亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊(cè)

hidden

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    標(biāo)簽: open-source encryption Features software

    上傳時(shí)間: 2013-12-20

    上傳用戶:123啊

  • The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesi

    The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesian network for discrete variables in which the conditional probability tables are specified by logistic regression models. Logistic regression can be used to incorporate restrictions on the conditional probabilities and to account for the effect of covariates. Nominal variables are modeled with multinomial logistic regression, whereas the category probabilities of ordered variables are modeled through a cumulative or adjacent-categories response function. Variables can be observed, partially observed, or hidden.

    標(biāo)簽: estimating parameters functions defining

    上傳時(shí)間: 2014-12-05

    上傳用戶:天誠24

  • It is a dark time for the Rebellion. Although the Death Star has been destroyed, Imperial troops hav

    It is a dark time for the Rebellion. Although the Death Star has been destroyed, Imperial troops have driven the Rebel forces from their hidden base and pursued them across the galaxy."

    標(biāo)簽: Rebellion destroyed the Although

    上傳時(shí)間: 2017-07-04

    上傳用戶:yangbo69

  • Steganography is the art of communicating a message by embedding it into multimedia data. It is desi

    Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate information-theoretic model for steganography has been proposed by Cachin

    標(biāo)簽: Steganography communicating multimedia embedding

    上傳時(shí)間: 2017-07-29

    上傳用戶:

  • ADIAL Basis Function (RBF) networks were introduced into the neural network literature by Broomhead

    ADIAL Basis Function (RBF) networks were introduced into the neural network literature by Broomhead and Lowe [1], which are motivated by observation on the local response in biologic neurons. Due to their better approximation capabilities, simpler network structures and faster learning algorithms, RBF networks have been widely applied in many science and engineering fields. RBF network is three layers feedback network, where each hidden unit implements a radial activation function and each output unit implements a weighted sum of hidden units’ outputs.

    標(biāo)簽: introduced literature Broomhead Function

    上傳時(shí)間: 2017-08-08

    上傳用戶:lingzhichao

  • The software and hardware development fields evolved along separate paths through the end of the 20t

    The software and hardware development fields evolved along separate paths through the end of the 20th century. We seem to have come full circle, however. The previously rigid hardware on which our programs run is softening in many ways. Embedded systems are largely responsible for this softening. These hidden computing systems drive the electronic products around us, including consumer products like digital cameras and personal digital assistants, office automation equipment like copy machines and printers, medical devices like heart monitors and ventilators, and automotive electronics like cruise controls and antilock brakes. Embedded systems force designers to work under incredibly tight time-tomarket, power consumption, size, performance, flexibility, and cost constraints. Many technologies introduced over the past two decades have sought to help satisfy these constraints. To understand these technologies, it is important to first distinguish the underlying embedded systems elements.

    標(biāo)簽: development the software hardware

    上傳時(shí)間: 2017-08-15

    上傳用戶:cjf0304

  • C++ From Scratch: An Object-Oriented Approach is designed to walk novice programmers through the ana

    C++ From Scratch: An Object-Oriented Approach is designed to walk novice programmers through the analysis, design and implementation of a functioning object-oriented application using C++. You will learn all the critical programming concepts and techniques associated with the language in the context of creating a functioning application. Best selling C++ author Jesse Liberty shows you how to create "Decryptix", a game of decoding a hidden pattern as quickly as possible, using nothing but successive guesses and the application of logic. Every example and technique is put into the context of achieving a goal and accomplishing an end.

    標(biāo)簽: Object-Oriented programmers Approach designed

    上傳時(shí)間: 2013-12-25

    上傳用戶:225588

  • Windows CMD Emulator is Based Upon Creating a Pipe to Read and Write Data to, it Opens a CMD Window

    Windows CMD Emulator is Based Upon Creating a Pipe to Read and Write Data to, it Opens a CMD Window hidden and Starts Sending and Receiving Data from it using a simple SetTimer Event

    標(biāo)簽: CMD Emulator Creating Windows

    上傳時(shí)間: 2014-01-03

    上傳用戶:上善若水

  • If you are a C++ programmer who desires a fuller understanding of what is going on "under the hood,"

    If you are a C++ programmer who desires a fuller understanding of what is going on "under the hood," then Inside the C++ Object Model is for you! Inside the C++ Object Model focuses on the underlying mechanisms that support object-oriented programming within C++: constructor semantics, temporary generation, support for encapsulation, inheritance, and "the virtuals"-virtual functions and virtual inheritance. This book shows how your understanding the underlying implementation models can help you code more efficiently and with greater confidence. Lippman dispells the misinformation and myths about the overhead and complexity associated with C++, while pointing out areas in which costs and trade offs, sometimes hidden, do exist. He then explains how the various implementation models arose, points out areas in which they are likely to evolve, and why they are what they are. He covers the semantic implications of the C++ object model and how that model affects your programs.

    標(biāo)簽: understanding programmer desires fuller

    上傳時(shí)間: 2017-09-25

    上傳用戶:gtzj

  • EM算法(英文)A Gentle Tutorial of the EM Algorithm and its Application to Parameter Estimation for Gaus

    EM算法(英文)A Gentle Tutorial of the EM Algorithm and its Application to Parameter Estimation for Gaussian Mixture and hidden Markov Models

    標(biāo)簽: Application Estimation Algorithm Parameter

    上傳時(shí)間: 2017-09-27

    上傳用戶:dianxin61

主站蜘蛛池模板: 通州市| 罗甸县| 隆尧县| 贵溪市| 英山县| 诏安县| 明溪县| 原平市| 嘉鱼县| 静安区| 洛川县| 鹤庆县| 荔波县| 肇东市| 长子县| 奉化市| 儋州市| 介休市| 岑巩县| 萍乡市| 耿马| 万年县| 霍山县| 云林县| 嘉鱼县| 商南县| 游戏| 廊坊市| 九江县| 安丘市| 马公市| 金塔县| 临高县| 香河县| 紫金县| 翼城县| 陵川县| 朔州市| 凤山市| 隆林| 遂川县|