Location:
Search - exploit
Search list
Description: hibernate文档中文版-exploit the Chinese version of Documents
Platform: |
Size: 692426 |
Author: 罗渝 |
Hits:
Description: ServU stack buffer overflow exploit
Platform: |
Size: 6367 |
Author: Lavendermpl |
Hits:
Description: 一个简单的基于linux平台的漏洞扫描程序
Platform: |
Size: 2130 |
Author: slf |
Hits:
Description: 高级的论坛聊天喊话程序,可以按照颜色列表自动更换颜色比较好看。此范例与PHPWIND的xnwybbschat插件(被广泛使用)兼容性较好。
Platform: |
Size: 25667 |
Author: 葛男人 |
Hits:
Description: We present a particle filter construction for a system that exhibits
time-scale separation. The separation of time-scales allows two simplifications
that we exploit: i) The use of the averaging principle for the
dimensional reduction of the system needed to solve for each particle
and ii) the factorization of the transition probability which allows the
Rao-Blackwellization of the filtering step. Both simplifications can be
implemented using the coarse projective integration framework. The
resulting particle filter is faster and has smaller variance than the particle
filter based on the original system. The convergence of the new
particle filter to the analytical filter for the original system is proved
and some numerical results are provided.
Platform: |
Size: 185297 |
Author: 阳关 |
Hits:
Description: Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle
Filters (PFs) that exploit conditional dependencies between
parts of the state to estimate. By doing so, RBPFs can
improve the estimation quality while also reducing the overall
computational load in comparison to original PFs. However,
the computational complexity is still too high for many
real-time applications. In this paper, we propose a modified
RBPF that requires a single Kalman Filter (KF) iteration per
input sample. Comparative experiments show that while good
convergence can still be obtained, computational efficiency is
always drastically increased, making this algorithm an option
to consider for real-time implementations.
Platform: |
Size: 121423 |
Author: 阳关 |
Hits:
Description: brightstor vul exploit
Platform: |
Size: 1400 |
Author: alau |
Hits:
Description: 一个自动查找retloc的小脚本,主要在于可以提取其中的findretloc函数使exploit更加智能化,具体使用参看源代码.灵感来自coresecurity paper和dvdman的exploit.
Platform: |
Size: 984 |
Author: 韩山 |
Hits:
Description: 关于OpenGL的源码. Our goal:1. You generate a large cube, and map the sky texture in five faces except the floor face.
2. The viewing is freely moved inside the cube. You can exploit the keyboard or mouse handle.
3. The light is located in the cube.
4. You generate three kinds of objects.
5. You mapped the texture in the objects generated in step 4.
6. You apply a fog effect into an object among three objects.
Platform: |
Size: 23772 |
Author: dolphin |
Hits:
Description: This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in the right form, in the right time at an appropriate cost. The Strategy will ensure the Police Service has a collective understanding of the value of information and that we are able to exploit National Information Assets in support of local policing.
Platform: |
Size: 43335 |
Author: alexliu8888 |
Hits:
Description: 一个关于hibernate的实现例子-an exploit on the realization example
Platform: |
Size: 866745 |
Author: 张永军 |
Hits:
Description: 缓冲区溢出光速入门,适用:对缓冲区溢出感兴趣但一直不得要领的广大人民群众。包括缓冲区溢出基基础,SHELLCODE 基础,程序进程空间地址定位,推荐资料。
Platform: |
Size: 241602 |
Author: eternalflier |
Hits:
Description: n this demo, we show how to use Rao-Blackwellised particle filtering to exploit the conditional independence structure of a simple DBN. The derivation and details are presented in A Simple Tutorial on Rao-Blackwellised Particle Filtering for Dynamic Bayesian Networks. This detailed discussion of the ABC network should complement the UAI2000 paper by Arnaud Doucet, Nando de Freitas, Kevin Murphy and Stuart Russell. After downloading the file, type \"tar -xf demorbpfdbn.tar\" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab5 and type \"dbnrbpf\" for the demo.
Platform: |
Size: 14016 |
Author: 徐剑 |
Hits:
Description: 研究Linuxkernel exploit的必要性。读后可以解决许多实际问题,写出exploit级别的knerl
Platform: |
Size: 238846 |
Author: 周星星 |
Hits:
Description: In this demo, we show how to use Rao-Blackwellised particle filtering to exploit the conditional independence structure of a simple DBN. The derivation and details are presented in A Simple Tutorial on Rao-Blackwellised Particle Filtering for Dynamic Bayesian Networks. This detailed discussion of the ABC network should complement the UAI2000 paper by Arnaud Doucet, Nando de Freitas, Kevin Murphy and Stuart Russell. After downloading the file, type \"tar -xf demorbpfdbn.tar\" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab5 and type \"dbnrbpf\" for the demo.
Platform: |
Size: 128829 |
Author: 晨间 |
Hits:
Description: Linux vmsplice Local Root Exploit Code, ef. Linux 2.6.17 - 2.6.24.1
Platform: |
Size: 2153 |
Author: yiiiao |
Hits:
Description: WinRAR 3.x LHA Buffer Overflow Exploit
Platform: |
Size: 5005 |
Author: 胡容铨 |
Hits:
Description: 利用栈溢出获取远程机器的控制权限,打开控制窗口,且远程上载下传,可实现自启动
Platform: |
Size: 2113 |
Author: wl |
Hits:
Description: Xmame is a console game for linux. This exploit gain root
Platform: |
Size: 1110 |
Author: 高宝峰 |
Hits:
Description: this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on all BSD systems with abuse installed.
Platform: |
Size: 1655 |
Author: 高宝峰 |
Hits:
«
1
2
3
4
5
6
78
9
10
11
12
...
24
»