`
huobengle
  • 浏览: 864896 次
文章分类
社区版块
存档分类
最新评论

explore exploit

 
阅读更多


exploratory




explore
[iks5plC:]
v.
探险, 探测, 探究

explore
ex.plore
AHD:[¹k-splôr“, -spl½r“]
D.J.[ik6spl%8r, -6splour]
K.K.[!k6spl%r, -6splor]
v.(动词)
ex.plored, ex.plor.ing, ex.plores
v.tr.(及物动词)
To investigate systematically; examine:
钻研:系统地研究;调查:
explore every possibility.
系统地研究每一个可能性
To search into or travel in for the purpose of discovery:
勘探:为有所发现而进行的探测或旅行:
exploring outer space.
太空勘探
Medicine To examine for diagnostic purposes.
【医学】 探察:为了诊断的目的而检查
v.intr.(不及物动词)
To make a careful examination or search:
考察:仔细地检查或寻找:
scientists who have been known to explore in this region of the earth.
以考察这一地域而闻名的科学家们

Latin expl½³re}
拉丁语 expl½³re}
ex- [ex-]
ex- [前缀,表“…之外”]
perhaps pl½³re} [to cry out, as to rouse game]
可能为 pl½³re} [大声呼喊,为提醒比赛]

explore
[iks5plC:]
vt.
探索, 研究; 钻研
勘探, 探测; 测定; 探险
【医】探察(伤处等)
explore archives
查档案
explore the Antarctic regions
南极地区考察[探险]



exploit
[iks5plCit]
vt.
开拓, 开发, 开采, 剥削, 用以自肥
v.
使用

exploit
ex.ploit
AHD:[µk“sploit”, ¹k-sploit“]
D.J.[6ek7spl%it, ik6spl%it]
K.K.[6Wk7spl%!t, !k6spl%!t]
n.(名词)
An act or deed, especially a brilliant or heroic one.See Synonyms at feat 1
英勇的行为:一种行动或行为,尤指辉煌的或英雄的参见 feat1
v.tr.(及物动词)
ex.ploit.ed, ex.ploit.ing, ex.ploits[¹k-sploit“, µk“sploit”]
To employ to the greatest possible advantage:
充分利用:将优势发挥到最大限度:
exploit one's talents.
充分发挥某人的才能
To make use of selfishly or unethically:
利用…养肥:自私地或不道德地利用:
a country that exploited peasant labor.See Synonyms at manipulate
压榨农民的国家参见 manipulate
To advertise; promote.
做广告;推销

Middle English
中古英语
from Old French esploit
源自 古法语 esploit
from Latin explicitum [neuter past participle of] explic³re [to unfold] * see explicate
源自 拉丁语 explicitum [] explic³re的中性过去分词 [阐明] *参见 explicate



分享到:
评论

相关推荐

    Exploit 编写系列教程第一篇

    Exploit 编写系列教程第一篇.pdf

    Motivated-Reasoning-in-an-Explore-Exploit-Task

    探索-探索任务中的动机推理 作者: , 实验室: 论文引文:[在此处插入引文-当前正在审查的论文(修订和重新提交)] 如需帮助或更多信息,请联系 。 *注:由于数据的复杂性和进行的大量分析,我们遵循发表论文中...

    Motivated-Reasoning-in-a-Causal-Explore-Exploit-Task

    因果的“探索-利用”任务中的动机推理作者: , 实验室:论文引文:[在此处插入引文-当前正在审查的论文(修订和重新提交)] 如需帮助或更多信息,请联系 。 *注:由于数据的复杂性和进行的大量分析,我们遵循发表...

    explore-exploit:“极简探索探索任务中的次优来源”的数据和代码

    探索-利用该存储库随附以下论文: Song M,Bnaya Z,Ma WJ(2019) 自然人类行为3,361-368。 它包括人类参与者的数据,实验代码和用于再现论文中报告的结果的分析代码。数据每个.mat文件都包含一个参与者的数据。...

    matlab分时代码-Explore-Exploit-in-Top-N-Recommender-Systems-via-Gaussian-Pr

    matlab分时代码通过高斯过程探索在前N个推荐系统中的开发 CGP-RANK算法的简单MATLAB实现[1]。 CGP-RANK排列了推荐的有序列表,这是一种非常适合用于Web规模任务的算法,与点击反馈相对较少的情况相比,可用于推荐的...

    The.Antivirus.Hackers.Handbook.1119028752

    You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line...

    A Reinforcement Learning Framework for Medical Image Segmentation.pdf

    to explore/exploit the solution space. The values obtained using this way can be used as valuable knowledge to fill a Q-matrix. The reinforcement learning agent can use this knowledge for similar ...

    The Antivirus Hacker's Handbook(Wiley,2015)

    You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line...

    Multimedia Fingerprinting Forensics for Traitor Tracing

    In this book, we will review a few major design methodologies for collusionresistant ...curves and maps and exploit the unique properties of digital curves in order to devise fingerprinting solutions.

    Deep learning deep portfolios

    We explore the use of deep learning hierarchical models for problems in financial prediction and classification. Financial prediction problems – such as those presented in designing and pricing ...

    Packt.Kali.Linux.2018.4th.Edition.rar

    You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the ...

    Kali Linux Web Penetration Testing Cookbook 2nd - 2018

    Discover the most common web vulnerabilities and prevent them from ...Explore new tools in the Kali Linux ecosystem for web penetration testing Book Description Web applications are a huge point of ...

    车牌识别系统外文文献

    bined with infrared strobe lights or exploit the large size of license plates in certain geographical regions and the (ar- tificially) high discriminability of characters. In this paper, we describe ...

    public:民众

    民众民众线性回归: ://zhuanlan.zhihu.com/p/72513104 lr:逻辑回归逻辑回归 gbdt:梯度提升决策树决策树决策树 ee:exploit-explore利用和探索Exploit-Explore这一对矛盾一直存在的事实,Bandit算法是公认的一种...

    [SQL Server] Microsoft SQL Server 2012 技术内幕 (英文版)

    Explore the core engine of Microsoft SQL Server 2012—and put that practical knowledge to work. Led by a team of SQL Server experts, you’ll learn the skills you need to exploit key architectural ...

    Mastering Android Game Development with Unity

    Explore the advanced features of Unity 5 by building your own Action Fighting game Develop remarkable Graphical User Interfaces (GUIs) with Unity's new uGUI system Enhance your game by adding stunning...

    Machine Learning and Security: Protecting Systems with Data and Algorithms pdf

    With this practical guide, you’ll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis. Machine learning and security ...

    Reactive Programming with RxJava

    Explore strategies to debug and to test programs written in the reactive style Efficiently exploit parallelism and concurrency in your programs Learn about the transition to RxJava version 2

Global site tag (gtag.js) - Google Analytics