搜索结果
找到约 888 项符合
Side-Information 的查询结果
matlab例程 PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A componen
PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficients: c_j=mean(b_j)/std ...
其他行业 There are several problems related to the properties of the triangular mesh representation that des
There are several problems related to the properties of
the triangular mesh representation that describes a
surface of an object. Sometimes, the surface is represented
just as a set of triangles without any other
information and the STL file format, which is used for
data exchanges, is a typicalexam ...
软件设计/软件工程 浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf
浅谈VB.NET的密码算法及其在信息安全中的应用
Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity
,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程 ...
教育系统应用 MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统 =======================================================
MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统
========================================================================
AppWizard has created this 学生管理系统 application for you. This application
not only demonstrates the basics of using the Microsoft Foundation classes
but is also a starting ...
电子书籍 BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that th
BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse:
Get the most out of the built-in applications
Take control of em ...
其他书籍 The System Management BIOS Reference Specification addresses how motherboard and system vendors pres
The System Management BIOS Reference Specification addresses how motherboard and system vendors present
management information about their products in a standard format by extending the BIOS interface on Intel
architecture systems. The information is intended to allow generic instrumentation to deli ...
其他 Please read this document before attempting to compile and run the libraries and applications! The p
Please read this document before attempting to compile and run the libraries and applications! The projects
must be compiled in a particular order. Standard support questions are about compiler and/or linker errors
that are generated when users try to compile the projects in the wrong order. Other i ...
加密解密 加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encr
加密算法实现
Pegwit is a program for performing public key file encryption
and authentication.
Encryption means that pegwit allows you to keep the information
in files you send by email (or other means) confidential.
Eavesdroppers will not be able to read the email.
Authentication allows you to c ...
其他书籍 MS Access is commonly thought of as the little brother of Database engines, and not a lot of materia
MS Access is commonly thought of as the little brother of Database engines, and not a lot of material has
been published about methods used for exploiting it during a penetration test. The aim of this paper is to
bring a lot of disparate information together into one guide.
其他书籍 This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page
This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active
Server Pages environment, but most of the techniques discussed have equivalents in other
database environments. It should be viewed as a "follow up", or perhaps an appendix, to
the previous paper, "Advanced SQL ...