搜索资源列表
SYNC
- pll phasenregler The ltering operation of the error voltage (coming out from the Phase Detec- tor) is performed by the loop lter. The output of PD consists of a dc component superimposed with an ac component. The ac part is undesired as an in
am_regler
- The ltering operation of the error voltage (coming out from the Phase Detec- tor) is performed by the loop lter. The output of PD consists of a dc component superimposed with an ac component. The ac part is undesired as an input to the VCO, h
freq_regler
- The ltering operation of the error voltage (coming out from the Phase Detec- tor) is performed by the loop lter. The output of PD consists of a dc component superimposed with an ac component. The ac part is undesired as an input to the VCO, h
ordnung2
- The ltering operation of the error voltage (coming out from the Phase Detec- tor) is performed by the loop lter. The output of PD consists of a dc component superimposed with an ac component. The ac part is undesired as an input to the VCO, h
pll
- The ltering operation of the error voltage (coming out from the Phase Detec- tor) is performed by the loop lter. The output of PD consists of a dc component superimposed with an ac component. The ac part is undesired as an input to the VCO, h
TOR
- This is about make a information system. Especially to plan success of system and use many people in whole world. so first is make a TOR.
Complete-Doc
- Abstract—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing thi
research-of-network-penetrating
- 本论文首先在基于对网络穿透中常用的代理技术、加密隧道技 术、匿名通信技术等原理的分析基础上,针对常用工具Privoxy、 Stunnel、TOR做了详尽的剖析和研究。并在此基础上,设计并实现 了穿透代理系统PROProxy。-Firstly,this paperanalyzes and esearches the popular application tools like Privoxy,Stunnel and TOR,then,apenetrating proxy syste
tor-design
- 一篇很好的介绍有关TOR的技术的论文,很好地介绍了有关地址隐藏的信息安全技术-A good introduction to TOR technical papers, a good introduction to the addresses hidden information security technology
changelog.txt
- This the documentation of tor.-This is the documentation of tor.