- tomcat5.0patchxalan tomcat5.0+struts2部署冲突问题解次xalan库 张其科总结
- PostScript A postscript programming book for beginners
- Energy-Efficient-Routing-Protocol-for-Wireless.zi The proposed routing protocol for Wireless Sensor Network is hierarchical and cluster based. The protocol supports mobility in the Sensor Nodes as well as in the Sink. The entire protocol is described in terms of two phases namely Setup Phase and Data Forwarding Phase. After deployment of the Sensor Nodes entire sensor field in divided into some logical clusters and each cluster contains Sensor Nodes with different roles such as Gateway Node
- Space-Time-Codes-and-MIMO-Systems 包含一本经典英文MIMO书籍中所有的图形的程序
- Document about Mobile Sensor Node Deployment and Asynchronous Power Management for Wireless Sensor Networks
- libiec61850-0.9.2.1 IEC61850标准是电力系统自动化领域唯一的全球通用标准
文件名称:cpu_design_main
-
所属分类:
- 标签属性:
- 上传时间:2012-11-16
-
文件大小:1.13kb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
main categories Robust and Fragile Watermarking
Techniques. The former is mainly used for copy right
protection and fingerprinting applications, in which the goal
of watermark is to sustain under all kinds of attacks that
intend to remove the watermark while preserving the
perceptual quality of the original work. The latter is used for
data authentication which is sensitive against any kind of
processing that is applied to the work.-main categories Robust and Fragile Watermarking
Techniques. The former is mainly used for copy right
protection and fingerprinting applications, in which the goal
of watermark is to sustain under all kinds of attacks that
intend to remove the watermark while preserving the
perceptual quality of the original work. The latter is used for
data authentication which is sensitive against any kind of
processing that is applied to the work.
Techniques. The former is mainly used for copy right
protection and fingerprinting applications, in which the goal
of watermark is to sustain under all kinds of attacks that
intend to remove the watermark while preserving the
perceptual quality of the original work. The latter is used for
data authentication which is sensitive against any kind of
processing that is applied to the work.-main categories Robust and Fragile Watermarking
Techniques. The former is mainly used for copy right
protection and fingerprinting applications, in which the goal
of watermark is to sustain under all kinds of attacks that
intend to remove the watermark while preserving the
perceptual quality of the original work. The latter is used for
data authentication which is sensitive against any kind of
processing that is applied to the work.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
cpu_design_main.txt
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.