搜索结果

找到约 788 项符合 Some 的查询结果

按分类筛选

显示更多分类

通讯/手机编程 The exercise should be finished in English. 2. According to Prof. Zhang s requirement, this exercis

The exercise should be finished in English. 2. According to Prof. Zhang s requirement, this exercise mainly focuses on the BER performance of some wireless communication system using specific coding and modulation type through the AWGN channel. Signal-to-Noise ration (SNR) varies from 5dB to 20dB.
https://www.eeworm.com/dl/527/389489.html
下载: 56
查看: 1110

其他 Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. ...
https://www.eeworm.com/dl/534/391049.html
下载: 149
查看: 1044

压缩解压 This toolbox contains Matlab files that implement the nonsubsample contourlet transform and its util

This toolbox contains Matlab files that implement the nonsubsample contourlet transform and its utility functions. Some Matlab files are the same as those in Contourlet Toolbox.
https://www.eeworm.com/dl/617/391686.html
下载: 94
查看: 1036

其他 This piece of software was written as a replacement and extension for Tripwire. Tripwire is an exce

This piece of software was written as a replacement and extension for Tripwire. Tripwire is an excellent program in itself but lacks some features and is a closed product.
https://www.eeworm.com/dl/534/391966.html
下载: 87
查看: 1071

通讯/手机编程 if an application works with restricted low level system calls, it must obtain a Microsoft Mobile2Ma

if an application works with restricted low level system calls, it must obtain a Microsoft Mobile2Market privileged signature. To get a privileged signature, logo certification is now a requirement, not an option! This article shows how to abstract some of the most common issues a developer will enc ...
https://www.eeworm.com/dl/527/392590.html
下载: 89
查看: 1054

嵌入式/单片机编程 This document provides guidelines and describes how to easily port S60 2nd Edition C++ application

This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Fo ...
https://www.eeworm.com/dl/647/398082.html
下载: 60
查看: 1051

其他 This text introduces the spirit and theory of hacking as well as the science behind it all it also p

This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 我记得好像的关于缓冲区溢出的
https://www.eeworm.com/dl/534/403180.html
下载: 121
查看: 1043

USB编程 The USB Multi-Interface driver is a replacement driver for the system provided Multi-Interface drive

The USB Multi-Interface driver is a replacement driver for the system provided Multi-Interface driver. This driver was developed to overcome some bugs that are included in the build in driver and to introduce new features. The driver is compatible to the system provided Multi-Interface driver. If th ...
https://www.eeworm.com/dl/643/403307.html
下载: 160
查看: 1070

多国语言处理 This software performs code conversion of Chinese characters, including GB2312/GBK and BIG5. It a

This software performs code conversion of Chinese characters, including GB2312/GBK and BIG5. It also supports some encodings of Chinese character code which are used widely in Japan, such as Chinese Writer, cWnn, Nihao, Zhongwen Qigao, etc.
https://www.eeworm.com/dl/637/405850.html
下载: 152
查看: 1081

其他 Description The art galleries of the new and very futuristic building of the Center for Balkan Coop

Description The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watching over all of the pictures is a big security concern. Your task is that for a given gallery to wri ...
https://www.eeworm.com/dl/534/405931.html
下载: 64
查看: 1178