Use the links below to download a source distribution of Ant from one of our mirrors. It is good practice to verify the integrity of the distribution files, especially if you are using one of our mirror sites. In order to do this you must use the signatures from our main distribution directory. Ant is distributed as zip, tar.gz and tar.bz2 archives - the contents are the same. Please note that the tar.* archives contain file names longer than 100 characters and have been created using GNU tar extensions. Thus they must be untarred with a GNU compatible version of tar. If you do not see the file you need in the links below, please see the master distribution directory or, preferably, its mirror.
標簽: distribution download mirrors source
上傳時間: 2014-01-06
上傳用戶:xuanchangri
Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and clustering techniques that are frequently used in data mining have been developed in machine learning research community. Frequent pattern and association rule mining is one of the few excep- tions to this tradition. The introduction of this technique boosted data mining research and its impact is tremendous. The algorithm is quite simple and easy to implement. Experimenting with Apriori-like algorithm is the fi rst thing that data miners try to do.
標簽: 64257 algorithms decision pattern
上傳時間: 2014-01-12
上傳用戶:wangdean1101
Semantic analysis of multimedia content is an on going research area that has gained a lot of attention over the last few years. Additionally, machine learning techniques are widely used for multimedia analysis with great success. This work presents a combined approach to semantic adaptation of neural network classifiers in multimedia framework. It is based on a fuzzy reasoning engine which is able to evaluate the outputs and the confidence levels of the neural network classifier, using a knowledge base. Improved image segmentation results are obtained, which are used for adaptation of the network classifier, further increasing its ability to provide accurate classification of the specific content.
標簽: multimedia Semantic analysis research
上傳時間: 2016-11-24
上傳用戶:蟲蟲蟲蟲蟲蟲
Imperfect C++ Practical Solutions for Real-Life Programming C++, although a marvelous language, isn t perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn t just tell you what s wrong with C++, but offers practical techniques and tools for writing code that s more robust, flexible, efficient, and maintainable. He shows you how to tame C++ s complexity, cut through its vast array of paradigms, take back control over your code--and get far better results.
標簽: Programming Imperfect Practical Solutions
上傳時間: 2014-03-02
上傳用戶:songrui
it is a simulation about ML synchronization algorithm in OFDM systems,you can slao see a function picture in its output,that s useful for a beginner
標簽: synchronization simulation algorithm function
上傳時間: 2013-12-17
上傳用戶:yulg
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
標簽: cryptography literature has Secrecy
上傳時間: 2016-12-08
上傳用戶:fxf126@126.com
This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but most of the techniques discussed have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL Injection". The paper covers in more detail some of the points described in its predecessor, providing examples to clarify areas where the previous paper was perhaps unclear. An effective method for privilege escalation is described that makes use of the openrowset function to scan a network. A novel method for extracting information in the absence of helpful error messages is described the use of time delays as a transmission channel. Finally, a number of miscellaneous observations and useful hints are provided, collated from responses to the original paper, and various conversations around the subject of SQL injection in a SQL Server environment.
標簽: Server SQL Injection Microsoft
上傳時間: 2014-07-28
上傳用戶:xhz1993
Knowledge manager。Storing articles,quotes..and managing them We have used a third party component Active skin control its very good.
標簽: Knowledge component articles managing
上傳時間: 2016-12-16
上傳用戶:qq21508895
The application described in this document is for a product that is subject to continuous developments and improvements. All particulars of the product and its use contained in this document are given by ARM in good faith. However, all warranties implied or expressed, including but not limited to implied warranties of merchantability, or fitness for purpose, are excluded.
標簽: application continuous developmen described
上傳時間: 2016-12-16
上傳用戶:dave520l
Hello User This is nothing, but a simple program which if kept in start of windows will shut down the system by itself within five minutes of starting. It takes the time from the system & starts its timer to shut down after 5 minutes (not considering seconds). U can use shutdown.exe,once started there is only one exit that u know only. EXIT : DOUBLECLICK TIME TO ENABLE EXIT
標簽: nothing program windows simple
上傳時間: 2016-12-26
上傳用戶:ynwbosss