自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(1)
  • 资源 (5)
  • 收藏
  • 关注

原创 如何在vc6,vc7,vc8下编译x264

    最近在学习H264 ,用SVN直接下载源代码在VC环境下编译,主要是参考李世平老师在http://blog.csdn.net/sunshine1314/archive/2005/05/20/377158.aspx中所讲的,但还是不能直接编译通过,本人作如下修改,便能顺利通过编译,在此写下来供初学者参考。 所用的代码为2006年7月26日用TortiseSVN从官方网站站上下载

2006-07-26 14:21:00 4260 7

Linux操作系统下C语言编程入门

介绍在LINUX 下进行C 语言编程所需要的基础知识.

2010-03-21

A Practical Guide to Linux® Commands, Editors, and Shell Programming

The essential reference for core commands that Linux users need daily, along with superior tutorial on shell programming and much moreSystem administrators, software developers, quality assurance engineers and others working on a Linux system need to work from the command line in order to be effective. Linux is famous for its huge number of command line utility programs, and the programs themselves are famous for their large numbers of options, switches, and configuration files. But the truth is that users will only use a limited (but still significant) number of these utilities on a recurring basis, and then only with a subset of the most important and useful options, switches and configuration files. This book cuts through all the noise and shows them which utilities are most useful, and which options most important. And it contains examples, lot's and lot's of examples. This is not just a reprint of the man pages.

2010-03-21

视频会议代码可供初学者研究

视频会议 在局域网上测试通过 初学者学习

2008-12-04

Combining Filtering and Statistical Methods for Anomaly Detection

In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that of a network-wide view of the traffic state, called the traffic matrix. In the first step a Kalman filter is used to filter out the “normal” traffic. This is done by comparing our future predictions of the traffic matrix state to an inference of the actual traffic matrix that is made using more recent measurement data than those used for prediction. In the second step the residual filtered process is then examined for anomalies. We explain here how any anomaly detection method can be viewed as a problem in statistical hypothesis testing. We study and compare four different methods for analyzing residuals, two of which are new. These methods focus on different aspects of the traffic pattern change. One focuses on instantaneous behavior, another focuses on changes in the mean of the residual process, a third on changes in the variance behavior, and a fourth examines variance changes over multiple timescales. We evaluate and compare all of these methods using ROC curves that illustrate the full tradeoff between false positives and false negatives for the complete spectrum of decision thresholds

2008-11-27

Tracking a Moving Target in Cluttered Environments

Tracking a Moving Target in Cluttered Environments with Ranging Radios

2008-11-27

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除