搜索结果
找到约 561 项符合
NETWORKS-ART 的查询结果
其他 Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to ...
Internet/网络编程 FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seap
FERRET - a broadcast analysis tool
This tool is designed to demonstrate the problem of "data seapage".
The average machine broadcasts a lot of information about itself
on open networks. This tool captures and organizes this information.
This code is extremely low quality, hacked together in order ...
通讯/手机编程 Model for Opnet. Use this model to generate traffic between source and destination pairs. The resul
Model for Opnet. Use this model to generate traffic between source and destination pairs. The resultant traffic file can then be imported into the networks to mimic traffic patterns and represent background loading on a network
电子书籍 Abstract—Stable direct and indirect decentralized adaptive radial basis neural network controllers
Abstract—Stable direct and indirect decentralized adaptive radial basis
neural network controllers are presented for a class of interconnected
nonlinear systems. The feedback and adaptation mechanisms for each
subsystem depend only upon local measurements to provide asymptotic
tracking of a referen ...
加密解密 The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfi ...
通讯/手机编程 Adaptive Coordinated Medium Access Control (AC-MAC), a contention-based Medium Access Control proto
Adaptive Coordinated Medium Access Control (AC-MAC), a contention-based Medium
Access Control protocol for wireless sensor networks. To handle the load variations in some real-time sensor applications, ACMAC
introduces the adaptive duty cycle scheme within the framework of sensor-MAC (S-MAC).
文章/文档 Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. B
Abstract-In this paper, simple autonomous chaotic circuits
coupled by resistors are investigated. By carrying out computer
calculations and circuit experiments, irregular self-switching phenomenon
of three spatial patterns characterized by the phase
states of quasi-synchronization of chaos can be ob ...
电子书籍 The goal of this thesis is the development of traffic engineering rules for cellular packet radio n
The goal of this thesis is the development of traffic engineering rules for cellular packet
radio networks based on GPRS and EDGE. They are based on traffic models for typical
mobile applications. Load generators, representing these traffic models, are developed
and integrated into a simulation envi ...
电子书籍 Pattern Analysis is the process of fi nding general relations in a set of data, and forms the
Pattern Analysis is the process of &#64257 nding general relations in a set of data,
and forms the core of many disciplines, from neural networks to so-called syn-
tactical pattern recognition, from statistical pattern recognition to machine
learning and data mining. Applications of pattern analysis ...
单片机开发 达拉斯 1-Wire 主机通信 这份资料展示了如何把 1-Wire 主机通信在应用到一个AVR系统中
达拉斯 1-Wire 主机通信 这份资料展示了如何把 1-Wire 主机通信在应用到一个AVR系统中,不仅仅是在软件方面,还有U(S)ART模式下的应用。