搜索资源列表
lab2
- ICS 课程的Lab2-ICS courses Lab2
CMU_lab1-P-lab2
- CMU lab1: datalab + lab2: bomblab-CMU lab1: datalab+ lab2: bomblab
xv6-lab2
- 清华大学陈渝老师在xv6基础上开发的实验环境,内存管理部分。pudn上有了lab3-7但是没有lab2,而lab2是最重要的一个环节-地址间的转换和pdt pte的实现-CHEN Yu Tsinghua University teachers xv6 developed on the basis of the experimental environment, the memory management component. pudn on with lab3-7 but not lab2, b
lab2
- Unix IPC and GDB tutorial
lab2
- This program is a C program in Linux .It uses multithread to solve the problem caculation of scalar product of two vector .
lab2.tcl.tar
- multicasting program on udp connection
lab2.tcl.tar
- 基于NS2的有线+无限混合网络模拟实例,基于Mobile IP-example of wire and wireless network based on NS2 and mobile ip
lab2.pdf.tar
- Writing Qtopia Applications
Lab2-2
- 作为通讯的双方A和B已经共享一个会话主密钥Km。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。-As communication between the parties A and B have shared a session master key Km. Upon completion of the distribution of session key Ks, A-Ks f
10302010026cp1_v2.tar
- JOS lab2 第一部分代码,自己写的-JOS lab2
lab1_2
- 哈尔滨工业大学操作系统实验一,哈尔滨工业大学操作系统实验二.-os lab1 and lab2 of hit
lab2networkandsystemsecurity
- Lab2 Network admintration and security
lab2
- CSAAP lab2 bomblab自己做得-CSAAP lab2 bomblab
lab2
- 个人实现简单的操作系统,os操作系统课 实验lab-Individuals to achieve a simple operating system, os operating system class lab experiment
datalab-handout
- 深入理解计算机 LAB2 datalab-*********************** The CS:APP Data Lab Directions to Students *********************** Your goal is to modify your copy of bits.c so that it passes all the tests in btest without violating any of the coding guide
lab2
- 程序查询 Fat12 文件,分别对目录文件、普通文件、不存在的文件进行做相应的输出-Procedures for the Fat12 file, respectively, on the directory file, the ordinary file, the file does not exist to do the corresponding output
lab2
- 北京大学ICS 实验2 改版前的ICS实验2 具体说明见附件-ICS ICS Peking experiment Experiment 2 before the revision of Annex 2 illustrates
Lab2 - Symmetric
- Cryptolab problem blah blah
lab2
- ? Shamir(t,n)密钥共享方案的程序实现 ? 共享秘密的生成与分发仿真 ? 共享密钥的重现验证(Programming Implementation of Shamir(t,n) Key Sharing Scheme Generation and Distribution of Shared Secrets Recurrent Verification of Shared Key)
