搜索结果
找到约 1,339 项符合
Information Theory 的查询结果
按分类筛选
- 全部分类
- 技术资料 (358)
- 其他书籍 (128)
- 书籍 (115)
- 其他 (51)
- Java编程 (45)
- 电子书籍 (35)
- matlab例程 (32)
- 单片机编程 (30)
- 单片机开发 (30)
- 文章/文档 (25)
- 软件设计/软件工程 (25)
- VC书籍 (22)
- 通讯编程文档 (21)
- 软件工程 (19)
- 行业发展研究 (19)
- 通讯/手机编程 (18)
- 书籍源码 (15)
- Linux/Unix编程 (15)
- 文件格式 (13)
- 可编程逻辑 (12)
- 人工智能/神经网络 (12)
- Java书籍 (12)
- 系统设计方案 (11)
- 教程资料 (10)
- Internet/网络编程 (10)
- 微处理器开发 (10)
- SQL Server (9)
- 数值算法/人工智能 (8)
- 嵌入式/单片机编程 (8)
- Delphi控件源码 (8)
- 其他嵌入式/单片机内容 (8)
- 加密解密 (7)
- 驱动编程 (7)
- 网络 (7)
- 数学计算 (7)
- 无线通信 (6)
- 操作系统开发 (6)
- 模拟电子 (6)
- *行业应用 (6)
- 企业管理 (6)
- 汇编语言 (6)
- 编译器/解释器 (5)
- 其他行业 (5)
- Jsp/Servlet (5)
- 源码 (4)
- 论文 (4)
- 电源技术 (4)
- 学术论文 (4)
- DSP编程 (4)
- 压缩解压 (4)
- 技术管理 (4)
- 嵌入式Linux (4)
- J2ME (4)
- VxWorks (4)
- 3G开发 (4)
- PCB相关 (3)
- C/C++语言编程 (3)
- 接口技术 (3)
- 教育系统应用 (3)
- 游戏 (3)
- 编辑器/阅读器 (3)
- SCSI/ASPI (3)
- 其他数据库 (3)
- VHDL/FPGA/Verilog (3)
- Windows Mobile (3)
- RFID编程 (3)
- 数据库系统 (2)
- 存储器技术 (2)
- 资料/手册 (2)
- 测试测量 (2)
- 通信网络 (2)
- 嵌入式综合 (2)
- 磁盘编程 (2)
- 金融证券系统 (2)
- 数据结构 (2)
- 家庭/个人应用 (2)
- JavaScript (2)
- 人物传记/成功经验 (2)
- Ajax (2)
- MacOS编程 (2)
- 教程 (1)
- 其他 (1)
- uCOS编程 (1)
- 多媒体处理 (1)
- 其他文档 (1)
- 技术书籍 (1)
- 技术教程 (1)
- 工业控制 (1)
- Matlab (1)
- 传感与控制 (1)
- CCS (1)
- 源码/资料 (1)
- USB编程 (1)
- 生物技术 (1)
- 百货/超市行业 (1)
- Windows CE (1)
- Symbian (1)
- 医药行业 (1)
- TAPI编程 (1)
- MTK (1)
Java编程 Auctions are among the oldest economic institutions in place. They have been used since antiquity to
Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular ...
书籍 Smart Grid Security
The field of cyber security, or information security, or information
assurance, depending on your preference, is an interdisciplinary one.
It is part computer science, part statistics, part psychology, part law,
and a part of many other fields. Moreover, any cyber security practi-
tioner needs to kn ...
Linux/Unix编程 The same two-stage decoder as above. However, when transforming the symbols prior to Viterbi decodin
The same two-stage decoder as above. However, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only the phase of the received symbol is employed in the metric computation stage.
文章/文档 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
行业发展研究 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
系统设计方案 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
文件格式 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
人物传记/成功经验 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
VC书籍 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
加密解密 This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Compu
This program applies Message Digest MD5 Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information and Network Security Material