Foreshadow 发表于 2025-3-28 15:33:59

http://reply.papertrans.cn/47/4651/465016/465016_41.png

故意钓到白杨 发表于 2025-3-28 19:04:40

http://reply.papertrans.cn/47/4651/465016/465016_42.png

值得 发表于 2025-3-29 00:31:14

http://reply.papertrans.cn/47/4651/465016/465016_43.png

COST 发表于 2025-3-29 05:29:46

http://reply.papertrans.cn/47/4651/465016/465016_44.png

adhesive 发表于 2025-3-29 08:35:28

Network Content Safety Design of Monitoring System safety and some new requirements of network management. This system highlights such three functions as the content monitoring, the visualization of the amount of flow and behavior examination, and presents the content display and supports different configuration through friendly and feasible interf

APEX 发表于 2025-3-29 14:57:12

Improvement Intrusion Detection Based on SVMter . and kernel function parameter . of SVM are optimized using genetic algorithm of binary coding, and the optimized model GA-SVM is established. The dimensionality of input sample for SVM is reduced by PCA (Principal Component Analysis) and the model GA-PCA-SVM is established. The famous KDD Cup

震惊 发表于 2025-3-29 15:54:03

http://reply.papertrans.cn/47/4651/465016/465016_47.png

好开玩笑 发表于 2025-3-29 19:49:51

http://reply.papertrans.cn/47/4651/465016/465016_48.png

IVORY 发表于 2025-3-30 00:20:18

http://reply.papertrans.cn/47/4651/465016/465016_49.png

把…比做 发表于 2025-3-30 07:17:59

http://reply.papertrans.cn/47/4651/465016/465016_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Computing and Applications; Third International Chunfeng Liu,Leizhen Wang,Aimin Yang Conference proceedings 2012 Springer-Verl