虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

On-the-Go

  • It’s your first day in the lab.Undoubtedly you are experiencing a range of emotions: excitement, cu

    It’s your first day in the lab.Undoubtedly you are experiencing a range of emotions: excitement, curiosity, anxiety. You will be working in this lab and with a group of people, as well as with your supervisor, for several years to come. This is the first day of a long commitment and, for some, a hard road ahead. Which is why it’s important to get off on the right foot.

    标签: experiencing Undoubtedly excitement emotions

    上传时间: 2017-09-14

    上传用户:zhangyi99104144

  • Before you even get started on your PhD research, you have already made a decision that will have a

    Before you even get started on your PhD research, you have already made a decision that will have a major impact on the success of your project, and perhaps even on your future career. You have chosen to work in a particular research group, under the guidance of a particular thesis advisor or supervisor.

    标签: have you decision research

    上传时间: 2013-11-28

    上传用户:asdfasdfd

  • As a general rule, PhD students and their supervisors tend to focus primarily, or even exclusively,

    As a general rule, PhD students and their supervisors tend to focus primarily, or even exclusively, on the content of the research that will go into the doctoral thesis. Other issues are often taken for granted: how to organize your work, give a presentation, work in a team, cope with your supervisor, and how to effectively manage your time.When asked, former PhD students usually claim that the general experience of being a graduate student, which includes learning how to solve complex problems and work well with others, was of greater value to their careers than the actual topic of their thesis.

    标签: exclusively supervisors primarily students

    上传时间: 2013-12-16

    上传用户:qlpqlq

  • Verilog, c and asm source codes of the Minimig system, a fpga implementation of the Amiga computer.

    Verilog, c and asm source codes of the Minimig system, a fpga implementation of the Amiga computer. Version minimig-j used on the Minimig fpga board.

    标签: implementation the computer Verilog

    上传时间: 2017-09-24

    上传用户:xauthu

  • What you always wanted to know about networking but were afraid to ask! * How the Internet work

    What you always wanted to know about networking but were afraid to ask! * How the Internet works * How e-mail, e-learning, and telephony work on the Internet * What makes a network safe * How traffic gets from here to there * Disaster recovery and other ways to keep a network running * How businesses share data * See the world of Cisco networking with this illustrated guide s visual approach to learning * Useful for both novices and networking professionals * Covers a broad variety of internetworking topics-from e-mail to VPNs At last-an illustrated guide to the world of Cisco networking. Cisco Networking Simplified breaks down the complicated world of internetworking into easy-to-understand parts. Learn quickly and easily the fundamentals of a variety of topics, such as security, IP telephony, and quality of service, from the full-color diagrams and clear explanations found in Cisco Networking Simplified.

    标签: networking Internet always afraid

    上传时间: 2013-12-14

    上传用户:520

  • A large body of computer-aided techniques has been developed in recent years to assist in the proce

    A large body of computer-aided techniques has been developed in recent years to assist in the process of modeling, analyzing, and designing communication systems . These computer-aided techniques fall into two categories: formula-based approaches, where the computer is used to evaluate complex formulas, and simulation-based approaches, where the computer is used to simulate the waveforms or signals that flow through the system. The second approach, which involves “waveform”-level simulation (and often incorporates analytical techniques), is the subject of this book. Since performance evaluation and trade off studies are the central issues in the analysis and design of communication systems, we will focus on the use of simulation for evaluating the performance of analog and digital communication systems with the emphasis on digitalcommunication systems.

    标签: computer-aided techniques developed assist

    上传时间: 2014-01-01

    上传用户:541657925

  • C programming is a craft that takes years to perfect. A reasonably sharp person can learn the basics

    C programming is a craft that takes years to perfect. A reasonably sharp person can learn the basics of C quite quickly. But it takes much longer to master the nuances of the language and to write enough programs, and enough different programs, to become an expert. In natural language terms, this is the difference between being able to order a cup of coffee in Paris, and (on the Metro) being able to tell anative Parisienne where to get off. This book is an advanced text on the ANSI C programming language. It is intended for people who are already writing C programs, and who want to quickly pick up some of the insights and techniques of experts.

    标签: programming reasonably perfect basics

    上传时间: 2013-12-20

    上传用户:ls530720646

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • 6LoWPAN+The+Wireless+Embedded+Internet

    The Internet of Things is considered to be the next big opportunity, and challenge, for the Internet engineering community, users of technology, companies and society as a whole. It involves connecting embedded devices such as sensors, home appliances, weather stations and even toys to Internet Protocol (IP) based networks. The number of IP-enabled embedded devices is increasing rapidly, and although hard to estimate, will surely outnumber the number of personal computers (PCs) and servers in the future. With the advances made over the past decade in microcontroller,low-power radio, battery and microelectronic technology, the trend in the industry is for smart embedded devices (called smart objects) to become IP-enabled, and an integral part of the latest services on the Internet. These services are no longer cyber, just including data created by humans, but are to become very connected to the physical world around us by including sensor data, the monitoring and control of machines, and other kinds of physical context. We call this latest frontier of the Internet, consisting of wireless low-power embedded devices, the Wireless Embedded Internet. Applications that this new frontier of the Internet enable are critical to the sustainability, efficiency and safety of society and include home and building automation, healthcare, energy efficiency, smart grids and environmental monitoring to name just a few.

    标签: Embedded Internet Wireless 6LoWPAN The

    上传时间: 2020-05-26

    上传用户:shancjb

  • Stochastic Geometry and Wireless Networks Volume I

    Part I provides a compact survey on classical stochastic geometry models. The basic models defined in this part will be used and extended throughout the whole monograph, and in particular to SINR based models. Note however that these classical stochastic models can be used in a variety of contexts which go far beyond the modeling of wireless networks. Chapter 1 reviews the definition and basic properties of Poisson point processes in Euclidean space. We review key operations on Poisson point processes (thinning, superposition, displacement) as well as key formulas like Campbell’s formula. Chapter 2 is focused on properties of the spatial shot-noise process: its continuity properties, its Laplace transform, its moments etc. Both additive and max shot-noise processes are studied. Chapter 3 bears on coverage processes, and in particular on the Boolean model. Its basic coverage characteristics are reviewed. We also give a brief account of its percolation properties. Chapter 4 studies random tessellations; the main focus is on Poisson–Voronoi tessellations and cells. We also discuss various random objects associated with bivariate point processes such as the set of points of the first point process that fall in a Voronoi cell w.r.t. the second point process.

    标签: Stochastic Geometry Networks Wireless Volume and

    上传时间: 2020-06-01

    上传用户:shancjb