Search: "identify"
Large-scale graph searches and real-time computing applications in the Alibaba anti-fraud system Forums
processing capabilities and large-scale graph search technology to identify fraud behavior anywhere in the system. 1. Taobao anti ...
Beating Counterfeits with Alibaba Cloud Optical Character Recognition (OCR blog
these image into machine-readable text. The main challenge for OCR is to identify letters, characters, and symbols in various ...
Visualizing a Microservices Architecture with AHAS blog
This blog explores how architectural visualization can help us identify problems that exist in our architecture, and ensure our ...
TopN statement - Realtime Compute Documentation
must contain primary keys. Constraints of the WHERE condition To enable Flink SQL to identify a TopN query ...
Data types - ApsaraVideo for Media Processing Documentation
stream number, used to identify the position of the video stream in the whole media streams CodecName ...
The Computing Conference 2018 Workshop: Log Based Security Analysis blog
massive logs from the ground up, and how to filter and identify suspicious operations and analyze them in real time to further enable ...
Apsara Stack: Full-Stack Private Cloud Solution for Size Enterprises - Alibaba Cloud Product
. Applying these measures, we have vastly improved the opportunities to identify and suppress contraband shipments. General ...
Introduction to Stress Testing blog
second (TPS), response delay, etc. This data allows us to understand the server's performance and to identify existing problems ...
Harden Kubernetes - Security Advisories Documentation
used for the user authorization process: UserName: String type, used to identify the user who initiates the request. If no ...
Access logging - Object Storage Service Documentation
.) UniqueString: the string (UUID) generated by OSS, which is used to uniquely identify the object. The following example ...