搜索结果

找到约 6 项符合 asymmetric 的查询结果

人工智能/神经网络 A branch-and-bound algorithm for asymmetric TSP

A branch-and-bound algorithm for asymmetric TSP
https://www.eeworm.com/dl/650/449375.html
下载: 185
查看: 1040

通讯编程文档 Abstract-The effect of the companding process on QAM signals has been under investigation for the p

Abstract-The effect of the companding process on QAM signals has been under investigation for the past several years. The compander, included in the PCM telephone network to improve voice performance, has an unusual affect on digital QAM data signals which are transmitted over the same channel. The ...
https://www.eeworm.com/dl/646/310216.html
下载: 151
查看: 1062

数据结构 very simple nonvisual Delphi component useful for shareware program developing. It uses crypted lic

very simple nonvisual Delphi component useful for shareware program developing. It uses crypted license files containing information about exe file (size and crc), expired date and any additional information. As TArtLicense uses RSA asymmetric algorithm and TArtLicense knows only decryption key, nob ...
https://www.eeworm.com/dl/654/424790.html
下载: 128
查看: 1042

Java编程 Auctions are among the oldest economic institutions in place. They have been used since antiquity to

Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular ...
https://www.eeworm.com/dl/633/430541.html
下载: 47
查看: 1030

加密解密 a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s

a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asym ...
https://www.eeworm.com/dl/519/481912.html
下载: 25
查看: 1114

书籍 Fundamental Limits on a Class of Secure

Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity ...
https://www.eeworm.com/dl/521171.html
下载: 1
查看: 59