亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊(cè)

np-Hard

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    標(biāo)簽: open-source encryption Features software

    上傳時(shí)間: 2013-12-20

    上傳用戶:123啊

  • 浙大acm課件

    浙大acm課件,主講np問題,很詳細(xì),適合新手

    標(biāo)簽: acm

    上傳時(shí)間: 2014-08-26

    上傳用戶:731140412

  • This article describes how to consume Web services in Java 1.5.0 using the new JAX-WS 2.0 API (JSR 2

    This article describes how to consume Web services in Java 1.5.0 using the new JAX-WS 2.0 API (JSR 228). Developers around the world, including me, have always complained about the hard ways to work in Java to consume even a Web service as simple as adding two numbers. However, with JAX-WS 2.0 API now available in core Java in JDK 1.5.0, life is simple like never before.

    標(biāo)簽: describes services article consume

    上傳時(shí)間: 2013-11-27

    上傳用戶:kelimu

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    標(biāo)簽: effectiveness analytically numerically cloaking

    上傳時(shí)間: 2017-03-30

    上傳用戶:zxc23456789

  • Although some FX1-based devices may use the FX1鈥檚 CPU to process USB data directly (Port I/O Mode),

    Although some FX1-based devices may use the FX1鈥檚 CPU to process USB data directly (Port I/O Mode), most applica- tions use the FX1 simply as a conduit between the USB and external data-processing logic (e.g., an ASIC or DSP, or the IDE controller on a hard disk drive).

    標(biāo)簽: Although directly devices process

    上傳時(shí)間: 2014-01-08

    上傳用戶:2467478207

  • Generate random bits, convert to bipolar, corrupt the message by passing through noise and decode us

    Generate random bits, convert to bipolar, corrupt the message by passing through noise and decode using hard decision decoding and calculate BER

    標(biāo)簽: Generate bipolar convert corrupt

    上傳時(shí)間: 2013-12-25

    上傳用戶:1966640071

  • 全書從算法設(shè)計(jì)和算法分析的基本概念和方法入手

    全書從算法設(shè)計(jì)和算法分析的基本概念和方法入手,系統(tǒng)介紹了算法設(shè)計(jì)方法與分析技巧。全書分為3個(gè)部分:第一部分介紹算法的基本概念、算法的數(shù)學(xué)基礎(chǔ)以及算法復(fù)雜度分析;第二部分針對(duì)排序問題和圖的問題,討論各種已有的算法,并介紹常用的算法設(shè)計(jì)方法包括分治法、貪心法、動(dòng)態(tài)規(guī)劃法、回溯法和分支限界法,并介紹了計(jì)算的復(fù)雜性以及NP完全問題;第三部分講述并行計(jì)算模型和并行算法設(shè)計(jì)技術(shù)。書中每章后面都附有一定數(shù)量的習(xí)題,幫助讀者理解和掌握書中的內(nèi)容。

    標(biāo)簽: 算法設(shè)計(jì) 算法分析 基本概念

    上傳時(shí)間: 2013-12-17

    上傳用戶:mikesering

  • 對(duì)參加ACM競(jìng)賽非常有用的幾個(gè)ACM答題模板(數(shù)論

    對(duì)參加ACM競(jìng)賽非常有用的幾個(gè)ACM答題模板(數(shù)論,數(shù)值計(jì)算,NP等等)

    標(biāo)簽: ACM 競(jìng)賽 模板

    上傳時(shí)間: 2013-12-01

    上傳用戶:ZJX5201314

  • These documents are all classic documents relating to the domain of virus writing.Give a good insigh

    These documents are all classic documents relating to the domain of virus writing.Give a good insight about the virus which are rare and are considered best for case studies..many variants are still being produced and all these are original.Its very hard to find them now adays..these are extremely helpfull for people working in Malware analysis and malicious code analysis

    標(biāo)簽: documents relating classic writing

    上傳時(shí)間: 2017-08-18

    上傳用戶:thuyenvinh

  • This book is for someone who wants to quickly master the basics of how to install, run, and maintai

    This book is for someone who wants to quickly master the basics of how to install, run, and maintain Linux on an Intel-based personal computer. All of the tools you need are included. Your computer should have a monitor, or display, keyboard, mouse, hard drive, floppy drive, and CD-ROM drive. Although you can jump right in and install Linux onto your hard drive, you should have some technical information about your computer and its hardware on hand before you start.

    標(biāo)簽: install someone quickly maintai

    上傳時(shí)間: 2017-08-19

    上傳用戶:zhuoying119

主站蜘蛛池模板: 高邑县| 葵青区| 静海县| 赤水市| 澄城县| 蒲城县| 加查县| 棋牌| 凤阳县| 嵩明县| 达日县| 宝坻区| 惠安县| 锡林浩特市| 济宁市| 嵊州市| 手机| 大渡口区| 侯马市| 榆社县| 兴山县| 濉溪县| 凭祥市| 广西| 海兴县| 赤城县| 张掖市| 雅安市| 霍城县| 安塞县| 株洲县| 海原县| 都兰县| 大石桥市| 盐津县| 淮安市| 永平县| 南陵县| 剑阁县| 望奎县| 泸西县|