搜索结果
找到约 457 项符合
NETWORKS 的查询结果
按分类筛选
- 全部分类
- 书籍 (146)
- 其他书籍 (55)
- 技术资料 (49)
- 人工智能/神经网络 (40)
- matlab例程 (19)
- 电子书籍 (14)
- 通讯编程文档 (14)
- 文章/文档 (14)
- 其他 (12)
- 通讯/手机编程 (8)
- 软件设计/软件工程 (7)
- 网络 (6)
- 行业发展研究 (6)
- 论文 (5)
- Internet/网络编程 (5)
- 系统设计方案 (5)
- Java编程 (4)
- 数学计算 (4)
- 单片机开发 (4)
- 软件工程 (3)
- Linux/Unix编程 (3)
- 嵌入式/单片机编程 (3)
- 认证考试资料 (3)
- 3G开发 (3)
- 电源技术 (2)
- 无线通信 (2)
- 学术论文 (2)
- 串口编程 (2)
- 文件格式 (2)
- VC书籍 (2)
- 其他 (1)
- 数值算法/人工智能 (1)
- 加密解密 (1)
- 书籍源码 (1)
- IEEE论文 (1)
- 模拟电子 (1)
- 教育系统应用 (1)
- 编译器/解释器 (1)
- CA认证 (1)
- 技术管理 (1)
- Java书籍 (1)
- BREW编程 (1)
- FlashMX/Flex源码 (1)
其他书籍 另一本介绍贝叶斯网络的经典教材
另一本介绍贝叶斯网络的经典教材,可以与Learning Bayesian Networks配合使用,相得益彰。
书籍 HSDPAHSUPA+for+UMTS+High+Speed+Radio+Access
The first Third Generation Partnership Project (3GPP) Wideband Code Division
Multiple Access (WCDMA) networks were launched during 2002. By the end of 2005
there were 100 open WCDMA networks and a total of over 150 operators having
frequency licenses for WCDMA operation. Currently, the WCDMA network ...
Linux/Unix编程 Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela
Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, ...
论文 Analysis+of+Device-to-Device+Communications
Device-to-device(D2D) communications are now considered as an integral part of future 5G networks
which will enable direct communication between user equipment (UE) without unnecessary routing via
the network infrastructure. This architecture will result in higher throughputs than conventional cellu ...
加密解密 OpenVPN is a robust and highly flexible tunneling application that uses all of the encryption, authe
OpenVPN is a robust and highly flexible tunneling application that uses all of the encryption, authentication, and certification features of the OpenSSL library to securely tunnel IP networks over a single TCP/UDP port.
matlab例程 there are some newly released Neural Network Example Programs for Character Recognition, which based
there are some newly released Neural Network Example Programs for Character Recognition, which based on Image Processing Toolbox,Neural Network Toolbox in MATLAB, which is quite informative for the beginners in Neural networks applicators
通讯编程文档 L. Dong and A. P. Petropulu, 揗ultichannel ALLIANCES: A Cross-layer Cooperative Scheme for Wireless
L. Dong and A. P. Petropulu, 揗ultichannel ALLIANCES: A Cross-layer Cooperative Scheme for Wireless Networks,擨EEE Trans. on Signal ProcessingJanuary 2008.
通讯/手机编程 Model for Opnet. Use this model to generate traffic between source and destination pairs. The resul
Model for Opnet. Use this model to generate traffic between source and destination pairs. The resultant traffic file can then be imported into the networks to mimic traffic patterns and represent background loading on a network
技术资料 c4.5算法,人工智能,神经网络等等数据研究
c4.5算法,人工智能,神经网络等等数据研究-Data c4.5 algorithm research, artificial intelligence, neural networks, etc.
网络 In the next generation of wireless communication systems, there will be a need for the rapid deploy
In the next generation of wireless communication systems, there will be a need for the rapid
deployment of independent mobile users. Significant examples include establishing survivable, efficient,
dynamic communication for emergency operations, disaster relief efforts, and military networks. Such
n ...