资源列表
library
- VC++图书管理系统需求分析 要求和实现-VC++ library management system requirements analysis requirements and to achieve ...
ITProjectManagement
- 基于microsoft Project2000的IT项目管理课件附有简单案例-Microsoft Project2000-based courseware for IT project management with a simple case of
828170
- source code javaapplicationsplatform
2
- People have difficulty remembering multiple passwords. This results in reduced security as users reuse the same password for different systems or reveal other passwords as they try to log in. It can also lead to reduced privacy, as users may
3
- Discretization is used in click-based graphical passwords so that approximately correct entries can be accepted by the system. We show that the existing discretization scheme of Birget et al. (2006) allows for false accepts and false rejects beca
4
- Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simp
5
- Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malw
allinone
- fir filter design using mathlab
6
- The use of computers in public places i ncreasingly common in everyday life. In using one of these computers, a user is trusting it to correctly carry out her orders. For many transactions, particularly banking operations, blind trust in a publ
softwareengineering
- 详细讲解西从需求分析到软件设计的整个过程,对于学习软件开发项目管理学习者十分有用!-These files detailly illustrate the whole progress from analysis to design,this is necessary for beginner who want to learn software engineering!
KALMAN_2
- source code for MLE estimation .m file
RLS_444
- bilinear series estimation algoritm using RLS method
