SharpPrivacy has been developed to be an Open Source implementation of the OpenPGP standard. OpenPGP is a standard for encrypting, decrypting, signing and verifying data cryptographically. The OpenPGP protocoll is commonly used and is said to be very secure.
标签: OpenPGP implementation SharpPrivacy developed
上传时间: 2017-01-13
上传用户:dreamboy36
Details of the personnel system resources it is willing to share with you a
标签: personnel resources Details willing
上传时间: 2017-01-16
上传用户:com1com2
A Markov Chain Monte Carlo version of the genetic algorithm Differential Evolution: easy Bayesian computing for real parameter spaces
标签: Differential Evolution algorithm Bayesian
上传时间: 2014-01-20
上传用户:hphh
Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. Within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested.
标签: Complete Referenc listings Eclipse
上传时间: 2017-01-20
上传用户:as275944189
This set of files show some of the principles of Monte Carlo simulations, applied in the financila industry. this si the content of the web seminar called "Simulations de Monte Carlo en MATLAB".
标签: simulations principles financila the
上传时间: 2013-12-18
上传用户:xiaoyunyun
Windows CE source code for chapter 16 in the windoes CE programming book. This contains all of the source code for chapter 18.
标签: programming the contains Windows
上传时间: 2014-08-10
上传用户:bcjtao
Windows CE source code for chapter 19 in the windoes CE programming book. This contains all of the source code for chapter 19.
标签: programming the contains Windows
上传时间: 2013-12-05
上传用户:jhksyghr
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison Wesley Longman Inc., was aware of a trademark claim, the designations have been printed in initial caps or all caps. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers discounts on this book when ordered in quantity for special sales. For more information, please contact:
标签: manufacturers designations distinguish products
上传时间: 2017-01-23
上传用户:woshiayin
qt programming for linux private part of the book
标签: programming private linux book
上传时间: 2017-01-25
上传用户:xc216
The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some nodes of a complete binary tree of height h (the code tree) to n simultaneous connections, such that no two assigned nodes (codes) are on the same root-to-leaf path. Each connection requires a code on a specified level. The code can change over time as long as it is still on the same level. We consider the one-step code assignment problem: Given an assignment, move the minimum number of codes to serve a new request. Minn and Siu proposed the so-called DCAalgorithm to solve the problem optimally. We show that DCA does not always return an optimal solution, and that the problem is NP-hard. We give an exact nO(h)-time algorithm, and a polynomial time greedy algorithm that achieves approximation ratio Θ(h). Finally, we consider the online code assignment problem for which we derive several results
标签: combinatorial assignment problem arises
上传时间: 2014-01-19
上传用户:BIBI