亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Breadth-first

  • Why C++ is the emerging standard in software development. The steps to develop a C++ program. How

    Why C++ is the emerging standard in software development. The steps to develop a C++ program. How to enter, compile, and link your first working C++ program.

    標簽: development emerging standard software

    上傳時間: 2013-12-26

    上傳用戶:guanliya

  • Topics Practices: Programming and Numerical Methods Practice 1: Introduction to C Practice 2

    Topics Practices: Programming and Numerical Methods Practice 1: Introduction to C Practice 2: Cycles and functions First part cycles Part Two: Roles Practice 3 - Floating point arithmetic Practice 4 - Search for roots of functions Practice 5 - Numerical Integration Practice 6 - Arrangements and matrices Part One: Arrangements Part II: Matrices Practice 7 - Systems of linear equations Practice 8 - Interpolation Practice 9 - Algorithm Design Techniques

    標簽: Practice Introduction Programming Practices

    上傳時間: 2013-12-16

    上傳用戶:R50974

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    標簽: cryptographic applications attractive for

    上傳時間: 2013-12-07

    上傳用戶:zhuimenghuadie

  • This short paper will give you some VHDL code examples that will help you design synchronous circuit

    This short paper will give you some VHDL code examples that will help you design synchronous circuits that work first time.The philosophy behind Ten-Commandment code is that synthesizers are not to be trusted too much. Most of the code you will see is close to the structural level some more overtly than others.

    標簽: will synchronous you examples

    上傳時間: 2014-12-01

    上傳用戶:sjyy1001

  • Implementation of Edmonds Karp algorithm that calculates maxFlow of graph. Input: For each test c

    Implementation of Edmonds Karp algorithm that calculates maxFlow of graph. Input: For each test case, the first line contains the number of vertices (n) and the number of arcs (m). Then, there exist m lines, one for each arc (source vertex, ending vertex and arc weight, separated by a space). The nodes are numbered from 1 to n. The node 1 and node n should be in different sets. There are no more than 30 arcs and 15 nodes. The arc weights vary between 1 and 1 000 000. Output: The output is a single line for each case, with the corresponding minimum size cut. Example: Input: 7 11 1 2 3 1 4 3 2 3 4 3 1 3 3 4 1 3 5 2 4 6 6 4 5 2 5 2 1 5 7 1 6 7 9 Output: 5

    標簽: Implementation calculates algorithm Edmonds

    上傳時間: 2014-01-04

    上傳用戶:kiklkook

  • RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit

    RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key

    標簽: crypthograph information Adleman Rivest

    上傳時間: 2017-09-01

    上傳用戶:chfanjiang

  • The target of the assignment is to familiarize the student with MIMO channel modeling. The work is

    The target of the assignment is to familiarize the student with MIMO channel modeling. The work is based on L. Schumacher’s MIMO channel model implementation, with added capacity analysis. First the channel model implementation is introduced, and thereafter analysis on MIMO channel with different parameters is done. Finally a short report on the results is written.

    標簽: familiarize assignment The the

    上傳時間: 2014-01-01

    上傳用戶:jjj0202

  • The Java Platform, Enterprise Edition 5 (Java EE 5) has two different but complementary technologie

    The Java Platform, Enterprise Edition 5 (Java EE 5) has two different but complementary technologies for producing dynamic web content in the presentation tier—namely Java Servlet and JavaServer Pages (JSP). Java Servlet, the first of these technologies to appear, was initially described as extensions to a web server for producing dynamic web content. JSP, on the other hand, is a newer technology but is equally capable of generating the same dynamic content. However, the way in which a servlet and a JSP page produce their content is fundamentally different servlets embed content into logic, whereas JSP pages embed logic into content.

    標簽: Java complementary technologie Enterprise

    上傳時間: 2017-09-04

    上傳用戶:李彥東

  • I originally wrote this program as an exercise for learning JAVE. Gomoku game is well-known in many

    I originally wrote this program as an exercise for learning JAVE. Gomoku game is well-known in many countries and every country calls it differently. The winner is the first player to get an unbroken row of five stones horizontally, vertically, or diagonally.

    標簽: originally well-known exercise learning

    上傳時間: 2017-09-09

    上傳用戶:csgcd001

  • 本書是英文版

    本書是英文版,但內容非常不錯,本書目錄如下: Table of Contents SIP—Understanding the Session Initiation Protocol, Second Edition Foreword to the First Edition Preface to - the Second Edition Preface to - the First Edition Chapter 1 - SIP and the Internet Chapter 2 - Introduction to SIP Chapter 3 - SIP Clients and Servers Chapter 4 - SIP Request Messages Chapter 5 - SIP Response Messages Chapter 6 - SIP Header Fields Chapter 7 - Related Protocols Chapter 8 - Comparison to H.323 Chapter 9 - Wireless and 3GPP Chapter 10 - Call Flow Examples Chapter 11 - Future Directions Appendix A - Changes in the SIP Specification from RFC 2543 to RFC 3261

    標簽: 英文

    上傳時間: 2014-01-06

    上傳用戶:爺?shù)臍赓|

主站蜘蛛池模板: 泰州市| 上高县| 广宗县| 鲁甸县| 双辽市| 绥滨县| 霞浦县| 长沙县| 河北省| 沅江市| 遵义县| 繁峙县| 大城县| 龙江县| 铅山县| 陕西省| 红河县| 会同县| 晋宁县| 厦门市| 龙山县| 凤翔县| 渑池县| 阿图什市| 南漳县| 壶关县| 邢台县| 河曲县| 兴仁县| 界首市| 横山县| 陵川县| 长泰县| 锡林郭勒盟| 越西县| 雷山县| 全州县| 洛阳市| 南阳市| 舞阳县| 胶州市|