首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 34 毫秒
1.
C++Builder中的事件响应及其编程方法   总被引:1,自引:0,他引:1  
介绍了Borland C -Builder编程语言中对事件响应的编程方法,对于每一种方法给出了相应的示例。  相似文献   

2.
We study online regret minimization algorithms in an experts setting. In this setting, the algorithm chooses a distribution over experts at each time step and receives a gain that is a weighted average of the experts’ instantaneous gains. We consider a bicriteria setting, examining not only the standard notion of regret to the best expert, but also the regret to the average of all experts, the regret to any given fixed mixture of experts, or the regret to the worst expert. This study leads both to new understanding of the limitations of existing no-regret algorithms, and to new algorithms with novel performance guarantees. More specifically, we show that any algorithm that achieves only $O(\sqrt{T})$ cumulative regret to the best expert on a sequence of T trials must, in the worst case, suffer regret $\varOmega(\sqrt{T})$ to the average, and that for a wide class of update rules that includes many existing no-regret algorithms (such as Exponential Weights and Follow the Perturbed Leader), the product of the regret to the best and the regret to the average is, in the worst case, Ω(T). We then describe and analyze two alternate new algorithms that both achieve cumulative regret only $O(\sqrt{T}\log T)$ to the best expert and have only constant regret to any given fixed distribution over experts (that is, with no dependence on either T or the number of experts N). The key to the first algorithm is the gradual increase in the “aggressiveness” of updates in response to observed divergences in expert performances. The second algorithm is a simple twist on standard exponential-update algorithms.  相似文献   

3.
近几年来,令网络管理人员谈虎色变的网络安全问题莫过于蠕虫。蠕虫的爆发不仅导致个人电脑或服务器系统无法正常工作,还会造成网络系统的瘫痪。而系统漏洞作为网络安全的头号大敌,可谓万恶的根本。但要想在第一时间把每个漏洞都被及时修补好,基本是不可能的,即便可能做到,所需要的各种资源也是企业无法承受的。一、漏洞修补需要策略打补丁不能盲目,不是每个补丁都需要在第一时间修补;不是每个补丁都可以随便打上。因为,漏洞的修补是需要策略的。要从根本上有效地解决目前利用漏洞进行攻击的问题,就需要我们基于漏洞生命周期、漏洞法则的研究…  相似文献   

4.
现代意义上的好书,是既可以远观,又可以近看,还可以像艺术品一样可以让读者拿在手里细细地品味,让视觉、触觉、听觉、嗅觉甚至味觉都能得到满足。现代纸材在书籍艺术个性的展现中起到不可替代的作用,它能使读者产生不同的心理反应,丰富书籍表情,深化书的内涵。本文通过对纸材的外部特征及内涵个性的分析,和纸材设计语言价值的深层挖掘,总结出如何使其审美属性转化为内容与读者、设计者与读者心与心交流的平台。  相似文献   

5.
2007年9月4日,佳能(中国)有限公司举办了2007年佳能(中国)秋季打印机新品发布会,发布了10款打印机及扫描仪新产品,其中包括三款面向办公用户且集成了传真功能的腾彩PIXMA喷墨多功能传真一体机MX308、MX318和MX700;四款全方位满足商用领域办公需求的腾彩PIXMA喷墨多功能一体机MP610、MP520、MP228和MP145;具有更高性能的腾彩PIXMA iP4500照片喷墨打印机,以及佳能扫描仪产品线中的两款最新力作CanoSca n 8800F和CanoScan LiDE90.  相似文献   

6.
电子商务的发展和日趋成熟,传统贸易方式交易数量的减少,使现行税收受到侵蚀,电子商务是一个新生事物,税务部门的征管及其信息化建设还跟不上电子商务的进展,造成了网上贸易的征税盲区,网上贸易的税收流失现象是急需解决的问题。  相似文献   

7.
创造性思维能力是设计创造力的核心,创新意识和创造能力也须以创造性思维作为基础。对设计水平的提高须从创造性思维培养入手,运用恰当的方法,加强创造性思维的训练。而对设计创造性思维的培养和应用,本文的方法是大胆地发散思维,反叛的逆向思维,简洁的删繁就简以及最后阶段的收敛思维。  相似文献   

8.
工业设计作为一种创造性的活动,通过设计创新可以影响到企业产品的各个方面,促进企业发展从而带动整个制造业的可持续发展,对资源和生态环境起到良好的保护作用,符合我国均衡发展的科学发展观。我国产业模式要实现制造到创造的飞跃,就要充分利用和发挥工业设计的这一特性,要真正实现产业模式转型就要从几方面入手:首先,要创造好的环境,这样才能保证设计产业滋生的土壤。其次,要真正实现企业和设计机构之间的合作。再次,要加强设计教育。  相似文献   

9.
本文对常用的传统拥塞控制策略进行了分析,并在此基础上提出改进方案,在保证网络能够正常运行的前提下,充分利用网络资源,以便提高网络的整体性能。  相似文献   

10.
SUMMARY

The need to deliver current data on periodical holdings and electronic resources led the staff at Kennesaw State University's Sturgis Library to develop database-driven dynamic Web pages. The project's success was based on the incorporation of skills, technologies and hardware that were already in place in the library with Allaire's ColdFusion Express, a free, feature-limited version of ColdFusion Web application server.  相似文献   

11.
12.
White  George 《ITNOW》2001,43(6):22-23
  相似文献   

13.
14.
15.
16.
《Micro, IEEE》1983,3(4):3-4
  相似文献   

17.
The maximal-cut problem for directed graphs can be defined analogously to that for the undirected case. The undirected problem is known to be NP-complete. We consider two directed variants of the problem. Depending on the definition of the value of a cut, the resulting problem for general directed graphs is either efficiently solvable or NP-complete. We show that the latter version of the problem remains NP-complete when restricted to acyclic directed graphs. Further restriction to directed trees yields an efficiently solvable problem. We present an algorithm solving the problem in time proportional to the size of the input.  相似文献   

18.
《Computer》1983,16(12):7-7
  相似文献   

19.
《Computer》1982,15(6):6-7
  相似文献   

20.
《Computer》1978,11(2):5-6
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号