- 博客(0)
- 资源 (6)
空空如也
deep learning(Adaptive Computation and Machine Learning series)
This book is about a solution to these more intuitive problems. This solution is
to allow computers to learn from experience and understand the world in terms of a
hierarchy of concepts, with each concept defined in terms of its relation to simpler
concepts. By gathering knowledge from experience, this approach avoids the need
for human operators to formally specify all of the knowledge that the computer
needs. The hierarchy of concepts allows the computer to learn complicated concepts
by building them out of simpler ones. If we draw a graph showing how these concepts are built on top of each other, the graph is deep, with many layers. For
this reason, we call this approach to AI deep learning.
2017-09-18
82598-10-gbe-controller-datasheet
82598EB 10 GbE Controller is a single, compact, low-power component with two fully
integrated Gigabit Ethernet Media Access Control (MAC) and XAUI ports.
The 82598EB supports 10GBASE-KX4/1000BASE-KX as in IEEE 802.3ap and CX4 (802.3ak). Ports also
contain a serializer-deserializer (designated “BX”) to support 1000Base-SX/LX (optical fiber) and GbE
backplane applications. CX4 and XAUI interfaces are also supported. In addition to managing MAC and
PHY Ethernet layer functions, the controller manages PCIe packet traffic across its transaction, link, and
physical/logical layers.
2017-09-18
callStackAnalysis
This document describes how to analyze and retrieve the call stack for an executing program written in C or C++. The process can be quite complicated because of the unique features of certain processors and operating systems that are sometimes important when making the analysis. We have attempted to make things easier by providing several examples; after reading the general descriptions, we suggest you look at the examples and return to reread the descriptive sections in the context of an example
2017-09-18
Abusing Mach on Mac OS X
This paper discusses the security implications of Mach being integrated
with the Mac OS X kernel. A few examples are used to illustrate how
Mach support can be used to bypass some of the BSD security features, such
as securelevel. Furthermore, examples are given that show how Mach functions
can be used to supplement the limited ptrace functionality included in Mac OS
X.
2017-09-18
mach operating system
In this appendix we examine the Mach operating system. Mach is designed
to incorporate the many recent innovations in operating-system research to
produce a fully functional, technically advanced system. Unlike UNIX, which
was developed without regard for multiprocessing, Mach incorporates multiprocessing
support throughout. Its multiprocessing support is also exceedingly
flexible, accommodating shared-memory systems as well as systems with no
memory shared between processors. Mach is designed to run on computer
systems ranging from one processor to thousands of processors. In addition,
Mach is easily ported to many varied computer architectures. A key goal of
Mach is to be a distributed system capable of functioning on heterogeneous
hardware.
2017-09-18
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人