Wireless Communications Principles And Practice 2nd Edition by Rappaport
2021-12-17 17:38:49 24.87MB Wireless
1
本次集中上传长期以来积攒的电子资源设计无线通信,编码理论,方针理论。希望大家喜欢很多出自牛人手笔,比如vitebi, david tse, gallager, lapidoth,andrew goldsmith。。。。。。很多都是英文原版,而且是最清晰的我才会收藏,从CSDN上获得了很多资源,现在是时候回报了。
2021-12-13 11:32:24 18.62MB cdma communication spread spectrum
1
Programming -- Principles and Practice Using C++, Second Edition 英文 第2版 EPUB转PDF Bjarne Stroustrup
2021-12-13 01:19:14 60.28MB Principles and Practice Using
1
======================= 特别提醒大家: 由于我这里网络条件的原因,往往不能顺利上传到CSDN上,所以现在主要改在百度空间和网盘中进行更新,请感兴趣的朋友到这里下载我最新上传的论文集:http://hi.baidu.com/ictpapers 百度网盘速度较快,还不需要积分。 ======================= (我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://download.csdn.net/user/qysh123 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) 操作系统研究领域的顶级会议SOSP 2013年论文集。关于SOSP,请参考以下简介: 操作系统(OS)领域有两个国际顶尖会议:SOSP和OSDI,但由于SOSP只在奇数年召开、OSDI只在偶数年召开,所以实际上可以将SOSP+OSDI合并看成操作系统领域的顶尖年会。 SOSP由ACM SIGOPS组织开办,USENIX组织也常参与进来。与SIGCOMM类似,SOSP也是一个只求精品的会议:数量方面每年只录用20篇左右的正式会议论文,录取率约20%(由此可见录取率不能表征一个会议的好坏,20%的会议可以是顶尖,10%的会议可以是垃圾);质量方面的要求极高——重大问题、有趣且有竞争力的解法、实用有益、接合业内前驱工作等等。 SOSP采用Blind审稿和Single-Track演讲,20来篇论文,每年的参会人数却在400左右,可见能在SOSP上发表论文真的是所有操作系统相关研究者的无上荣誉。 压缩包共收录了2013年SOSP的9个Session,共计30篇论文。另外值得一提的是,今年SOSP也在第一时间发布了包含所有论文的完整PDF文件,在这个压缩包中也包含了这个pdf文件。欢迎大家下载。
2021-12-12 20:30:47 32.29MB ACM 操作系统 SOSP 2013
1
Compiler-Principle 编译原理词法分析器和语法分析器代码实现
2021-12-10 17:27:17 38KB java compiler-principles Java
1
搜索了一下发现没有第二版的。This book is primarily concerned with the provision of good flying and handling qualities in conventional piloted aircraft, although the material is equally applicable to the uninhabited air vehicle (UAV). Consequently it is also very much concerned with the stability, control and dynamic characteristics which are fundamental to the determination of those qualities. Since flying and handling qualities are of critical importance to safety and to the piloting task it is essential that their origins are properly understood. Here then, the intention is to set out the basic principles of the subject at an introductory level and to illustrate the application of those principles by means of worked examples.
2021-12-10 15:48:32 3.19MB Flight Dynamics Principles Third
1
Magnetic resonance imaging (MRI) is a technique used in biomedical imaging and radiology to visualize internal structures of the body. Because MRI provides excellent contrast between different soft tissues, the technique is especially useful for diagnostic imaging of the brain, muscles, and heart.,解压密码 share.weimo.info
2021-12-10 15:39:49 93.33MB 英文
1
Principles of Secure Processor Architecture Design_2018
2021-12-09 16:58:51 3.28MB secure architec
1
作者简介 Dr. William Stallings has authored 18 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association. In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products. He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. Dr. Stallings holds a PhD from MIT in computer science and a BS from Notre Dame in electrical engineering. 目录 1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Key Management and Distribution 15. User Authentication Protocols 16. Network Access Control and Cloud Security 17. Transport-Level Security 18. Wireless Netwo
2021-12-06 16:43:40 8.7MB Willia Crypto Networ Princi
1