CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 源码下载 系统编程 弱点检测代码

资源列表

« 1 2 ... .61 .62 .63 .64 .65 166.67 .68 .69 .70 .71 ... 181 »
  1. 2

    0下载:
  2. Recent advances in the relevant technologies of contemporary wireless sensor nodes has motivated a growth in the deployment of wireless sensor networks (WSN) for commercial, non-commercial and research applications. In the aforementioned appl
  3. 所属分类:Exploit

    • 发布日期:2017-12-12
    • 文件大小:886.95kb
    • 提供者:abc
  1. 3

    0下载:
  2. A new kind of wireless multi-hop network architecture called Wireless Mesh Network (WMN) has recently attracted much attention. In this paper, we propose congestion aware multipath routing protocol called EAOMDV-LB for multiradio multiple inter
  3. 所属分类:Exploit

    • 发布日期:2017-12-12
    • 文件大小:307.98kb
    • 提供者:abc
  1. 4

    0下载:
  2. Although wireless sensor network applications are still at early stages of development in the industry, it is obvious that it will pervasively come true and billions of embedded microcomputers will become online for the purpose of remote sens
  3. 所属分类:Exploit

    • 发布日期:2017-12-11
    • 文件大小:500.64kb
    • 提供者:abc
  1. 5

    0下载:
  2. Possibilities and way to design and implement a ZigBee-based data transmission and monitoring wireless smart sensor network integrated with the Internet are considered and described in the paper.
  3. 所属分类:Exploit

    • 发布日期:2017-12-15
    • 文件大小:300kb
    • 提供者:abc
  1. AKS

    0下载:
  2. Implement AKS algorithm for primality testing, which was the first polynomial time primality test that was devised. Read the paper attached and implement the main algorithm. Implement for numbers of size max 64 bits. Bonus marks will be given,
  3. 所属分类:Exploit

    • 发布日期:2017-12-12
    • 文件大小:1.01kb
    • 提供者:jitender grover
  1. Lena

    0下载:
  2. khf khfuh uhjfshsif ukhfiudshiu uhfuihd khdushfhu kfhdush
  3. 所属分类:Exploit

    • 发布日期:2017-12-10
    • 文件大小:834.72kb
    • 提供者:jawad
  1. process

    0下载:
  2. 进程调度的实现包括进程的生命周期,优先级,id号的自动更改与实现,还有内存分配与进程调度的实现在此-Process scheduling implementation, including the process of life cycle, priority, ID number of automatic changes and implementation, as well as memory allocation and process scheduling in this realiza
  3. 所属分类:Exploit

    • 发布日期:2017-12-11
    • 文件大小:56.9kb
    • 提供者:jackjack001
  1. VBI_Vulnerabilities_Portfolio.pdf

    0下载:
  2. vulnerability prices for compare
  3. 所属分类:弱点检测代码

    • 发布日期:2018-05-01
    • 文件大小:432kb
    • 提供者:thekraken
  1. nwlpun

    0下载:
  2. 非常需要的可以下载看看,适合初学者学习,好的算法和程序(Very good algorithm and program, suitable for beginners to learn, need to download to see.)
  3. 所属分类:ICQ弱点检测代码

    • 发布日期:2018-05-03
    • 文件大小:3kb
    • 提供者:J4G440
  1. dhtdbjz

    0下载:
  2. 非常需要的可以下载看看,适合初学者学习,好的算法和程序(Very good algorithm and program, suitable for beginners to learn, need to download to see.)
  3. 所属分类:弱点检测代码

    • 发布日期:2018-05-03
    • 文件大小:2kb
    • 提供者:03fZo2
  1. qdnyxxqa

    0下载:
  2. 调用百度AI开放平台动物识别API和百度百科API进行动物识别(Call Baidu AI open platform to identify API and Baidu Encyclopedia API for animal identification.)
  3. 所属分类:ICQ弱点检测代码

    • 发布日期:2018-05-03
    • 文件大小:3kb
    • 提供者:fn7o6g
  1. vprxeo

    0下载:
  2. 好的算法和程序,非常需要的可以下载看看,适合初学者学习(Good algorithm and program, very need to download to see, suitable for beginners to learn.)
  3. 所属分类:ICQ弱点检测代码

    • 发布日期:2018-05-03
    • 文件大小:2kb
    • 提供者:l4b1Sx
« 1 2 ... .61 .62 .63 .64 .65 166.67 .68 .69 .70 .71 ... 181 »
搜珍网 www.dssz.com