搜索结果

找到约 1,080 项符合 Communication-Protocol 的查询结果

加密解密 Examples showing the use of Certificate Revocation Lists (CRLs) and Online Certificate Status Protoc

Examples showing the use of Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP).
https://www.eeworm.com/dl/519/193153.html
下载: 70
查看: 1058

其他书籍 In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts

In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts with an introduction to Winsock and is specifically geared for the beginning Winsock programmer. This chapter covers all the basics and introduces Transmission Control Protocol (TCP) and User Datagra ...
https://www.eeworm.com/dl/542/194338.html
下载: 66
查看: 1050

其他 Intrusion Detection:Host-based Network Intrusion Detection &#8226 At each host, monitor all incomi

Intrusion Detection:Host-based Network Intrusion Detection &#8226 At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – Examine contents
https://www.eeworm.com/dl/534/195854.html
下载: 179
查看: 1035

其他书籍 This document describes the uIP TCP/IP stack. The uIP TCP/IP stack is an extremely small implementat

This document describes the uIP TCP/IP stack. The uIP TCP/IP stack is an extremely small implementation of the TCP/IP protocol suite intended for embedded systems running low-end 8 or 16-bit microcon-trollers. The code size and RAM requirements of uIP is an order of magnitude smaller than other gene ...
https://www.eeworm.com/dl/542/198255.html
下载: 94
查看: 1050

VxWorks THIS CODE IS FOR EXAMPLE PURPOSES ONLY, USE AT YOUR OWN RISK, NO WARRANTY IS ASSUMED OR IMPLIED

THIS CODE IS FOR EXAMPLE PURPOSES ONLY, USE AT YOUR OWN RISK, NO WARRANTY IS ASSUMED OR IMPLIED The intension of this code is to provide an example of attaching to the MUX layer with a custom ethernet protocol. Though the NPT code is provided for handling alternate frames, it has not been tested ...
https://www.eeworm.com/dl/662/199895.html
下载: 174
查看: 1094

行业发展研究 In this paper, we describe the development of a mobile butterfly-watching learning (BWL) system to

In this paper, we describe the development of a mobile butterfly-watching learning (BWL) system to realize outdoor independent learning for mobile learners. The mobile butterfly-watching learning system was designed in a wireless mobile ad-hoc learning environment. This is first result to provide a ...
https://www.eeworm.com/dl/692/200864.html
下载: 54
查看: 1056

matlab例程 DS-CDMA通信系统中的空时移动信道估计

DS-CDMA通信系统中的空时移动信道估计,原文发表在IEE PROCEEDING OF COMMUNICATION上
https://www.eeworm.com/dl/665/201244.html
下载: 103
查看: 1048

网络 Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports:

Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports: * Main features of SSH 2 protocol * Implements X11 forwarding, and authentication-agent forwarding for OpenSSH clients * Compatible with OpenSSH ~/.ssh/authorized_keys public key authentication ...
https://www.eeworm.com/dl/635/201813.html
下载: 200
查看: 1042

其他 This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) comm

This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) communication system. The receiver uses a correlator(mixer-integrator[LPF]) configuration with BER measurements comparing measured and theoretical results. The bandpass and low pass used in the receiver a ...
https://www.eeworm.com/dl/534/201814.html
下载: 77
查看: 1056

DSP编程 This directory contains an example ADSP-BF535 subroutine that demonstrates the initialization of t

This directory contains an example ADSP-BF535 subroutine that demonstrates the initialization of the AC 97 communication link between SPORT0 on the ADSP-BF535 and the AD1885 stereo Codec.
https://www.eeworm.com/dl/516/202188.html
下载: 64
查看: 1056