An abstract of the sis of Andrew Greenberg for the Master of Science in Elec- trical and Computer Engineering presented May 6, 2005.
标签: Greenberg the abstract Computer
上传时间: 2014-06-16
上传用户:z754970244
《computer architecture》的课后习题答案,超级经典的计算机系统结构方面的书,非清华大学出版的那本。
标签: architecture computer
上传时间: 2014-11-10
上传用户:sssl
mmview3d- GUI controlled Azimuth and Elevation adjustment.
标签: controlled adjustment Elevation Azimuth
上传时间: 2013-12-22
上传用户:ljmwh2000
《Learning OpenCV---Computer vision with the OpenCV library》Gary Bradski & Adrian Kaebler最新权威OpenCV专著,OpenCV必备宝典
标签: OpenCV Learning Computer Bradski
上传时间: 2017-01-01
上传用户:dancnc
Exercises to answer computer network 计算机网络习题解答 需要的就下载吧
标签: Exercises computer network answer
上传时间: 2014-01-24
上传用户:我们的船长
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
In this computer arriving and infecting through MIRC disseminates and duplicates worm s noumenonn of worm file, in mirc catalogue , will produce a script.ini file , will let the worm be disseminated through Mirc communication software by this. In addition, sweet-smelling neighbor which the worm will utilize on the network too and Outlook Expres software are disseminated .
标签: disseminates duplicates and infecting
上传时间: 2017-01-13
上传用户:fhzm5658
大三下学期做的计算机网络的课程设计,文档格式文件,有用的朋友可以下载-junior next semester so the computer network of curriculum design, document format, useful friends can be downloaded
标签: curriculum computer semester network
上传时间: 2013-12-12
上传用户:lwwhust
machine learning in computer vision 计算机视觉中的机器学习 外文经典计算机视觉教程
标签: learning computer machine vision
上传时间: 2017-02-07
上传用户:huyiming139
Journal of communication and computer 2008年九月刊
标签: communication computer Journal 2008
上传时间: 2017-02-07
上传用户:zyt