您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Elias M. Stein, Shakarchi R. Fourier analysis.. an introduction

  2. This first volume, a three-part introduction to the subject, is intended for students with a beginning knowledge of mathematical analysis who are motivated to discover the ideas that shape Fourier analysis. It begins with the simple conviction that
  3. 所属分类:专业指导

    • 发布日期:2009-08-12
    • 文件大小:1mb
    • 提供者:ziyuang
  1. Channel Coding in Communication Networks

  2. Homage to Alain Glavieux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Chapter 1. Information Theory. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Gérard BATTAIL 1.1. Introduction: the Shannon paradigm . . . . . . . . .
  3. 所属分类:C

    • 发布日期:2009-08-30
    • 文件大小:3mb
    • 提供者:ethanpad
  1. The Art of Assembly Language Programming

  2. You are visitor as of October 17, 1996.The Art of Assembly Language ProgrammingForward Why Would Anyone Learn This Stuff?1 What's Wrong With Assembly Language2 What's Right With Assembly Language?3 Organization of This Text and Pedagogical Concerns4
  3. 所属分类:Access

    • 发布日期:2007-12-20
    • 文件大小:4mb
    • 提供者:ttlyfast
  1. 椭圆曲线密码学引论

  2. Overview The book has a strong focus on efficient methods for finite field arithmetic(Chapter 2) and elliptic curve arithmetic (Chapter 3). Next, Chapter 4 surveys theknown attacks on the ECDLP, and describes the generation and validation of domainp
  3. 所属分类:C#

    • 发布日期:2008-01-08
    • 文件大小:4mb
    • 提供者:Hearson
  1. Fundamentals Of Cryptology

  2. The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulner
  3. 所属分类:其它

    • 发布日期:2011-07-21
    • 文件大小:2mb
    • 提供者:kevin___lee
  1. new directions in multivariate public key cryptography

  2. Most public key cryptosystems used in practice are based on integer factorization or discrete logarithms (in finite fields or elliptic curves). However, if large enough quantum computers can be built, Shor’s algorithm will render them completely ins
  3. 所属分类:网络安全

    • 发布日期:2011-08-24
    • 文件大小:278kb
    • 提供者:genuils10
  1. Efficient Arithmetic on Koblitz Curves*

  2. It has become increasingly common to implement discrete-logarithm based public-key protocols on elliptic curves over finite fields. The basic operation is scalar multiplication: taking a given integer multiple of a given point on the curve. The cost
  3. 所属分类:其它

    • 发布日期:2012-02-23
    • 文件大小:271kb
    • 提供者:jhb78890
  1. Error Correction coding——mathematical methods and algorithms

  2. Error Correction Coding - Mathematical Methods and Algorithms (Source Files Contained).pdf Error Correction Coding Mathematical Methods and Algorithms Todd K. Moon Utah State University @ E ! C I E N C E A JOHN WILEY & SONS, INC., PUBLICATION Prefac
  3. 所属分类:C/C++

    • 发布日期:2012-03-10
    • 文件大小:46mb
    • 提供者:pengzhong52
  1. Formal Correctness of Security Protocols

  2. This book describes a key technique, the Inductive Method, for proving the correctness of security protocols. It is clearly written, starting with the basic concepts of cryptography and leading to advanced matters such as smartcards and non-repudiat
  3. 所属分类:专业指导

    • 发布日期:2012-03-29
    • 文件大小:3mb
    • 提供者:bbikemin
  1. 算法导论英文版

  2. 算法导论,英文 【本书目录】 I Foundations Introduction 3 l The Role of Algorithms in Computing 5 l.l Algorithms 5 l.2 Algorithms as a technology 10 2 Getting Started I5 2.l Insertion sort 15 2.2 Analyzing algorithms 21 2.3 Designing algorithms 27 3 Growth of Fun
  3. 所属分类:数据库

    • 发布日期:2012-08-01
    • 文件大小:17mb
    • 提供者:caidadong
  1. Tight Finite-Key Analysis for Quantum Cryptography

  2. 很好的论文,关于量子QKD的,希望能帮到大家
  3. 所属分类:专业指导

    • 发布日期:2012-09-25
    • 文件大小:438kb
    • 提供者:asdfzlx
  1. Algorithms.and.Networking.for.Computer.Games PDF英文版

  2. 一本不错的游戏算法介绍的英文书。 内容简介: Algorithms and Networking for Computer Games is an essential guide to solving the algorithmic and networking problems of modern commercial computer games, written from the perspective of a computer scientist. Combining algorit
  3. 所属分类:游戏开发

    • 发布日期:2012-12-04
    • 文件大小:2mb
    • 提供者:edwardnong
  1. PhD thesis

  2. The pneumatic transport of granular material is a common operation frequently employed to transport solid particles from one location to another in chemical, process and agricultural industries. It is environmentally friendly, flexible and can be fu
  3. 所属分类:专业指导

    • 发布日期:2013-10-21
    • 文件大小:3mb
    • 提供者:u012524680
  1. Advanced.Quantitative.Finance.with.Cplusplus

  2. Create and implement mathematical models in C++ using quantitative finance Overview Describes the key mathematical models used for price equity currency interest rates and credit derivatives The complex models are explained step by step along with a
  3. 所属分类:金融

    • 发布日期:2015-01-23
    • 文件大小:3mb
    • 提供者:ramissue
  1. Fast Estimation of Gaussian Mixture Models for Image Segmentation

  2. 利用高斯混合模型实现图像分割The Expectation-Maximization algorithmhas been classically used to find the maximum likelihood estimates of parameters in probabilistic models with unobserved data, for instance, mixture models. A key issue in such problems is the choi
  3. 所属分类:讲义

    • 发布日期:2015-07-10
    • 文件大小:2mb
    • 提供者:futurelife2011
  1. Reactive.Programming.with.Scala.and.Akka 0分下载

  2. Harness reactive programming to build scalable and fault-tolerant distributed systems using Scala and Akka About This Book Use the concepts of reactive programming to build distributed systems running on multiple nodes Get to grips with the full ran
  3. 所属分类:其它

    • 发布日期:2016-04-28
    • 文件大小:2mb
    • 提供者:robertyuzj
  1. Unity.5.From.Zero.to.Proficiency.B01EJCE85M

  2. Unity 5 From Zero to Proficiency (Intermediate): A step-by-step guide to coding your first game in C# with Unity. Why this book can help you to get started with Game Development Creating your own game can be very intimidating at the start, and quite
  3. 所属分类:网络游戏

    • 发布日期:2016-05-10
    • 文件大小:2mb
    • 提供者:ramissue
  1. FPGA-Based Secret Key Distillation Engine Quantum Key Distribution Systems

  2. An FPGA-Based 4 Mbps Secret Key Distillation Engine for Quantum Key Distribution Systems.pdf IDQ QKD 论文,可以参考。J Sign Process Syst(2017)86: 1-15 they contain on average less than one photon. The receiver of leaked information and the information leake
  3. 所属分类:网络安全

    • 发布日期:2019-07-16
    • 文件大小:2mb
    • 提供者:ahnushe
  1. Finite-key analysis for measurement-device-independent quantum key distribution

  2. The length of signal pulses is finite in practical quantum key distribution. The finite-key analysis of an unconditional quantum key distribution is a burning problem, and the efficient quantum key distribution protocol suitable for practical impleme
  3. 所属分类:其它

    • 发布日期:2021-02-21
    • 文件大小:249kb
    • 提供者:weixin_38735570
  1. A CCA Secure Public Key Encryption Scheme Based on Finite Groups of Lie Type

  2. A CCA Secure Public Key Encryption Scheme Based on Finite Groups of Lie Type
  3. 所属分类:其它

    • 发布日期:2021-02-11
    • 文件大小:295kb
    • 提供者:weixin_38688145
« 12 »