亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Wide-band

  • 在網絡安全中經常會遇到rootkit

    在網絡安全中經常會遇到rootkit,NSA安全和入侵檢測術語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    標簽: rootkit 網絡安全

    上傳時間: 2017-04-04

    上傳用戶:xaijhqx

  • contains documents related to adaptive beamforming algorithms for Wideband Code Division multiple

    contains documents related to adaptive beamforming algorithms for Wideband Code Division multiple access and a research article on circular patch antenna for C band altimeter system

    標簽: beamforming algorithms documents contains

    上傳時間: 2014-09-04

    上傳用戶:youlongjian0

  • A Convex Hull is the smallest convex polygon that contains every point of the set S. A polygon P is

    A Convex Hull is the smallest convex polygon that contains every point of the set S. A polygon P is convex if and only if, for any two points A and B inside the polygon, the line segment AB is inside P. One way to visualize a convex hull is to put a "rubber band" around all the points, and let it wrap as tight as it can. The resultant polygon is a convex hull.

    標簽: polygon S. the contains

    上傳時間: 2013-12-23

    上傳用戶:it男一枚

  • Auctions are among the oldest economic institutions in place. They have been used since antiquity to

    Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular bidder may depend on information available only to others-and asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information held by different bidders to be shared.

    標簽: institutions antiquity Auctions economic

    上傳時間: 2014-07-14

    上傳用戶:Breathe0125

  • SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producin

    SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producing a signal whose spectrum is more wider than of the data signal, the occupied frequency band being independent by the signal of data band. -The signals with spread spectrum of direct sequence type BPSK (BPSK-DS-SS) -The signals with spread spectrum of direct sequence type QPSK – DS–SS - Frequency hopping spread spectrum signals (FH-SS)

    標簽: MODULATION TECHNIQUES modulation SPECTRUM

    上傳時間: 2017-06-05

    上傳用戶:lht618

  • Novell.Press.Linux.Kernel.Development linux內核開發的經典書籍之一 The Linux kernel is one of the most interes

    Novell.Press.Linux.Kernel.Development linux內核開發的經典書籍之一 The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Development. This authoritative, practical guide will help you better understand the Linux kernel through updated coverage of all the major subsystems, new features associated with Linux 2.6 kernel and insider information on not-yet-released developments. You ll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development

    標簽: Linux Development interes Novell

    上傳時間: 2017-06-06

    上傳用戶:songyue1991

  • Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each rec

    Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each recipe also includes explanations of how and why the approach works, so you can adapt the techniques to similar situations. One of the biggest challenges facing developers today is sorting through the wide variety of tools available form various source and figuring out how to them effectively. The recipes in Java Extreme Programming Cookbook showcase how to use the most important features of these XP tools. Many of these tools are geared towards unit testing, while others are invaluable for continuous integration with these practical examples, you ll be able to choose the most effective tools to accomplish your goals, then implement them in a cohesive development environment quickly.

    標簽: cut-and-paste Programming collection Cookbook

    上傳時間: 2017-06-29

    上傳用戶:cmc_68289287

  • Frequency domain characterization of los nonfading indoor wireless LAN channel employing frequency a

    Frequency domain characterization of los nonfading indoor wireless LAN channel employing frequency and polarization diversity in the 63.4 to 65.4GHz band

    標簽: characterization Frequency employing frequency

    上傳時間: 2013-12-22

    上傳用戶:zhaoq123

  • Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A

    Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes, gaming consoles and automotive navigation/entertainment systems. The Cortex-A8 processor spans a range of performance points depending on the implementation, delivering over to 2000 Dhrystone MIPS (DMIPS) of performance for demanding consumer applications and consuming less than 300mW for low-power mobile devices. This translates into a large increase in processing capability while staying with the power levels of previous generations of mobile devices. Consumer applications will benefit from the reduced heat dissipation and resulting lower packaging and integration costs.

    標簽: microprocessor Introduction applications Cortex

    上傳時間: 2013-12-09

    上傳用戶:xzt

  • Architecture and Implementation ? ? Cortex -A8 of the ARM Microprocessor October 2005

    Architecture and Implementation ? ? Cortex -A8 of the ARM Microprocessor October 2005 Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes,

    標簽: Implementation Microprocessor Architecture October

    上傳時間: 2013-12-15

    上傳用戶:daoxiang126

主站蜘蛛池模板: 杂多县| 和硕县| 司法| 武威市| 贵州省| 东台市| 余庆县| 云南省| 河西区| 鲁山县| 泰兴市| 兴业县| 洞口县| 博罗县| 汉寿县| 呼伦贝尔市| 陵水| 昌邑市| 北川| 瓮安县| 界首市| 清涧县| SHOW| 文登市| 湘潭市| 钦州市| 胶州市| 同德县| 昌宁县| 肇源县| 开江县| 湘乡市| 湟中县| 井冈山市| 云南省| 图木舒克市| 平顶山市| 阳城县| 武宁县| 筠连县| 横峰县|