Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - network
Search - network - List
Computer Networks 4th Edition Problem Solutions.pdf计算机网络第四版的习题解答。是原版,但是有些章节的有几个问题的解答存在错误。本身书上的问题也有错误。-Computer Networks 4th Edition of Computer Network Problem Solutions.pdf fourth edition of the questions to answer. Yes original, but some sections of a number of problems exist in the wrong answer. The book itself is the wrong question.
Update : 2024-05-20 Size : 259072 Publisher : 王斐

Computer_Networks_4th_Edition《计算机网络》第四版 英文版  作者:Andrew S. Tanenbaum-Computer_Networks_4th_Edition "Computer Network" fourth English Author : Andrew S. Tanenbaum
Update : 2024-05-20 Size : 8965120 Publisher : 王斐

tinyos最新版,TinyOs是伯克利大学为无线传感器网络节点开发的嵌入式操作系统-tinyos latest version of Berkeley University TinyOs for wireless sensor network nodes development of the embedded operating system
Update : 2024-05-20 Size : 25132032 Publisher : 陈波

神经网络理论与Matlab7电子工业出版社原代码-neural network theory and Matlab7 Electronic Industry Publishing House source
Update : 2024-05-20 Size : 23552 Publisher : 宏观

四个网络协议在linux下的模拟实现,比如滑动窗口协议,可用来研究协议的性能-four network protocol in the linux Simulation, such as sliding window protocols, could be used to study the performance agreement
Update : 2024-05-20 Size : 21504 Publisher : 刘智莹

DL : 0
《面向matlab工具箱的神经网络理论与应用》配套源程序,非常的不错-"Matlab Toolbox for the neural network theory and application of" complementary source, very good
Update : 2024-05-20 Size : 100352 Publisher : 朱顺兴

DL : 0
vb开发的神经网络,神经网络源代码,bp神经网络-vb development of the neural networks, neural network source code, bp neural network
Update : 2024-05-20 Size : 1007616 Publisher :

一个简单的socket编程,能够实现局域网络的机器互相对话,帮忙顶一下-a simple socket programming, local area network to achieve the machines to talk to each other, help top what
Update : 2024-05-20 Size : 4096 Publisher : 蔡志坤

DL : 0
一个VXWORKS的网络驱动原代码,具有一定的参考价值,对初学者很有用-a network driver source code, with some reference value, useful for beginners
Update : 2024-05-20 Size : 23552 Publisher : 廖月旺

用VB编写的网络连接监视器,包括全部源代码.-VB prepared by the network monitors, including all source code.
Update : 2024-05-20 Size : 16384 Publisher : tao

Python实现的半同步半异步网络框架.在其上可以实现自己的应用层协议,以支持特定的应用.-Python achieve a semi-synchronous-asynchronous network framework. In its own can achieve the application layer protocol to support specific applications.
Update : 2024-05-20 Size : 2048 Publisher : 张铭

DL : 0
应用PSO训练神经网络Visual C++ 训练结果优于BP,该方法用于模式识别、知识挖掘等-PSO application for training the neural network training Visual C BP superior results, the method for pattern recognition, knowledge mining, etc.
Update : 2024-05-20 Size : 71680 Publisher : 林献坤

人工神经网络bp 算法是用于数学建模Alife.c 基于遗传算法的人工生命模拟源程序, 输入数据文件world GA_nn.c 基于遗传算法优化神经网络结构源程序,输入数据文件sample Patmat.c 基于遗传算法提取基元图形源序 -bp artificial neural network algorithm is used mathematical modeling based on genetic algorithms Alife.c artificial life simulation source code, the input data file GA_nn.c world based on genetic algorithm optimization neural network structure source, the input data file sample Patmat.c based on genetic algorithms yuan-based graphics from the source sequence
Update : 2024-05-20 Size : 467968 Publisher : 乐乐

这是一个基于java,snmp的网络安全日志审计系统,提供方便的用户交互界面,以及实用的日志分析功能-This is a java-based, snmp network security audit log system to provide easy user interface, as well as the practical function of the log analysis
Update : 2024-05-20 Size : 1311744 Publisher : 高岩宇

DL : 0
Description: C4.5Rule-PANE is a rule learning method which could generate accurate and comprehensible symbolic rules, through regarding a neural network ensemble as a pre-process of a rule inducer. Reference: Z.-H. Zhou and Y. Jiang. Medical diagnosis with C4.5 rule preceded by artificial neural network ensemble. IEEE Transactions on Information Technology in Biomedicine, 2003, vol.7, no.1, pp.37-42. 使用神经网络集成方法诊断糖尿病,肝炎,乳腺癌症的案例研究. -Description: C4.5Rule-PANE is a rule learning method which could generate accurate and comprehensible symbolic rules, through regarding a neural network ensemble as a pre-process of a rule inducer. Reference: Z.-H. Zhou and Y. Jiang. Medical diagnosis with C4.5 rule preceded by artificial neural network ensemble. IEEE Transactions on Information Technology in Biomedicine, 2003, vol.7, no.1, pp.37-42.
Update : 2024-05-20 Size : 8192 Publisher : 修宇

A C++ framework for creating Linux and Windows communications applications that contain Dialogic/Intel NetStructure products. Includes media and network classes (analog, digital, SIP, H323), multithreaded event handling, distributed app support.
Update : 2024-05-20 Size : 6241280 Publisher : 何勇

ACE程序员指南,ACE(自适应的网络编程环境),用C++类来封装Unix的Socket库,进程库,线程库-ACE Programmer's Guide, ACE (Adaptive Network Programming Environment), C categories Packaging Unix socket library for the process, Thread Library
Update : 2024-05-20 Size : 877568 Publisher : 吴江

Otherrbf
DL : 0
RBF网络训练程序C++源代码,可以完成网络训练和网络测试功能。-RBF the network training procedure C source code, may complete the network training and the network test function.
Update : 2024-05-20 Size : 215040 Publisher : 王肖

matlabnnc1
DL : 0
固高公司的三自由度直升飞机的神经网络控制的自校正控制方法2-solid high degree of freedom of three helicopters of the neural network to control self-tuning control method 2
Update : 2024-05-20 Size : 2048 Publisher : 赵笑

该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技 术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测, 去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同 时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安 全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project through the network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Update : 2024-05-20 Size : 1773568 Publisher : 大大
« 1 2 ... 14 15 16 17 18 1920 21 22 23 24 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.