搜索结果

找到约 888 项符合 Side-Information 的查询结果

matlab例程 PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A componen

PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficients: c_j=mean(b_j)/std ...
https://www.eeworm.com/dl/665/371771.html
下载: 169
查看: 1065

其他行业 There are several problems related to the properties of the triangular mesh representation that des

There are several problems related to the properties of the triangular mesh representation that describes a surface of an object. Sometimes, the surface is represented just as a set of triangles without any other information and the STL file format, which is used for data exchanges, is a typicalexam ...
https://www.eeworm.com/dl/668/372627.html
下载: 97
查看: 1078

软件设计/软件工程 浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf

浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity ,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程 ...
https://www.eeworm.com/dl/684/374773.html
下载: 80
查看: 1077

教育系统应用 MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统 =======================================================

MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统 ======================================================================== AppWizard has created this 学生管理系统 application for you. This application not only demonstrates the basics of using the Microsoft Foundation classes but is also a starting ...
https://www.eeworm.com/dl/621/375152.html
下载: 93
查看: 1037

电子书籍 BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that th

BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse: Get the most out of the built-in applications Take control of em ...
https://www.eeworm.com/dl/cadence/ebook/375981.html
下载: 185
查看: 1037

其他书籍 The System Management BIOS Reference Specification addresses how motherboard and system vendors pres

The System Management BIOS Reference Specification addresses how motherboard and system vendors present management information about their products in a standard format by extending the BIOS interface on Intel architecture systems. The information is intended to allow generic instrumentation to deli ...
https://www.eeworm.com/dl/542/376027.html
下载: 64
查看: 1042

其他 Please read this document before attempting to compile and run the libraries and applications! The p

Please read this document before attempting to compile and run the libraries and applications! The projects must be compiled in a particular order. Standard support questions are about compiler and/or linker errors that are generated when users try to compile the projects in the wrong order. Other i ...
https://www.eeworm.com/dl/534/376276.html
下载: 21
查看: 1037

加密解密 加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encr

加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encryption means that pegwit allows you to keep the information in files you send by email (or other means) confidential. Eavesdroppers will not be able to read the email. Authentication allows you to c ...
https://www.eeworm.com/dl/519/378022.html
下载: 26
查看: 1043

其他书籍 MS Access is commonly thought of as the little brother of Database engines, and not a lot of materia

MS Access is commonly thought of as the little brother of Database engines, and not a lot of material has been published about methods used for exploiting it during a penetration test. The aim of this paper is to bring a lot of disparate information together into one guide.
https://www.eeworm.com/dl/542/378602.html
下载: 74
查看: 1043

其他书籍 This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page

This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but most of the techniques discussed have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL ...
https://www.eeworm.com/dl/542/378608.html
下载: 133
查看: 1038