Hot Search : Source embeded web remote control p2p game More...
Location : Home Documents Industry research

Search in result

Industry research list
Sort by :
« 1 2 ... .70 .71 .72 .73 .74 375.76 .77 .78 .79 .80 ... 991 »
Downloaded:0
THIS CODEIS USEFUL FOR COMPRESSION OF DATA USING BITMASK AND RLE
Date : 2025-06-02 Size : 2kb User : mdeep

In this paper I will discuss a genetic approach to fi nding near-optimal soltu- ions to Traveling Salesman Problems. I will also discuss how using a heuristic to generate an initial pool aff ects the run time a
Date : 2025-06-02 Size : 117kb User : mona arooj

Downloaded:0
Many large cattle blog, to learn linux, c++ other related technical research helpful! !
Date : 2025-06-02 Size : 4.83mb User : 与的

This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechan
Date : 2025-06-02 Size : 3.36mb User : ahmed

This paper presents an algorithm for the complete specification of multinomial discrete choice models to predict the spatial preferences of attackers. The formulation employed is a modification of models previously appli
Date : 2025-06-02 Size : 531kb User : ahmed

Crime hot-spot location prediction is important for public safety. The output from the prediction can provide useful information to improve the activities aimed at detecting and preventing safety and security problems. L
Date : 2025-06-02 Size : 443kb User : ahmed

In this work, we present a novel evolutionary multiagent-based simulation tool, named as GAPatrol. Such system is devoted to the specification of effective police patrol route strategies for coping with criminal activiti
Date : 2025-06-02 Size : 226kb User : ahmed

This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines various ty
Date : 2025-06-02 Size : 549kb User : ahmed

With the development of Internet technology, the popularity of the malicious threat has grown beyond our imagination. The emergence of intelligent, sophisticated attack techniques makes the Internet services more vulnera
Date : 2025-06-02 Size : 308kb User : ahmed

Much of crime mapping is devoted to detecting high-crime-density areas known as hot spots. Hot spot analysis helps police identify high-crime areas, types of crime being committed, and the best way to respond.
Date : 2025-06-02 Size : 1.05mb User : ahmed

In this paper we give an account of a new change of perspective in nonlinear modelling and prediction as applied to smooth systems. The core element of these developments is the Gamma test a non-linear modelling and anal
Date : 2025-06-02 Size : 946kb User : ahmed

One of the fundamental challenges in crime mapping and analysis is pattern recognition. Efforts and methods to detect crime hot-spots, or geographic areas of elevated criminal activity, are wide ranging
Date : 2025-06-02 Size : 820kb User : ahmed
« 1 2 ... .70 .71 .72 .73 .74 375.76 .77 .78 .79 .80 ... 991 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.