搜索资源列表
really_hacking_sql
- Really Hacking SQL A Power Point Presentation on hacking SQL and Exploits
Content-based-Identification-of-Audio-Material-Us
- Along with investigating similarity metrics between audio material, the topic of robust matching of pairs of audio content has gained wide interest recently. In particular, if this matching process is carried out using a compact representation
satellite-links-by-ADS
- 基于ADS软件的卫星通信系统仿真平台的搭建-establishes the advanced DSSS signal producing and modulating model, transmitter model, receiver model and other models by provided basic ADS models exploits the new ADS interference producing model and cross relation model
aircraft
- Wireless transmission is ideal in cases where instantaneous or continuous energy transfer is needed, but interconnecting wires are inconvenient, hazardous, or impossible. The tangle of cables and plugs needed to recharge today s electronic gadgets co
search-jsp-search-result-60---www.pudn.com
- A TV network cynically exploits a deranged ex-TV anchor s ravings and revelations about the media for their own profit.
wsn-papers
- In this paper, we propose an effective end-to-end virtual path construction system, which exploits path diversity over heterogeneous wireless networks. The goal of the proposed system is to provide a high quality live video streaming service
AIX6.1-overflow-exploits-principle
- AIX5.3及6.1堆溢出漏洞利用原理分析-AIX5.3 and 6.1 heap overflow exploits the principle of analysis
Java
- Java组件高危漏洞 金山毒霸提供应急解决方案,解决用户使用主流浏览器访问攻击者设计含Java漏洞攻击的网页,可能导致计算机被完全控制的问题。 -High-risk vulnerabilities in Java components the Duba provide emergency solutions to solve the user visited an attacker major browsers designed pages with Java exploits may caus
few2many-pami01
- a generative appearance-based method for recognizing human faces under variation in lighting and viewpoint. The method exploits the fact that the set of images of an object in fixed pose, but under all possible illumination conditions, is a convex
observers
- The first one is used for the full-order observer design and produces an observer that has the same dimension as the original system. The second technique exploits the knowledge of some state space variables available through the output algebraic e
Introduction-to-Quantum-Cryptography
- Quantum cryptography is a scientific discipline that exploits the laws of quantum mechanics to perform cryptographic tasks, e.g., secure message transmission. It turns out that quantum phenomena are in fact very useful for that purpose: The level
Cloudauth-RACS-CR
- A private cloud provides organizations a secure environment to run business process. It provides a flexible way to extend the working environment. While user mobility has become an important feature for many systems, technologies that provide users
modDRF.pdf
- In this paper we present Discriminative Random Fields (DRF), a discrim- inative framework for the classification of natural image regions by incor- porating neighborhood spatial dependencies in the labels as well as the observed data. The proposed mo
2
- In this paper, a new scaling-based image-adaptive watermarking system has been presented, which exploits human visual model for adapting the watermark data to local properties of the host image. Its improved robustness is due to embedding in
20111121200818511
- 宋太祖赵匡胤(927年-976年11月14日),中国北宋王朝的建立者,庙号太祖,汉族,涿州(今河北)人。出身军人家庭,高祖赵朓,祖父赵敬,赵弘殷次子。948年,投后汉枢密使郭威幕下,屡立战功。-Zhao Kuangyin (927 976 on November 14), the founder of the Northern Song Dynasty China, Temple name Dynasty, Han, Zhuozhou (now Hebei) people. Born in a
[5]-Sensitive-White-Space-Detection-with-Spectral
- This paper proposes a novel, highly effective spectrum sensing algorithm for cognitive radio and white space applications. The proposed spectral covariance sensing (SCS) algorithm exploits the different statistical correlations of the received
goddless-mobile-malware-uses-multiple-exploits-to
- goddless mobile device security
Best-of-Bakers-Best-(precision-data-converters).z
- Data converters bridge the space between the analog and digital domains in your circuits. This feat is done with analog-to-digital and digital-to-analog converters. With this book chapter, the definition of delta-sigma analog-to-digital converter
10.1.1.721.1901
- The emergence of personal mobile device with low cost sensors, such as accelerometer and digital compass, has made dead-reckoning (DR) an attractive choice for indoor pedestrian tracking. In this paper, we propose a robust DR pedestrian tracking