1. check the source code of Bayesian Watchdog. 

2. check the solutions towards the three attacks defined by myself. 

关于贝叶斯的理解,参考http://www.cnblogs.com/LeftNotEasy/archive/2010/09/27/1837163.html

 posted on 2012-03-10 14:14  Fuzzy Joke  阅读(149)  评论(0编辑  收藏  举报