Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • COMBINED-jncd.rar ... that the HVS does not perceive, gives us a way to model the HVS accurately. In this paper, we exploit a combined JND model which represents additional accurate perceptual visibility threshold profile to guide watermarking for digital images.
  • 7.rar ms05-11 exploit html version2
  • 8-nodep.rar ms05-12 iternet explloer exploit
  • 2-4.rar ms05-15 iternet exploer exploit
  • 8-exolpit.rar ms05-15 iternet exploer exploit
  • Relay_routing.rar ... amendment is fully backward compatible. The addition of relay capability does not affect the design of MS unless MS has to exploit some optional features such as receive diversity. The BS needs to change slightly and is called MR-BS to differentiate it ...
  • 7-djvu-9812381511.zip ... standard SVMs. LS-SVMs are closely related to regularization networks and Gaussian processes but additionally emphasize and exploit primal-dual interpretations from optimization theory. The authors explain the natural links between LS-SVM classifiers and ...
  • A-Bayesian-Approach.rar ... methodology for receiver function analysis, a key tool in determining the deep structure of the Earth’s crust.We exploit the assumption of sparsity for receiver functions to develop a Bayesian deconvolution method as an alternative to the widely used ...
  • 18010-(1).zip SKYPE VOICE OVER IP - SOFTWARE VULNERABILITIES From Exploit-db
  • cmd-overflow.rar cmd_overflow,Generic exploit for command line buffer overflows