Computer Science
epub |eng | 2018-04-30 | Author:Serge Van Themsche [Van Themsche, Serge]

( Category: Computer Science October 17,2018 )
epub |eng | 2018-05-24 | Author:Josh Diakun

( Category: Computer Science October 16,2018 )
epub, pdf |eng | 2018-07-11 | Author:Kevin Beaver

MAC spoofing A common defense for wireless networks is MAC address controls. These controls involve configuring your APs to allow only wireless clients with known MAC addresses to connect to ...
( Category: Internet & Social Media October 16,2018 )
epub |eng | 2018-08-31 | Author:Nick McClure

( Category: Databases & Big Data October 15,2018 )
epub |eng | | Author:Paolo Tasca, Tomaso Aste, Loriana Pelizzon & Nicolas Perony

For example, consider security. By the very nature of the open source process, potential security holes can be directly accessed and modified if need be to incorporate technical advances in ...
( Category: Computer Science October 12,2018 )
epub |eng | | Author:Umut Durak, Jürgen Becker, Sven Hartmann & Nikolaos S. Voros

Fig. 6.4Main OWL components of the AAO DL operators are considered as different types of property restrictions in ontologies: (1) quantifier restrictions such as existential and universal restrictions, (2) has ...
( Category: Engineering October 10,2018 )
epub |eng | 2015-12-09 | Author:Richard Blum & Christine Bresnahan [Blum, Richard]

A. No, Python doesn’t support protected methods. You can, however, use the same idea as with private attributes and name your method starting with two underscores. The method is still ...
( Category: Computer Science October 10,2018 )
epub |eng | | Author:Ivan Markovsky

4.2 Model Reduction Approximate Realization Define the 2-norm ∥ΔH∥2 of a matrix-valued signal ΔH∈(ℝ p×m ) T+1 as and let σ be the shift operator Acting on a finite time ...
( Category: Physics October 10,2018 )
epub, pdf |eng | | Author:Timothy Masters

warpsize = deviceProp.warpSize; // Threads per warp, likely 32 well into the future threads_per_block = (n_slices + warpsize - 1) / warpsize * warpsize; if (threads_per_block > 4 * warpsize) ...
( Category: Computer Science October 6,2018 )
epub, pdf |eng | 2018-08-30 | Author:Francis X. Govers

Now that we have done all our processing, we add this new child path to our population, and get ready for the next generation to be evaluated. We record some ...
( Category: Hardware & DIY October 3,2018 )
epub |eng | 2018-08-06 | Author:Luis Pedro Coelho

In order to combine the methods, we will use a technique called stacked learning. The idea is that you learn a set of predictors, then you use the output of ...
( Category: Programming Languages October 1,2018 )
epub |eng | 2018-07-31 | Author:Richard M. Reese

A maximum entropy tagger uses statistics to determine the POS for a word and often uses a corpus to train a model. A corpus is a collection of words marked ...
( Category: Programming September 30,2018 )
azw3 |eng | 2018-09-03 | Author:Rungta, Krishna [Rungta, Krishna]

This function parses the csv file with the method tf.decode_csv and declares the features and the label. The features can be declared as a dictionary or a tuple. You use ...
( Category: Programming Languages September 30,2018 )
epub |eng | 2018-07-31 | Author:Rounak Banik

#Compute the cosine similarity score (equivalent to dot product for tf-idf vectors) cosine_sim2 = cosine_similarity(count_matrix, count_matrix) Since we dropped a few movies with bad indices, we need to construct our ...
( Category: Databases & Big Data September 30,2018 )
epub |eng | 2017-04-07 | Author:John Pugliano [Неизв.]

Building Personal Relationships The act of creating is not limited to physical products and services. It extends to intangibles like kindness and love. As stated previously, the concept of human ...
( Category: Human Resources September 29,2018 )