搜索结果
找到约 1,080 项符合
Communication-Protocol 的查询结果
加密解密 Examples showing the use of Certificate Revocation Lists (CRLs) and Online Certificate Status Protoc
Examples showing the use of Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP).
其他书籍 In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts
In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts with an introduction to Winsock and is specifically geared for the beginning Winsock programmer. This chapter covers all the basics and introduces Transmission Control Protocol (TCP) and User Datagra ...
其他 Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi
Intrusion Detection:Host-based Network
Intrusion Detection
• At each host, monitor all incoming and
outgoing network traffic – for each packet:
– Analyze 4-tuple and protocol
– Examine contents
其他书籍 This document describes the uIP TCP/IP stack. The uIP TCP/IP stack is an extremely small implementat
This document describes the uIP TCP/IP stack. The uIP TCP/IP stack is an extremely small implementation of the TCP/IP protocol suite intended for embedded systems running low-end 8 or 16-bit microcon-trollers. The code size and RAM requirements of uIP is an order of magnitude smaller than other gene ...
VxWorks THIS CODE IS FOR EXAMPLE PURPOSES ONLY, USE AT YOUR OWN RISK, NO WARRANTY IS ASSUMED OR IMPLIED
THIS CODE IS FOR EXAMPLE PURPOSES ONLY, USE AT YOUR OWN RISK, NO WARRANTY
IS ASSUMED OR IMPLIED
The intension of this code is to provide an example of attaching to the MUX layer with a custom
ethernet protocol. Though the NPT code is provided for handling alternate frames, it has not been tested ...
行业发展研究 In this paper, we describe the development of a mobile butterfly-watching learning (BWL) system to
In this paper, we describe the development of a mobile butterfly-watching learning (BWL)
system to realize outdoor independent learning for mobile learners. The mobile butterfly-watching
learning system was designed in a wireless mobile ad-hoc learning environment. This is first result
to provide a ...
matlab例程 DS-CDMA通信系统中的空时移动信道估计
DS-CDMA通信系统中的空时移动信道估计,原文发表在IEE PROCEEDING OF COMMUNICATION上
网络 Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports:
Dropbear is an SSH 2 server, designed to be usable in small memory environments.
It supports:
* Main features of SSH 2 protocol
* Implements X11 forwarding, and authentication-agent forwarding
for OpenSSH clients
* Compatible with OpenSSH ~/.ssh/authorized_keys public key
authentication ...
其他 This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) comm
This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) communication system. The receiver uses a correlator(mixer-integrator[LPF]) configuration with BER measurements comparing measured and theoretical results. The bandpass and low pass used in the receiver a ...
DSP编程 This directory contains an example ADSP-BF535 subroutine that demonstrates the initialization of t
This directory contains an example ADSP-BF535 subroutine that demonstrates the
initialization of the AC 97 communication link between SPORT0 on the ADSP-BF535
and the AD1885 stereo Codec.