Multimedia security: the 22nd century approach
资源简介:Multimedia security: the 22nd century approach
上传时间: 2016-02-26
上传用户:waizhang
资源简介:Context-Sensitive Semantic Smoothing for the Language Modeling approach to Genomic IR(上下文敏感的语义平滑的语言建模方法)
上传时间: 2015-11-04
上传用户:pkkkkp
资源简介:UCL Common Code Library Routines common to a number of Multimedia tools. The library originates from work on the RAT project: these are portions that are not directly related to an audio tool and potentially useful elsewhere.
上传时间: 2013-12-25
上传用户:xiaohuanhuan
资源简介:Multimedia Messaging Service An Engineering approach To MMS[John Wiley And Sons] 这就是一本MMS好书,都已经搜到这个关键词我就不多介绍了
上传时间: 2013-12-18
上传用户:changeboy
资源简介:Animal Cell Technology - Challenges for the 21st century
上传时间: 2017-04-21
上传用户:363186
资源简介:Calculate the reflection and transmission coefficients using the S-Matrix approach in Matlab.
上传时间: 2014-12-03
上传用户:whenfly
资源简介:PhD thesis on nonlinear diffusion filtering of images using the topological gradient approach to edges detection
上传时间: 2014-12-22
上传用户:ruan2570406
资源简介:Multimedia security development articles
上传时间: 2017-07-15
上传用户:hzy5825468
资源简介:An Overview of Smart Card security. The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-...
上传时间: 2017-09-25
上传用户:busterman
资源简介:From helping to assess the value of new medical treatments to evaluating the factors that affect our opinions and behaviors, analysts today are finding myriad uses for categorical data methods. In this book we introduce these methods and...
上传时间: 2014-01-25
上传用户:jennyzai
资源简介:The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved for...
上传时间: 2016-12-08
上传用户:fxf126@126.com
资源简介:The software and hardware development fields evolved along separate paths through the end of the 20th century. We seem to have come full circle, however. The previously rigid hardware on which our programs run is softening in many ways. Emb...
上传时间: 2017-08-15
上传用户:cjf0304
资源简介:Digital radios have undergone an astonishing evolution in the last century. Born as a set of simple and power-hungry electrical and electromechanical devices for low data rate transmission of telegraph data in the Marconi age, they have tra...
上传时间: 2020-06-01
上传用户:shancjb
资源简介:卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may imp...
上传时间: 2017-08-29
上传用户:thinode
资源简介:We consider the problem of target localization by a network of passive sensors. When an unknown target emits an acoustic or a radio signal, its position can be localized with multiple sensors using the time difference of arrival (T...
上传时间: 2016-11-27
上传用户:xxmluo
资源简介:The capability of radio waves to provide almost instantaneous distant communications without interconnecting wires was a major factor in the explosive growth of communica- tions during the 20th century. With the dawn of the 21st century, th...
上传时间: 2020-05-26
上传用户:shancjb
资源简介:When the authors of this book asked me to write the foreword of their work on the digital enterprise, I immediately thought that it was one more document on a fashionable topic in the technology and the business world of the 21st century of...
上传时间: 2020-05-27
上传用户:shancjb
资源简介:Much of Game Theory has developed within the community of Economists, starting from the book “Theory of Games and Economic behavior” by Mor- genstern and Von Neumann (1944). To a lesser extent, it has had an impact on biology (with the de...
上传时间: 2020-05-27
上传用户:shancjb
资源简介:In the nineteenth century, scientists, mathematician, engineers and innovators started investigating electromagnetism. The theory that underpins wireless communications was formed by Maxwell. Early demonstrations took place by Hertz, Tesla ...
上传时间: 2020-05-27
上传用户:shancjb
资源简介:The unguided transmission of information using electromagnetic waves at radio frequency (RF) is often referred to as wireless communications, the first demonstration of which took place at the end of the 19th cen- tury and is attributed to ...
上传时间: 2020-06-01
上传用户:shancjb
资源简介:Welcome to the third volume of the book entitled Technologies for the Wireless Future, which is produced by WWRF. The idea is to take the most important outputs from the working groups and special-interest groups that compose the Forum and ...
上传时间: 2020-06-01
上传用户:shancjb
资源简介:Electrostatic discharge (ESD) phenomena have been known to mankind since the Greek Empire when Thales of Miletus, one of the Seven Sages of Greece, noticed the attraction of strands of hay to amber, leading to the coining of the word ‘‘el...
上传时间: 2020-06-05
上传用户:shancjb
资源简介:The countless technological advances of the twentieth century require that futureengineering educationemphasizebridging thegapbetweentheoryand the real world.Thisedition hasbeenprepared withparticular attentiontothe needs of undergraduates,...
上传时间: 2020-06-10
上传用户:shancjb
资源简介:Modern information technologies and the advent of machines powered by artificial intelligence (AI) have already strongly influenced the world of work in the 21st century. Computers, algorithms and software simplify everyday tasks, and it is...
上传时间: 2020-06-10
上传用户:shancjb
资源简介:Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone i...
上传时间: 2017-05-25
上传用户:变形金刚
资源简介:Steganography is the art of communicating a message by embedding it into Multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An a...
上传时间: 2017-07-29
上传用户:
资源简介:The Tao of Network security Monitoring Beyond Intrusion Detection
上传时间: 2014-08-15
上传用户:zwei41
资源简介:IPsec VPN的RFC文档集合: RFC 2401 《security Architecture for the Internet Protocol》 RFC 2402 《IP Authentication Header》 RFC 2406 《IP Encapsulating security Payload (ESP)》 RFC 2407 《The Internet IP security Domain of Interpretation...
上传时间: 2015-04-21
上传用户:hebmuljb
资源简介:Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software i...
上传时间: 2015-04-30
上传用户:bjgaofei
资源简介:Halting The Hacker A Practical Guide To Computer security
上传时间: 2014-01-06
上传用户:希酱大魔王