搜索结果
找到约 6 项符合
asymmetric 的查询结果
人工智能/神经网络 A branch-and-bound algorithm for asymmetric TSP
A branch-and-bound algorithm for asymmetric TSP
通讯编程文档 Abstract-The effect of the companding process on QAM signals has been under investigation for the p
Abstract-The effect of the companding process on QAM signals
has been under investigation for the past several years. The
compander, included in the PCM telephone network to improve
voice performance, has an unusual affect on digital QAM data
signals which are transmitted over the same channel. The ...
数据结构 very simple nonvisual Delphi component useful for shareware program developing. It uses crypted lic
very simple nonvisual Delphi component useful for shareware program developing.
It uses crypted license files containing information about exe file (size and crc), expired date and any additional information.
As TArtLicense uses RSA asymmetric algorithm and TArtLicense knows only decryption key, nob ...
Java编程 Auctions are among the oldest economic institutions in place. They have been used since antiquity to
Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular ...
加密解密 a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asym ...
书籍 Fundamental Limits on a Class of Secure
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity ...