搜索资源列表
LinuxBasedNetworkManagementSystem
- A Linux-Based Network Management System
SecurityinDistributedEmbeddedSystems
- Information security was first explored in the context of communication systems. When two entities send or receive sensitive data using public networks or communication channels that are easily accessible by could-be attackers, they should genera
Topology_Control_in_Wireless_Sensor_Networks
- this paper is about wireless sensor network A Fault Tolerant Topology Control in Wireless Sensor Networks
CDMA
- this abook aboud CDMA ,3G Handset and Network Design,Broadband Wireless Access,Adaptive WCDMA CDMA.Systems.Capacity.Engineering.eBook-kB-this is abook aboud CDMA ,3G Handset and Network Design,Broadband Wireless Access,Adaptive WCDMA CDMA.Systems.Cap
T2376
- The main objective of the project was to address the above mentioned trends and to form a consistent concept of an All-IP telecommunications network with wireless access. The project took into account both the user s and the network s
jen_hall
- The need for robust access control mechanisms is paramount, especially in Wireless Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current authentication systems are vulnerable to device impersonation by rogue devices. Within
TCP_Performance_Over_Wireless_Network
- Transmission Control Protocol (TCP) is the dominant transport protocol in the Internet and supports many of the most popular Internet applications, such as the World Wide Web (WWW), file transfer and e-mail. TCP congestion control algorithms dyna
mcuduojitongxunwangluo
- 单片机多机通讯网络及数据传输容错技术,介绍了基于单片机的网络通讯方面的最新技术及观点。-Single Chip Multi-machine communication network and data transmission fault-tolerant technology, introduced the network communication based on single chip on the latest technologies and ideas.
CSS
- In this paper, author consider cooperative spectrum sensing in order to optimize the sensing performance and focus on energy detection for spectrum sensing and find that the optimal fusion rule is the half-voting rule. Next, the optimal detec
BAS
- These cooperations are facilitated by dynamically and opportunistically assigning one of the secondary users as a relay to assist the other one, which results in more efficient spectrum hole detection. Also, we investigate the impact of erroneous
lessons_ns
- this documnet about network simulator(NS2)
ns2
- NS2网络仿真的基础教程,很不错,能够带你走进NS2的大门-NS2 network simulation tutorials, very good,which can take you into the door of NS2
spie2002
- adaptive routing algorithm in which the link cost are dynamically assigned using a fuzzy system. The traffic in the network is re-routed to nodes, which are less congested, or have spare capacity. Based on a set of fuzzy rules, link cost is dyn
v
- 个人防火墙核心技术是数据包的截获,通过SPI 服务提供者接口进行网络数据包( Service Provider Interface) 截获能够最完备地得到进程访网信息. 一个功能完备的个人防火墙系统不仅能够封 包截获,还应能解析协议、支持自定义控管规则以及日志记录随时的网络通信状况. 本项目遵循SPI 规 范完整实现了上述功能,给出了一个Windows 下的个人防火墙系统实现过程中的技术要点分析.-Personal firewall core technology is interc
AT-help
- Nokia的GSM模块AT指令集说明文档,本文档描述了如何在GSM网络中通过AT指令来控制Nokia GSM模块。给出了所有相关指令及其语法和说明。-AT Command Set for Nokia GSM Products. This document describes how to GSM network via AT commands to control the Nokia GSM module. Given all the relevant directives and their
168313
- 新太平台与网络接口流程范例。已经测试通过的并且已经在使用的-The new process is too platform and network interface paradigm. Has been tested and have been adopted for use
WiMAX-Antenas
- Lack of standards and spotty frequency availability in the sub-11 GHz region has forced many original equipment manufacturers (OEMs) and network operators to specify unique custom antennas for base stations and backhaul in broadband wireless poin
OReilly.802.11.Wireless.Networks.The.Definitive.G
- As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides a
chapter4
- 实现网络文件管理器,并能够添加文件和文件夹的删除功能-To achieve network file manager, and be able to add files and folders, delete function
bbAnalogy
- it is a word file contains solutions for network simulations