摘要:
Techniques for generating machine learning architectures are provided. A data set is received for training one or more machine learning (ML) models, where the data set comprises labeled exemplars for a plurality of classes. The data set is partitioned into a training set and a testing set. A first ML model is trained using the training set, and a quality of the first ML model with respect to each class of the plurality of classes is evaluated using the testing set. Upon determining that the quality of the first ML model is below a predefined threshold with respect to a first class and a second class of the plurality of classes, a subset of the training set is identified, where each exemplar in the subset corresponds to either the first class or the second class. A second ML model is trained using the subset of the training set.
摘要:
A light emitting diode includes a substrate, a first semiconductor layer, an active layer, a second semiconductor layer, a first electrode, a transparent conductive layer, a second electrode and a metal grating. The first semiconductor layer, the active layer, and the second semiconductor layer are orderly stacked on the substrate. The first electrode is electrically connected to the first semiconductor layer. The transparent conductive layer is located on a surface of the second semiconductor layer away from the substrate. The second electrode is electrically connected to the transparent conductive layer. The metal grating is located on a surface of the transparent conductive layer away from the substrate. The metal grating is a two-dimensional array of a plurality of metal micro-structures.
摘要:
A method, system and an article of manufacture tangibly embodying a computer readable program for protecting Web application data between a server and a client. A response created by the Web application for the client is backed up and modified by adding capturing code for capturing a user action, user data of the client, or combination thereof. The modified response is sent to the client and a request submitted by the client and the user action and/or user data captured by the capturing code is received. A verifying request is generated according to the received user action and/user data captured by the capturing code and the backup of the response. The request submitted by the client is verified according to the verifying request and the verified request is sent to the Web application of the server.
摘要:
A method, system and an article of manufacture tangibly embodying a computer readable program for protecting Web application data between a server and a client. A response created by the Web application for the client is backed up and modified by adding capturing code for capturing a user action, user data of the client, or combination thereof. The modified response is sent to the client and a request submitted by the client and the user action and/or user data captured by the capturing code is received. A verifying request is generated according to the received user action and/user data captured by the capturing code and the backup of the response. The request submitted by the client is verified according to the verifying request and the verified request is sent to the Web application of the server.
摘要:
At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model is identified. The HTTP message model includes a plurality of message model sections. Additional steps include parsing a representation of the at least one of an HTTP request message and an HTTP response message into message sections in accordance with the message model sections of the HTTP message model; and binding a plurality of security rules to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition. The given condition is based, at least in part, on a corresponding given one of the message sections. A further step includes processing the at least one of an HTTP request message and an HTTP response message in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided.
摘要:
A method and apparatus for solving UI style conflicts in web application composition. The method includes the steps of: detecting, in the runtime environment of a web browser, a page element referring to duplicate UI style definitions in a web composite page; determining the UI style definition referred to by the page element in an imported widget or a local page from which it originates; and relating the page element and the determined corresponding UI style definition in the web composite page, so as to solve the UI style conflict.
摘要:
Methods of killing a cancer cell are provided. Also provided are methods of treating a subject having a cancer. Additionally, compounds are provided that comprise a peptide from about 18 to about 100 amino acids or peptidomimetics comprising the sequence of SEQ ID NO:1. Additionally provided are methods of screening an agent for the ability to kill a cancer cell.
摘要翻译:提供杀死癌细胞的方法。 还提供了治疗患有癌症的受试者的方法。 此外,提供了包含约18至约100个氨基酸的肽或包含SEQ ID NO:1的序列的肽模拟物的化合物。 另外提供了筛选药剂以杀死癌细胞的能力的方法。
摘要:
A method and apparatus for solving UI style conflicts in web application composition. The method includes the steps of: detecting, in the runtime environment of a web browser, a page element referring to duplicate UI style definitions in a web composite page; determining the UI style definition referred to by the page element in an imported widget or a local page from which it originates; and relating the page element and the determined corresponding UI style definition in the web composite page, so as to solve the UI style conflict.
摘要:
A plurality of templates for web application server firewall rules are generated. A vulnerability report for the web application is obtained. At least one web application server firewall rule is generated, using the vulnerability report and at least one of the plurality of templates. The at least one web application server firewall rule is tested. The at least one web application server firewall rule is deployed to run on the web application server firewall.
摘要:
At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model is identified. The HTTP message model includes a plurality of message model sections. Additional steps include parsing a representation of the at least one of an HTTP request message and an HTTP response message into message sections in accordance with the message model sections of the HTTP message model; and binding a plurality of security rules to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition. The given condition is based, at least in part, on a corresponding given one of the message sections. A further step includes processing the at least one of an HTTP request message and an HTTP response message in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided.