资源列表
cda3722b147a5472fbf4fb7edeb274ad
- This paper focuses on an essential task of the enhanced NodeB e lement in LTE architecture, the Radio Resource Manager RRM, which aims to accept or reject requests for connection to the network based on some constraints and ensuring optimal distr
lee-graph
- matlab code for three stage of Lee Graph block probabilities
TMS320F2812_FLASH
- CCS平台烧写TMS320F2812的详细步骤-CCS platform programmer detailed steps TMS320F2812
Standard+C+Library
- 关于本书 这个可是我千辛万苦所作!!!版权所有!! 单击此处与我联系。 清华大学2000级 李训耕 收集整理,2001年5月。 CopyRight @ 521Corporation,Tsinghua University (2001).
acm算法模板
- 非常全的acm算法模板,适合打比赛使用,赶快下吧
manuscriptlun
- L. Dong and A. P. Petropulu, 揗ultichannel ALLIANCES: A Cross-layer Cooperative Scheme for Wireless Networks,擨EEE Trans. on Signal ProcessingJanuary 2008.-L. Dong and A. P. Petropulu, 揗ultichannel ALLIANCES: A Cross-layer Cooperative Scheme for Wire
TDCS
- 变换域通信系统(TDCS)的发展历程,分析了其 独特的抗干扰方式,并揭示了TDCS具有极强的抗干扰能力、较高频谱利用率和低截获概率、低检测概率(LPI/LPD)特性的特点。-Transform domain communication system (TDCS) development process, analysis of its The unique anti-jamming approach and reveals TDCS has a strong anti-jamming
RFB-Protocol--Chinese-Version
- 文档描述了对rfbproto协议进行了原创性的翻译,并将其命名为远程帧缓冲协议,文档描述了基于远程帧缓冲协议的显示协议、输入协议和像素数据的编码方式以及协议的消息和内容,对虚拟化和云计算客户端的开发非常有用。-This Document majorly translate the rfbproto English document into chinese.It concerns about display protocol, input protocol,encoding method and
RS-decoder-circuit-reconfigurability
- 介绍了基于线性反馈位移寄存器的编码原理及可重构改进方法。通过乘法和加法的迭代运算实现了伴随多项式的并行运算。采用改进欧几里德算法求解关键方程,运用钱氏搜索算法实现了错误位置的查找,并提出以上两种算法的可重构计算结构。-Introduced based on linear displacement of the code register feedback principle and reconfigurable improvement methods. Through the multiplic
TR_06-003.pdf
- It s a document relating to ns2 EDCA simulation.Here the basic EDCA protcol is described and also the application scenario of EDCA. An application example shows recent simulation results in an 802.11g/EDCA cell with rate adaptation and Ricean fading.
CloneDetection-ICDCS2008
- In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for eac
guandaopushe
- 钢管订购和运输优化模型 钢管订购和运输优化模型-Order and transport steel pipe order optimization model and optimization model of the transport pipe ordering and transportation optimization model
