资源列表
E2_1_TS_Siso
- fuzzy model single input single output
E4_8_BoxJenkins
- fuzzy model for box jenkin
E3_3_HFCM_PH
- fuzzy model for PH control system
thesis-on-multistage-interconnection
- Now a days Optical Multistage Interconnection Networks (OMINs) are being used as communication media for distributed computing systems. Neural network solution is used in case of OMINs in order to avoid crosstalk.
Assignment1-7006-COMP
- The twin problems of Internet Population Measurement and Address Exhaustion & IPv6 Deployment Computer Networks Research Essay
AD6_PCB_lib
- AD6封装库,包含各种各样的常用的封装,还是比较齐全的-AD6 package library, contains a variety of commonly used package is quite complete
ScaleDlg
- Scaling an image based on userinput
Binary-Patch-Comparison
- 针对软件二进制补丁分析过程,提出一种指令归一化算法,用于判别补丁前后的相应基本块内指令是否发生重排序-Aiming at the analyzing process of software binary patch, this paper proposes an instruction normalization algorithm to distinguish whether the corresponding basic blocks are reordered
Dynamic-Detection-of-Buffer-overflow
- 提出一种在二进制环境下挖掘缓冲区溢出漏洞的方法。结合动态与静态挖掘技术对二进制环境下的程序作进一步的漏洞查找。-】This paper proposes a method to detect buffer-overflow vulnerabilities for executables. Combining dynamic analysis and static analysis,it makes further detection of buffer-overflow vulnerabilit
Taxonomyof-Software-Vulnerabilities
- 软件漏洞是发生安全事件的根源,当软件漏洞被利用时,会造成严重的后果。-The vulnerabilities of software are the root of most security incident. When these vulnerabilities can be exploited, this has a seriousimpact.
cengcifengxi
- 这是层次分析法的相关资料,建模人员可以看一下。-This is the Analytic Hierarchy Process, modelers can look at.
CAMERA-CALIBRATION-APPROACHES
- a paper on camera calibration