搜索结果

找到约 1,339 项符合 Information Theory 的查询结果

按分类筛选

显示更多分类

Java编程 Auctions are among the oldest economic institutions in place. They have been used since antiquity to

Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular ...
https://www.eeworm.com/dl/633/430541.html
下载: 47
查看: 1055

书籍 Smart Grid Security

The field of cyber security, or information security, or information assurance, depending on your preference, is an interdisciplinary one. It is part computer science, part statistics, part psychology, part law, and a part of many other fields. Moreover, any cyber security practi- tioner needs to kn ...
https://www.eeworm.com/dl/522347.html
下载: 1
查看: 170

Linux/Unix编程 The same two-stage decoder as above. However, when transforming the symbols prior to Viterbi decodin

The same two-stage decoder as above. However, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only the phase of the received symbol is employed in the metric computation stage.
https://www.eeworm.com/dl/619/171799.html
下载: 118
查看: 1065

文章/文档 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/652/441081.html
下载: 163
查看: 1098

行业发展研究 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/692/441085.html
下载: 104
查看: 1064

系统设计方案 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/678/441086.html
下载: 133
查看: 1054

文件格式 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/639/441089.html
下载: 96
查看: 1060

人物传记/成功经验 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/695/441090.html
下载: 68
查看: 1067

VC书籍 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/686/441091.html
下载: 49
查看: 1062

加密解密 This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Compu

This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
https://www.eeworm.com/dl/519/476061.html
下载: 36
查看: 1081