资源列表
Low-Rate-Coded-Interleave-Division-Multiple
- Low Rate Coded Interleave Division Multiple
Simple-Iterative-Chip-by-Chip-Multiuser-Detection
- Simple Iterative Chip-by-Chip Multiuser Detection
Mitigating-Multiple-Access-Interference
- Mitigating Multiple Access Interference using IDMA
Performance-Analysis-of-Interleave-Division
- Performance Analysis of Interleave-Division
yyy--
- 易语言控件发送信息常用的参数值及用法1
CompositePattern
- 设计模式中的组合设计模式,安全方式,使用VS2005-CompositePattern,using VS2005
HTTP-TUNNEL-DETECTING-TECHNIQUE
- 研究了恶意软件常采用的通信方式———隧道技术,并提出了一种基于C4.5的HTTP 隧道检测算法。该算法采用决策支持树算法 C4.5提取网络流特征字段,根据特征字段生成训练数据建立HTTP隧道分类的决策树检测模型,采用该分类模型检测HTTP隧道流,为检测恶意软件提供依据。-Malicious software often used means of communication--- tunneling technology, and a HTTP based on C4.5 Tunne
UserGuide
- 负载均衡软件 keepalived 使用说明。-a soft keepalived user guid of load cluster.
vasvdbv
- 七彩灯程序 包含仿真图、代码、和视频录像-Colorful lights program contains a simulation diagram, code, and video
messagequeus
- Messagee queues documents
EAUCD-in-WSN
- Energy Aware Uniform Clusterhead Distribution Protocol used in wsn
serialprt
- Serial port communication documents
