This file came from Planet-Source-Code.com...the home millions of lines of source code
You can view comments on this code/and or vote on it at: http://www.Planet-Source-Code.com/vb/scripts/ShowCode.asp?txtCodeId=58860&lngWId=1
The author may have retained certain copyrights to this code...please observe their request and the law by reviewing all copyright conditions at the above URL.
RFID, the wireless technology that has helped
millions of people around the world to protect their property and
make their workplaces safer is now in danger of being viewed as a
security risk. Ray Stanton examines the love-hate relationship
between people and Radio Frequency Identification [RFID] tags and
highlights the need for informed debate about the privacy issues the
technology raises.
Securing Apache 2: Step-by-Step
When choosing a web server, Apache very often wins against its competitors because of stability, performance, that fact that it s open source, and many other advantages. But when deciding on which version of Apache to use, the choice is not always so simple. On the one hand there is a very popular, stable version used by millions of users, version 1.3, and on the other hand, there is an enhanced and re-designed version 2.0.
FLASH文件系統的源碼,Flash memory is a nonvolatile memory, which allows the user
to electrically program (write) and erase information. The
exponential growth of flash memory has made this technology
an indispensable part of hundreds of millions of electronic
devices.
Flash memory has several significant differences with volatile
(RAM) memory and hard drive technologies which requires
unique software drivers and file systems. This paper provides
an overview of file systems for flash memory and focuses on
the unique software requirements of flash memory devices.
Boosting is a meta-learning approach that aims at combining an ensemble of weak classifiers to form a strong classifier. Adaptive Boosting (Adaboost) implements this idea as a greedy search for a linear combination of classifiers by overweighting the examples that are misclassified by each classifier. icsiboost implements Adaboost over stumps (one-level decision trees) on discrete and continuous attributes (words and real values). See http://en.wikipedia.org/wiki/AdaBoost and the papers by Y. Freund and R. Schapire for more details [1]. This approach is one of most efficient and simple to combine continuous and nominal values. Our implementation is aimed at allowing training from millions of examples by hundreds of features in a reasonable time/memory.
a very good example of how to use java for a minesweeper game that is much like the windows one.
This file came from Planet-Source-Code.com...the home millions of lines of source code
These instances, whenmapped to an N-dimensional space, represent a core set that can be
used to construct an approximation to theminimumenclosing ball. Solving the SVMlearning
problem on these core sets can produce a good approximation solution in very fast speed.
For example, the core-vector machine [81] thus produced can learn an SVM for millions of
data in seconds.
Optical wireless communication is an emerging and dynamic research and development
area that has generated a vast number of interesting solutions to very complicated
communication challenges. For example, high data rate, high capacity and minimum
interference links for short-range communication for inter-building communication,
computer-to-computer communication, or sensor networks. At the opposite extreme is
a long-range link in the order of millions of kilometers in the new mission to Mars
and other solar system planets.
In modern societies, the production and trade of goods all around the world is
constantly increasing. The latest technological achievements allow the
mass-production of millions of items of every kind, which are being exchanged all
around the globe with unprecedented rapidity. At the same time, the problem of
identifying, classifying and tracking such a growing multitude of objects is con-
sequently arising.