ROUGE 2.0 ROUGE 2.0是用于自动汇总任务的易于使用的评估工具包。 它使用度量标准系统,该系统通过将自动生成的摘要或翻译与一组参考摘要(通常是人为生成的)进行比较来工作。 ROUGE是计算自动生成的摘要的有效性的标准方法之一。 要了解ROUGE的工作原理,请。 产品特点 最新版本的ROUGE 2.0支持以下功能: 评估ROUGE-N(字母,二元组,三元组等) 评估ROUGE-L(总水平LCS) 对ROUGE-S和ROUGE-SU的评估(带有单字的跳字和跳字) 一次性评估多个ROUGE指标 不同语言的词干 使用可自定义的停用词删除停用词 unicode文本的评估(例如波斯
2022-03-05 10:40:09 226.81MB java nlp metrics evaluation
1
ISO TS 21357-2022 Nanotechnologies - Evaluation of the mean size of nano-objects in liquid dispersions by static multiple light.pdf
2022-02-17 14:03:42 3.98MB ISO TS 21357 2022
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings By 作者: Ehab Al-Shaer – Jinpeng Wei – Kevin W. Hamlen – Cliff Wang ISBN-10 书号: 3030021092 ISBN-13 书号: 9783030021092 Edition 版本: 1st ed. 2019 出版日期: 2019-01-02 pages 页数: (235 ) $84.99 This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced. Cover Front Matter Part I. Cyber Deception Reasoning Frameworks 1. Using Deep Learning to Generate Relational HoneyData 2. Towards Intelligent Cyber Deception Systems 3. Honeypot Deception Tactics Part II. Dynamic Decision-Making for Cyber Deception 4. Modeling and Analysis of Deception Games Based on Hypergame Theory 5. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception Part III. Network-Based Deception 6. CONCEAL:A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and Deployment 7. WetShifter:A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution 8. Deception-Enhanced Threat Sensing for Resilient Intrusion Detection 9. HONEYSCOPE: IoT Device Protection with Deceptive Network Views Part IV. Malware Deception 10. gExtractor: Automated Extraction of Malware Deception Parameters for Autononous Cyber Deception 11. Malware Deception with Automatic Analysis and Generation of HoneyResource
2022-02-12 15:26:40 6.47MB network
1
An Evaluation Study on Log Parsing and Its Use in Log Mining
2022-02-10 08:46:32 298KB 研究论文
1
该项目为aadl项目,基于osate平台,说明了对具有低临界部件的飞机的连续定量安全风险评估,该部件会影响飞机的整体安全。内含项目官方pdf介绍,适合aadl初学者。
2022-01-26 09:09:15 1.36MB OSATE AADL FTA 错误树分析
1
无线通信中很有名的技术标准,是英文文档.
2022-01-06 16:30:40 291KB 无线通信 技术标准
1
难得的学习CoWare Processor Designer的资料!对搞ASIP的有用!
2022-01-05 13:24:02 5.59MB CoWare processor designer
1
从机器学习视角学习因果推断的教材。
2021-12-28 18:08:50 2.3MB CausalInference MachineLearning R
1
An experimental evaluation of a scatter search for the linear ordering problem
2021-12-18 09:11:38 460KB pdf
1
Evaluation of 2004 Toyota Prius Hybrid Electric Drive System Interim Report
2021-12-14 09:32:55 602KB Prius Hybrid Electric Drive
1