that is particularly helpful when sex
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:841728
    • 提供者:wsdsgfuqiang
  1. Estimating the Size of Criminal Populations

  2. The estimation of total population size for various phenomena of crime is an important factor critical for criminal justice policy formulation and criminological theory development. In this paper, methods are discussed for estimating the size of a c
  3. 所属分类:其它

    • 发布日期:2010-02-24
    • 文件大小:1048576
    • 提供者:wsdsgfuqiang
  1. 2010 mcm Contest Problems

  2. IMPORTANT CHANGE TO CONTEST RULES FOR MCM/ICM 2010: Teams (Student or Advisor) are now required to submit an electronic copy of their solution paper by email to solutions@comap.com. Your email MUST be received at COMAP by the submission deadline of
  3. 所属分类:C

    • 发布日期:2010-02-24
    • 文件大小:4096
    • 提供者:wsdsgfuqiang
  1. Predicting Serial Killers’ Home Base Using a Decision Support System

  2. The effectiveness of a geographical decision support tool (Dragnet) for locating the base of serial offenders was compared across 570 models comprised of a range of negative exponential functions, buffer zone components, and normalization parameters
  3. 所属分类:其它

    • 发布日期:2010-02-24
    • 文件大小:214016
    • 提供者:wsdsgfuqiang
  1. Rossmo

  2. Rossmo's formula is a geographic profiling formula to predict where a serial criminal lives. The formula was produced by the mathematician Kim Rossmo. Formula Imagine a map with an overlaying grid of little squares named sectors. A sector Si,j is th
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:510976
    • 提供者:wsdsgfuqiang
  1. Statistical Models of Life Events and Criminal Behavior

  2. The goal of developmental and life course criminology is to understand patterns of crime and delinquency over the life course. To date, research in this field has devoted a great deal of attention to describing patterns of change in the dependent va
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:523264
    • 提供者:wsdsgfuqiang
  1. Beautiful Security: Leading Security Experts Explain How They Think

  2. In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses
  3. 所属分类:Web开发

    • 发布日期:2010-03-23
    • 文件大小:2097152
    • 提供者:sfwong
  1. Beautiful Security: Leading Security Experts Explain How They Think

  2. In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses
  3. 所属分类:Web开发

    • 发布日期:2010-05-17
    • 文件大小:2097152
    • 提供者:blue_thinhorse
  1. CRIMINAL JUSTICE INFORMATION SERVICES

  2. CRIMINAL JUSTICE INFORMATION SERVICES (CJIS) WSQ GRAY-SCALE FINGERPRINT IMAGE COMPRESSION SPECIFICATION
  3. 所属分类:网管软件

    • 发布日期:2010-11-03
    • 文件大小:589824
    • 提供者:lanbingyueycx
  1. CRIMINAL NETWORKS, CRIMINAL ENTERPRISES

  2. 网络分析的引用次数较多的论文,喜欢的朋友可以下载看看!
  3. 所属分类:其它

    • 发布日期:2012-06-17
    • 文件大小:81920
    • 提供者:shenxi5555
  1. Criminal network analysis

  2. A great deal has been written over the last four years regarding how academics have contributed possible technological solutions for uncovering terrorist networks to enhance public safety and national security. Both the public and the Pentagon have
  3. 所属分类:互联网

    • 发布日期:2013-01-08
    • 文件大小:2097152
    • 提供者:xiaoxsmile
  1. Criminal-Intelligence-QA-System:Canghong Jin 18-19 1的一个高级Java最终项目的演示-源码

  2. 提示:您可以在问题上提问。 在测试自然语言查询 刑事情报问答系统 Neo4j用于存储。 Flask,用于显示子图的cytoscape.js。 Pytorch Stacked BiLSTM模型每个都有一层用于查询分类和分析。 作者:陈达,张卓(Drogo Zhang)。 分词方法 词嵌入链接 模型训练 服务器设定 展示: 基本问题|| 简单搜索 进阶问题 参考
  3. 所属分类:其它

    • 发布日期:2021-03-11
    • 文件大小:17825792
    • 提供者:weixin_42123296
  1. Analytic provenance for criminal intelligence analysis

  2. In criminal intelligence domain where solution discovery is often serendipitous,it demands techniques to provide transparent evidences of top-down and bottom-up analytical processes of analysts while sifting through or transforming sourced data to pr
  3. 所属分类:其它

    • 发布日期:2021-01-20
    • 文件大小:1048576
    • 提供者:weixin_38606169
« 12 3 »