In the next generation of wireless communication systems, there will be a need for the rapid
deployment of independent mobile users. Significant examples include establishing survivable, efficient,
dynamic communication for emergency operations, disaster relief efforts, and military networks. Such
network scenarios cannot rely on centralized and organized connectivity, and can be conceived as
applications of mobile ad hoc networks. A MANET is an autonomous collection of mobile users that
communicate over relatively bandwidth constrained wireless links. Since the nodes are decentralized, where
all network activity including discovering the
本驅動程序對于開發PCI的底層協議驅動很有研究價值,能生成用戶需要的sys文件-the driver for the development of the underlying agreement PCI great research value-driven, users can generate the necessary documents sys
PixelFusion.dsp
This file (the project file) contains information at the project level and
is used to build a single project or subproject. Other users can share the
project (.dsp) file, but they should export the makefiles locally.
PixelFusion.h
This is the main header file for the application. It includes other
project specific headers (including Resource.h) and declares the
CPixelFusionApp application class.
PixelFusion.cpp
This is the main application source file that contains the application
class CPixelFusionApp.
PixelFusion.rc
This is a listing of all of the Microsoft Windows resources that the
program uses. It includes the icons, bitmaps, and cursors that are stored
in the RES subdirectory. This file can be directly edited in Microsoft
Visual C++.
PixelFusion.clw
This file contains information used by ClassWizard to edit existing
classes or add new classes. ClassWizard also uses this file to store
information needed to create and edit message maps and dialog data
maps and to create prototype member functions.
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity coding
systems (MDCS). To achieve perfect (information-theoretic)
secrecy against wiretap channels, this paper investigates the
fundamental limits on the secure rate region of the asymmetric
MDCS (AMDCS), which include the symmetric case as a special
case. Threshold perfect secrecy is added to the AMDCS model.
The eavesdropper may have access to any one but not more than
one subset of the channels but know nothing about the sources,
as long as the size of the subset is not above the security level.
The question of whether superposition (source separation) coding
is optimal for such an AMDCS with threshold perfect secrecy
is answered. A class of secure AMDCS (S-AMDCS) with an
arbitrary number of encoders is solved, and it is shown that linear
codes are optimal for this class of instances. However, in contrast
with the secure symmetric MDCS, superposition is shown to
be not optimal for S-AMDCS in general. In addition, necessary
conditions on the existence of a secrecy key are determined as a
design guideline.