您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Logic+Programming+With+Prolog

  2. Logic Programming is the name given to a distinctive style of programming, very different from that of conventional programming languages such as C++ and Java. Fans of Logic Programming would say that 'different' means clearer, simpler and generally
  3. 所属分类:C++

    • 发布日期:2010-02-06
    • 文件大小:964608
    • 提供者:songfu1983
  1. Pro LINQ: Language Integrated Query in C# 2008

  2. LINQ is the project name for a set of extensions to the .NET Framework that provide a generic approach to querying data from different data sources. LINQ will premier in Visual Studio 2008, and will become the next must-have skill for .NET developer
  3. 所属分类:C#

    • 发布日期:2010-02-11
    • 文件大小:11534336
    • 提供者:whzhyh
  1. Dynamic Multi-field Packet Classification.pdf

  2. Dynamic Multi-Field Packet Classification Authors: Jan van Lunteren, Ton Engbersen IBM Zurich Research Laboratory
  3. 所属分类:专业指导

    • 发布日期:2010-02-19
    • 文件大小:84992
    • 提供者:wyzealot
  1. Gaussian Processes for Machine Learning

  2. The goal of building systems that can adapt to their environments and learn from their experience has attracted researchers from many fields, including com- puter science, engineering, mathematics, physics, neuroscience, and cognitive science. Out of
  3. 所属分类:C

    • 发布日期:2010-02-23
    • 文件大小:3145728
    • 提供者:showbu888
  1. Bundle Methods for Regularized Risk Minimization

  2. Alex Smola 的最新的工作。发表在Journal of Machine Learning Research 11 2010
  3. 所属分类:专业指导

    • 发布日期:2010-02-23
    • 文件大小:1048576
    • 提供者:langwaipo981
  1. PLACE, SPACE, AND POLICE

  2. Police investigations of serial murder, rape and arson can be assisted by a geographic perspective on the spatial behavior that led to the crime scene. For any crime to occur there must have been an intersection in both time and place between the of
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:265216
    • 提供者:wsdsgfuqiang
  1. A Methodological Model

  2. Clues derived from the locations connected to violent repeat criminal offenders, such as serial murderers, rapists, and arsonists, can be of significant assistance to law enforcement. Such information allows police departments to focus their activit
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:1048576
    • 提供者:wsdsgfuqiang
  1. CRITICAL CHARACTERISTICS OF MALE

  2. Difficulties that have limited research on serial murder (i.e., definition, data, and conceptual framework) are addressed by the current study. Hickey's Trauma-Control Model is utilized as a conceptual framework that is particularly helpful when sex
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:841728
    • 提供者:wsdsgfuqiang
  1. 2010 mcm Contest Problems

  2. IMPORTANT CHANGE TO CONTEST RULES FOR MCM/ICM 2010: Teams (Student or Advisor) are now required to submit an electronic copy of their solution paper by email to solutions@comap.com. Your email MUST be received at COMAP by the submission deadline of
  3. 所属分类:C

    • 发布日期:2010-02-24
    • 文件大小:4096
    • 提供者:wsdsgfuqiang
  1. Geographic Profiling

  2. Background Geographic Profiling •Outline the research project •Overview of the software used •Research results •Outline some investigative strategies
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:1048576
    • 提供者:wsdsgfuqiang
  1. 2010 ICM Problem

  2. Based on recent scientific expeditions into the Pacific Ocean Gyre (a convergence zone where debris is accumulating), a wide variety of technical and scientific problems associated with this debris mass are coming to light. While dumping waste into
  3. 所属分类:C#

    • 发布日期:2010-02-24
    • 文件大小:1048576
    • 提供者:wsdsgfuqiang
  1. Predicting Offender Profiles From Offense and Victim Characteristics

  2. The main aim of the research discussed in this chapter is to compare the characteristics of offenses and victims with those of offenders. Information was extracted from police files concerning 345 burglars and 310 violent offenders in Nottinghamshir
  3. 所属分类:其它

    • 发布日期:2010-02-24
    • 文件大小:353280
    • 提供者:wsdsgfuqiang
  1. Statistical Models of Life Events and Criminal Behavior

  2. The goal of developmental and life course criminology is to understand patterns of crime and delinquency over the life course. To date, research in this field has devoted a great deal of attention to describing patterns of change in the dependent va
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:523264
    • 提供者:wsdsgfuqiang
  1. Requirements Engineering: A Roadmap

  2. This paper presents an overview of the field of software systems requirements engineering (RE). It describes the main areas of RE practice, and highlights some key open research issues for the future.
  3. 所属分类:专业指导

    • 发布日期:2010-02-25
    • 文件大小:66560
    • 提供者:icywang_rui
  1. fvnc 源代码下载

  2. fvnc 源代码下载 The RFB Protocol Tristan Richardson RealVNC Ltd (formerly of Olivetti Research Ltd / AT&T Labs Cambridge) 
  3. 所属分类:C++

    • 发布日期:2010-02-26
    • 文件大小:411648
    • 提供者:projl
  1. Microhole Technology

  2. n estimated 407 billion barrels of A onshore discovered oil in the U.S. is non-recoverable with current drilling and production technolo- gies. Of that total, 218 billion bar- rels can be found at the relatively shallow depths of 5,000 feet or less.
  3. 所属分类:Access

    • 发布日期:2010-02-26
    • 文件大小:1048576
    • 提供者:sparrow054
  1. Beginning F#

  2. Functional programming is perhaps the next big wave in application development. As experienced developers know, functional programming makes its mark by allowing application builders to develop solutions to complicated programming situations cleanly
  3. 所属分类:C#

    • 发布日期:2010-02-27
    • 文件大小:4194304
    • 提供者:tm2002
  1. Combating Spyware in the Enterprise(syngress安全图书)

  2. Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware an
  3. 所属分类:Web开发

    • 发布日期:2010-03-01
    • 文件大小:7340032
    • 提供者:sunxianbin
  1. Innovations in Machine Learning: Theory and Application (Studies in Fuzziness and Soft Computing, Volume 194)

  2. Machine learning is currently one of the most rapidly growing areas of research in computer science. In compiling this volume we have brought together contributions from some of the most prestigious researchers in this field. This book covers the th
  3. 所属分类:专业指导

    • 发布日期:2010-03-01
    • 文件大小:2097152
    • 提供者:ziyuang
  1. Continuous-Time Markov Decision Processes

  2. Continuous-time Markov decision processes (MDPs), also known as controlled Markov chains, are used for modeling decision-making problems that arise in operations research (for instance, inventory, manufacturing, and queueing systems), computer scien
  3. 所属分类:其它

    • 发布日期:2010-03-01
    • 文件大小:1048576
    • 提供者:ziyuang
« 1 2 ... 45 46 47 48 49 50»