• B 方法 The B-Book Assigning programs to meanings

    B 方法 The B-Book Assigning programs to meanings 中文版 译者 裘宗燕

    4
    79
    39.92MB
    2013-07-04
    0
  • B方法 The B-Book Assigning programs to meanings

    B方法 J-RAbrial著 裘宗燕译,这个不用在说了,png格式的,很清晰。

    0
    78
    1.11MB
    2013-07-04
    10
  • 《软件测试》(原书第2版)(原书名Software Testing A Craftsmaj's Approach(Second Edition)

    经典的软件测试书籍,《软件测试》(原书第2版)(原书名Software Testing A Craftsmaj's Approach(Second Edition)原出版社: CRC /作者: [美]Paul C.Jorgensen /译者:韩柯 杜旭涛/丛书名:软件工程技术丛书/机械工业出版社/7-111-12166-X /16开/页码:318 /出版日期:2003-7-1/版次:1-1

    5
    0
    6.36MB
    2013-05-14
    13
  • Security of Self-Organizing Networks MANET, WSN, WMN, VANET.pdf

    More and more computing devices are coming into existence every day, which may vary in size, capabilities, mode of interaction, and so on. As a result we are moving toward a world in which computing is omnipresent. Many modern devices (e.g., smart printers, PDAs, smart phones, and cameras) support multiple communication channels and almost all of them use wireless technology in some form, such as Bluetooth, Infrared, Wibree, Zigbee, 802.11, IrDA, or ultrasound. Having wireless technology in these devices does not guarantee that all of these devices can also take advantage of Internet technology. However, those wireless-enabled devices that cannot connect to Internet can still take advantage of other colocated devices in the vicinity by forming shortterm or long-term associations on ad hoc basis: for example, pairing a Bluetooth-enabled headset with a mobile phone or an MP3 player (short term) and pairing of a PDA with home devices in order to control them wirelessly (long term). Some other examples of pairing from everyday life include pairing of a Bluetooth keyboard with a Desktop computer, pairing of a laptop with an access point or a printer through the use of a WiFi or Bluetooth, and pairing of two mobile phones to exchange the music files or other data. Since wireless communication is susceptible to eavesdropping, thus one can easily launch man-in-the-middle (MiTM), denial-of-service (DoS), or bidding-down attacks to break the secure pairing process. Therefore, the main goal of secure pairing research is to provide assurance of the identity of the devices participating in the pairing process and to secure them from being victims of eavesdropping attacks, such as MiTM attack. Achieving this goal is a challenging problem from both the security and the usability or user interaction points of view

    5
    148
    7.24MB
    2013-02-25
    12
  • 算法设计与分析答案

    解:考查这六条直线i = 1; i = n; j = 1; j = n; i = ⌊(1 + n)=2⌋; j = ⌊(1 + n)=2⌋. 上 的点的值,并找出最小值对应的点。如果这个最小点的邻点的值比这个点的值大,那

    0
    55
    608KB
    2012-11-01
    10
  • 用FPGA实现 VGA

    完成基于FPGA或CPLD的VGA显示控制器硬件电路图的设计及PCB板图设计制作,完成VGA控制器的软件开发,使其能实现分辨率为640×480,256色的显示功能。

    4
    49
    268KB
    2012-07-27
    3
  • 可满足性问题DPLL算法研究

    本论文的贡献在于总结和分析了那些推动SA=r问题发展的最主要的启发式 算法和技术,并在此基础上提出了两点创新。其一,提出了一种新的正f剐燕理技 术:对称扩展的一元子旬推导。与传统的一元子句推导技术相比,本文的方法通 过在一元子句推导过程中添加对称的蕴涵关系从而能够推导出更多的一元子句。 基于这项技术本文实现了一个可满足性问题预处理器Snowball。实验结果验证了 这项新的正向推理技术的有效性,并表明该预处理器Snowball能够有效地化简 SAT问题的规模并减少解决SAT问题的时间,特别是对不满足问题有不少例子可 直接得到结果。其二,本文首次提出了一种采用双变量决策策略的可满足性问题 DPLL算法以及其完整的实现方式描述。采用双变量决策策略能在理论上减少决 策级数,进而能有效地减少SAT问题的搜索空间,加速SAT问题的求解。该双变 量决策SAT算法的实现是以Minisat解决器为蓝本的。在其较完善的DPLL算法框 架内本文对其中的各个主要的功能模块均进行了改造,使得改造后的SAT解决器 首次具有了双变量决策功能,并与其中主要的软件模块:变量决策模块,蕴含推 理模块,冲突分析和回溯模块相互配合,协调一致。实验结果验证了算法的正确 性。

    5
    1791
    1.88MB
    2011-12-25
    0
  • 汉字识别 简单 程序

    汉字识别简单程序 汉字识别简单程序汉字识别简单程序汉字识别简单程序汉字识别简单程序汉字识别简单程序

    4
    55
    81KB
    2011-06-11
    0
  • 图像细化算法 4种 详细

    图像细化 图像细化 图像细化 图像细化 图像细化 图像细化 图像细化 图像细化 图像细化 图像细化 图像细化 图像细化 图像细化

    5
    52
    3KB
    2011-06-11
    3
  • j2ee jsp 实现用户登录

    j2ee jsp 实现用户登录j2ee jsp 实现用户登录j2ee jsp 实现用户登录j2ee jsp 实现用户登录j2ee jsp 实现用户登录

    5
    40
    72KB
    2011-05-30
    3
  • 分享宗师

    成功上传21个资源即可获取
关注 私信
上传资源赚积分or赚钱