英文 網(wǎng)絡(luò)課件 Computer Networking: A Top Down Approach Featuring the Internet, 3rd edition. Jim Kurose, Keith RossAddison-Wesley, July 2004.
標(biāo)簽: Networking Featuring Computer Approach
上傳時間: 2014-07-24
上傳用戶:123啊
/* author: qiaoger from: Computer Science Department of SiChuan University date: 2008-3-27 求算術(shù)表達(dá)式(整數(shù))的值(中序法) */
標(biāo)簽: Department University Computer Science
上傳時間: 2013-12-27
上傳用戶:playboys0
最新的卡巴斯基破解版this the latest vision,and it will be useful for your computer
標(biāo)簽: computer latest vision useful
上傳時間: 2016-12-06
上傳用戶:zhichenglu
An abstract of the sis of Andrew Greenberg for the Master of Science in Elec- trical and Computer Engineering presented May 6, 2005.
標(biāo)簽: Greenberg the abstract Computer
上傳時間: 2014-06-16
上傳用戶:z754970244
《computer architecture》的課后習(xí)題答案,超級經(jīng)典的計算機系統(tǒng)結(jié)構(gòu)方面的書,非清華大學(xué)出版的那本。
標(biāo)簽: architecture computer
上傳時間: 2014-11-10
上傳用戶:sssl
This function applies the Optimal Brain Surgeon (OBS) strategy for % pruning neural network models of dynamic systems. That is networks % trained by NNARX, NNOE, NNARMAX1, NNARMAX2, or their recursive % counterparts.
標(biāo)簽: function strategy Optimal Surgeon
上傳時間: 2013-12-19
上傳用戶:ma1301115706
《Learning OpenCV---Computer vision with the OpenCV library》Gary Bradski & Adrian Kaebler最新權(quán)威OpenCV專著,OpenCV必備寶典
標(biāo)簽: OpenCV Learning Computer Bradski
上傳時間: 2017-01-01
上傳用戶:dancnc
The C programming language 2nd Brain
標(biāo)簽: programming language Brain The
上傳時間: 2014-01-10
上傳用戶:851197153
Exercises to answer computer network 計算機網(wǎng)絡(luò)習(xí)題解答 需要的就下載吧
標(biāo)簽: Exercises computer network answer
上傳時間: 2014-01-24
上傳用戶:我們的船長
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
標(biāo)簽: vulnerabilities Introduction discovered undeniably
上傳時間: 2014-01-05
上傳用戶:yph853211
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1