The exercise should be finished in English. 2. According to Prof. Zhang s requirement, this exercise mainly focuses on the BER performance of SOME wireless communication system using specific coding and modulation type through the AWGN channel. Signal-to-Noise ration (SNR) varies from 5dB to 20dB.
标签: requirement According exercise finished
上传时间: 2014-01-06
上传用户:zhangyigenius
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve SOME of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand SOME control over your PC to SOMEone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
This toolbox contains Matlab files that implement the nonsubsample contourlet transform and its utility functions. SOME Matlab files are the same as those in Contourlet Toolbox.
标签: nonsubsample contourlet implement transform
上传时间: 2017-01-14
上传用户:lunshaomo
This piece of software was written as a replacement and extension for Tripwire. Tripwire is an excellent program in itself but lacks SOME features and is a closed product.
标签: Tripwire replacement extension software
上传时间: 2014-01-25
上传用户:宋桃子
if an application works with restricted low level system calls, it must obtain a Microsoft Mobile2Market privileged signature. To get a privileged signature, logo certification is now a requirement, not an option! This article shows how to abstract SOME of the most common issues a developer will encounter when creating a native code application that must be logo certified for each platform. windowsmobile5.0以上版本logo注册例子,可以加入自己的工程文件中。
标签: application restricted Microsoft Mobile2Ma
上传时间: 2017-01-16
上传用户:13160677563
This document provides guidelines and describes how to easily port S60 2nd Edition C++ applications to S60 3rd Edition. The document has been written based on experiences of porting regular S60 2nd Edition applications, such as the S60 Platform: POP/IMAP Example [4] that can be downloaded from Forum Nokia. Code snippets from the example are shown in Chapter 8, “Application build changes,” and in Appendix A, “Code example." In addition, Appendix B, "Commonly used functions that require capabilities," and Appendix C, "Commonly used interfaces that have been changed or removed," provide useful information on SOME frequently used functions and interfaces in third-party applications.
标签: application guidelines describes document
上传时间: 2017-01-29
上传用户:wang5829
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides SOME core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 我记得好像的关于缓冲区溢出的
标签: introduces the hacking science
上传时间: 2014-08-14
上传用户:Breathe0125
The USB Multi-Interface driver is a replacement driver for the system provided Multi-Interface driver. This driver was developed to overcome SOME bugs that are included in the build in driver and to introduce new features. The driver is compatible to the system provided Multi-Interface driver. If the driver is installed on a system, it does not automatically replace the system provided driver. It exists parallel to the system driver and is assigned to a device during the installation process.
标签: Multi-Interface driver replacement provided
上传时间: 2017-02-11
上传用户:asddsd
This software performs code conversion of Chinese characters, including GB2312/GBK and BIG5. It also supports SOME encodings of Chinese character code which are used widely in Japan, such as Chinese Writer, cWnn, Nihao, Zhongwen Qigao, etc.
标签: characters conversion including software
上传时间: 2014-01-05
上传用户:GavinNeko
Description The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watching over all of the pictures is a big security concern. Your task is that for a given gallery to write a program which finds the surface of the area of the floor, from which each point on the walls of the gallery is visible. On the figure 1. a map of a gallery is given in SOME co-ordinate system. The area wanted is shaded on the figure 2.
标签: Description futuristic galleries the
上传时间: 2017-02-17
上传用户:1427796291