Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • A Performance Study of CSMA in Wireless Networks with SIC ... (SIC) is an effectiveway of multipacket reception to combat interference. As conventional CSMA (Carrier Sense Multiple Access) is designed for single packet reception, it is unclear whether or not CSMA performs well to exploit the SIC capability
  • Head First Design Patterns ... . In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java's built-in pattern support in your own code. You want to learn the real OO design principles and why everything your boss ...
  • Big Data Analysis for Bioinformatics and Biomedical Discoveries ... ... the NIH Big Data to Knowledge (BD2K) initiative, the book enhances your computational and quantitative skills so that you can exploit the Big Data being generated in the current omics era. The book explores many significant topics of Big Data analyses ...
  • Game Programming Using QT(PACKT,2016) ... design animation, add game physics, and build astonishing UI for the games. Towards the final chapters, you’ll learn to exploit mobile device features such as accelerators and sensors to build engaging user experiences. If you are planning to learn about ...
  • Learning Metasploit Exploitation and Development 无水印pdf 0分 ... appear slim In Detail Metasploit is an open source exploit framework that provides you with heaps of exploits, ... with vulnerability assessment with the best tools using Metasploit Exploit research with Metasploit Discover the latest exploits for ...
  • All.About.CAPTCHAs.Decoding.CAPTCHAs.for.Fun ... for a practical guide to CAPTCHA decoding? All About CAPTCHA’s. This eBook will teach you how to identify weaknesses and exploit CAPTCHA’s from beginning to end. Welcome to the practical guide to decoding CAPTCHA's. Everything you need to start decoding ...
  • Game.Programming.Using.QT.17821688 ... design animation, add game physics, and build astonishing UI for the games. Towards the final chapters, you'll learn to exploit mobile device features such as accelerators and sensors to build engaging user experiences. If you are planning to learn about ...
  • Xcode 7 Essentials(PACKT,2ed,2016) ... find out how they can be implemented * Create custom components for your application through frameworks and live previews * Exploit Xcode’s advanced features to elevate your debugging and testing capabilities * Run your application on the physical device ...
  • A Shared-Subspace Learning Framework for Multi-Label Classificat... ... the same input space, and the seman- tics conveyed by different labels are usually correlated, it is essential to exploit the correlation information contained in different labels. In this paper, we consider a general framework for ex- tracting shared ...
  • Multi-Label Lazy Associative Classification ... , researchonmulti-labelclassificationisstilllacking.Com- mon approaches simply learn independent binary classifiers for each label, and do not exploit dependencies among labels. Also, several small disjuncts may ap- pear due to the possibly large number ...