虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

wide-band

  • 在网络安全中经常会遇到rootkit

    在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    标签: rootkit 网络安全

    上传时间: 2017-04-04

    上传用户:xaijhqx

  • contains documents related to adaptive beamforming algorithms for Wideband Code Division multiple

    contains documents related to adaptive beamforming algorithms for Wideband Code Division multiple access and a research article on circular patch antenna for C band altimeter system

    标签: beamforming algorithms documents contains

    上传时间: 2014-09-04

    上传用户:youlongjian0

  • A Convex Hull is the smallest convex polygon that contains every point of the set S. A polygon P is

    A Convex Hull is the smallest convex polygon that contains every point of the set S. A polygon P is convex if and only if, for any two points A and B inside the polygon, the line segment AB is inside P. One way to visualize a convex hull is to put a "rubber band" around all the points, and let it wrap as tight as it can. The resultant polygon is a convex hull.

    标签: polygon S. the contains

    上传时间: 2013-12-23

    上传用户:it男一枚

  • Auctions are among the oldest economic institutions in place. They have been used since antiquity to

    Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular bidder may depend on information available only to others-and asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information held by different bidders to be shared.

    标签: institutions antiquity Auctions economic

    上传时间: 2014-07-14

    上传用户:Breathe0125

  • SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producin

    SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producing a signal whose spectrum is more wider than of the data signal, the occupied frequency band being independent by the signal of data band. -The signals with spread spectrum of direct sequence type BPSK (BPSK-DS-SS) -The signals with spread spectrum of direct sequence type QPSK – DS–SS - Frequency hopping spread spectrum signals (FH-SS)

    标签: MODULATION TECHNIQUES modulation SPECTRUM

    上传时间: 2017-06-05

    上传用户:lht618

  • Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interes

    Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Development. This authoritative, practical guide will help you better understand the Linux kernel through updated coverage of all the major subsystems, new features associated with Linux 2.6 kernel and insider information on not-yet-released developments. You ll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development

    标签: Linux Development interes Novell

    上传时间: 2017-06-06

    上传用户:songyue1991

  • Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each rec

    Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each recipe also includes explanations of how and why the approach works, so you can adapt the techniques to similar situations. One of the biggest challenges facing developers today is sorting through the wide variety of tools available form various source and figuring out how to them effectively. The recipes in Java Extreme Programming Cookbook showcase how to use the most important features of these XP tools. Many of these tools are geared towards unit testing, while others are invaluable for continuous integration with these practical examples, you ll be able to choose the most effective tools to accomplish your goals, then implement them in a cohesive development environment quickly.

    标签: cut-and-paste Programming collection Cookbook

    上传时间: 2017-06-29

    上传用户:cmc_68289287

  • Frequency domain characterization of los nonfading indoor wireless LAN channel employing frequency a

    Frequency domain characterization of los nonfading indoor wireless LAN channel employing frequency and polarization diversity in the 63.4 to 65.4GHz band

    标签: characterization Frequency employing frequency

    上传时间: 2013-12-22

    上传用户:zhaoq123

  • Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A

    Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes, gaming consoles and automotive navigation/entertainment systems. The Cortex-A8 processor spans a range of performance points depending on the implementation, delivering over to 2000 Dhrystone MIPS (DMIPS) of performance for demanding consumer applications and consuming less than 300mW for low-power mobile devices. This translates into a large increase in processing capability while staying with the power levels of previous generations of mobile devices. Consumer applications will benefit from the reduced heat dissipation and resulting lower packaging and integration costs.

    标签: microprocessor Introduction applications Cortex

    上传时间: 2013-12-09

    上传用户:xzt

  • Architecture and Implementation ? ? Cortex -A8 of the ARM Microprocessor October 2005

    Architecture and Implementation ? ? Cortex -A8 of the ARM Microprocessor October 2005 Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in ARM!ˉs new Cortex family. With high performance and power efficiency, it targets a wide variety of mobile and consumer applications including mobile phones, set-top boxes,

    标签: Implementation Microprocessor Architecture October

    上传时间: 2013-12-15

    上传用户:daoxiang126