Welcome![Sign In][Sign Up]
Location:
Search - exploit

Search list

[Develop ToolsHibernate_cn_2.1.2

Description: hibernate文档中文版-exploit the Chinese version of Documents
Platform: | Size: 692426 | Author: 罗渝 | Hits:

[ExploitServU

Description: ServU stack buffer overflow exploit
Platform: | Size: 6367 | Author: Lavendermpl | Hits:

[Internet-Networkexploit

Description: 一个简单的基于linux平台的漏洞扫描程序
Platform: | Size: 2130 | Author: slf | Hits:

[Internet-NetworkExploit

Description: 高级的论坛聊天喊话程序,可以按照颜色列表自动更换颜色比较好看。此范例与PHPWIND的xnwybbschat插件(被广泛使用)兼容性较好。
Platform: | Size: 25667 | Author: 葛男人 | Hits:

[File OperateDimensionalreductionforparticlefiltersofsystemswit

Description: We present a particle filter construction for a system that exhibits time-scale separation. The separation of time-scales allows two simplifications that we exploit: i) The use of the averaging principle for the dimensional reduction of the system needed to solve for each particle and ii) the factorization of the transition probability which allows the Rao-Blackwellization of the filtering step. Both simplifications can be implemented using the coarse projective integration framework. The resulting particle filter is faster and has smaller variance than the particle filter based on the original system. The convergence of the new particle filter to the analytical filter for the original system is proved and some numerical results are provided.
Platform: | Size: 185297 | Author: 阳关 | Hits:

[File OperateAMODIFIEDRAO-BLACKWELLISEDPARTICLEFILTER

Description: Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit conditional dependencies between parts of the state to estimate. By doing so, RBPFs can improve the estimation quality while also reducing the overall computational load in comparison to original PFs. However, the computational complexity is still too high for many real-time applications. In this paper, we propose a modified RBPF that requires a single Kalman Filter (KF) iteration per input sample. Comparative experiments show that while good convergence can still be obtained, computational efficiency is always drastically increased, making this algorithm an option to consider for real-time implementations.
Platform: | Size: 121423 | Author: 阳关 | Hits:

[Exploitbrightstor

Description: brightstor vul exploit
Platform: | Size: 1400 | Author: alau | Hits:

[Linux-Unixfindretloc

Description: 一个自动查找retloc的小脚本,主要在于可以提取其中的findretloc函数使exploit更加智能化,具体使用参看源代码.灵感来自coresecurity paper和dvdman的exploit.
Platform: | Size: 984 | Author: 韩山 | Hits:

[OpenGL programAtom1

Description: 关于OpenGL的源码. Our goal:1. You generate a large cube, and map the sky texture in five faces except the floor face. 2. The viewing is freely moved inside the cube. You can exploit the keyboard or mouse handle. 3. The light is located in the cube. 4. You generate three kinds of objects. 5. You mapped the texture in the objects generated in step 4. 6. You apply a fog effect into an object among three objects.
Platform: | Size: 23772 | Author: dolphin | Hits:

[Technology Managementinformation_management_strategy_for_police_service

Description: This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in the right form, in the right time at an appropriate cost. The Strategy will ensure the Police Service has a collective understanding of the value of information and that we are able to exploit National Information Assets in support of local policing.
Platform: | Size: 43335 | Author: alexliu8888 | Hits:

[JSP/Java242

Description: 一个关于hibernate的实现例子-an exploit on the realization example
Platform: | Size: 866745 | Author: 张永军 | Hits:

[Other resourceexploit

Description: 缓冲区溢出光速入门,适用:对缓冲区溢出感兴趣但一直不得要领的广大人民群众。包括缓冲区溢出基基础,SHELLCODE 基础,程序进程空间地址定位,推荐资料。
Platform: | Size: 241602 | Author: eternalflier | Hits:

[Other resourceEMdemo

Description: n this demo, we show how to use Rao-Blackwellised particle filtering to exploit the conditional independence structure of a simple DBN. The derivation and details are presented in A Simple Tutorial on Rao-Blackwellised Particle Filtering for Dynamic Bayesian Networks. This detailed discussion of the ABC network should complement the UAI2000 paper by Arnaud Doucet, Nando de Freitas, Kevin Murphy and Stuart Russell. After downloading the file, type \"tar -xf demorbpfdbn.tar\" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab5 and type \"dbnrbpf\" for the demo.
Platform: | Size: 14016 | Author: 徐剑 | Hits:

[Linux-UnixLinuxkernel_research_and_explot

Description: 研究Linuxkernel exploit的必要性。读后可以解决许多实际问题,写出exploit级别的knerl
Platform: | Size: 238846 | Author: 周星星 | Hits:

[Other resourceParticleFilteringforDynamicConditionallyGaussianMo

Description: In this demo, we show how to use Rao-Blackwellised particle filtering to exploit the conditional independence structure of a simple DBN. The derivation and details are presented in A Simple Tutorial on Rao-Blackwellised Particle Filtering for Dynamic Bayesian Networks. This detailed discussion of the ABC network should complement the UAI2000 paper by Arnaud Doucet, Nando de Freitas, Kevin Murphy and Stuart Russell. After downloading the file, type \"tar -xf demorbpfdbn.tar\" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab5 and type \"dbnrbpf\" for the demo.
Platform: | Size: 128829 | Author: 晨间 | Hits:

[Linux-Unixvmsplice_exploit.c

Description: Linux vmsplice Local Root Exploit Code, ef. Linux 2.6.17 - 2.6.24.1
Platform: | Size: 2153 | Author: yiiiao | Hits:

[Windows Developlzh

Description: WinRAR 3.x LHA Buffer Overflow Exploit
Platform: | Size: 5005 | Author: 胡容铨 | Hits:

[Exploitexploit

Description: 利用栈溢出获取远程机器的控制权限,打开控制窗口,且远程上载下传,可实现自启动
Platform: | Size: 2113 | Author: wl | Hits:

[Linux-UnixXmameccode

Description: Xmame is a console game for linux. This exploit gain root
Platform: | Size: 1110 | Author: 高宝峰 | Hits:

[Other resource0x36-assabuse.c

Description: this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on all BSD systems with abuse installed.
Platform: | Size: 1655 | Author: 高宝峰 | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 ... 24 »

CodeBus www.codebus.net