CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Documents
Industry research
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Industry research list
Sort by :
«
1
2
...
.91
.92
.93
.94
.95
496
.97
.98
.99
.00
.01
...
992
»
E4_8_BoxJenkins
Downloaded:0
fuzzy model for box jenkin
Update
: 2025-01-21
Size
: 5kb
Publisher
:
wawa
E3_3_HFCM_PH
Downloaded:0
fuzzy model for PH control system
Update
: 2025-01-21
Size
: 6kb
Publisher
:
wawa
thesis-on-multistage-interconnection
Downloaded:0
Now a days Optical Multistage Interconnection Networks (OMINs) are being used as communication media for distributed computing systems. Neural network solution is used in case of OMINs in order to avoid crosstalk.
Update
: 2025-01-21
Size
: 3.36mb
Publisher
:
izzy
Assignment1-7006-COMP
Downloaded:0
The twin problems of Internet Population Measurement and Address Exhaustion & IPv6 Deployment Computer Networks Research Essay
Update
: 2025-01-21
Size
: 689kb
Publisher
:
gygy
AD6_PCB_lib
Downloaded:0
AD6 package library, contains a variety of commonly used package is quite complete
Update
: 2025-01-21
Size
: 67kb
Publisher
:
高文
ScaleDlg
Downloaded:0
Scaling an image based on userinput
Update
: 2025-01-21
Size
: 1kb
Publisher
:
dour
Binary-Patch-Comparison
Downloaded:0
Aiming at the analyzing process of software binary patch, this paper proposes an instruction normalization algorithm to distinguish whether the corresponding basic blocks are reordered
Update
: 2025-01-21
Size
: 362kb
Publisher
:
lijie
Dynamic-Detection-of-Buffer-overflow
Downloaded:0
】This paper proposes a method to detect buffer-overflow vulnerabilities for executables. Combining dynamic analysis and static analysis,it makes further detection of buffer-overflow vulnerabilities.
Update
: 2025-01-21
Size
: 73kb
Publisher
:
lijie
Taxonomyof-Software-Vulnerabilities
Downloaded:0
The vulnerabilities of software are the root of most security incident. When these vulnerabilities can be exploited, this has a seriousimpact.
Update
: 2025-01-21
Size
: 72kb
Publisher
:
lijie
cengcifengxi
Downloaded:0
This the Analytic Hierarchy Process, modelers can look at.
Update
: 2025-01-21
Size
: 6.58mb
Publisher
:
你大爷
CAMERA-CALIBRATION-APPROACHES
Downloaded:0
a paper on camera calibration
Update
: 2025-01-21
Size
: 147kb
Publisher
:
Mohammad Shayesteh
Variational-andPCA
Downloaded:0
The combination of PCA and level set image segmentation, it is a good method.
Update
: 2025-01-21
Size
: 1.96mb
Publisher
:
曹俊峰
«
1
2
...
.91
.92
.93
.94
.95
496
.97
.98
.99
.00
.01
...
992
»
CodeBus
is the largest source code store in internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.