CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Documents
Industry research
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Industry research list
Sort by :
«
1
2
...
.91
.92
.93
.94
.95
496
.97
.98
.99
.00
.01
...
991
»
jisuanjiwangluo
Downloaded:0
University Computer Network lab report, for upcoming or juniors are learning Learning Exchange.
Date
: 2025-06-12
Size
: 4.8mb
User
:
小鱼
E4_8_BoxJenkins
Downloaded:0
fuzzy model for box jenkin
Date
: 2025-06-12
Size
: 5kb
User
:
wawa
E3_3_HFCM_PH
Downloaded:0
fuzzy model for PH control system
Date
: 2025-06-12
Size
: 6kb
User
:
wawa
thesis-on-multistage-interconnection
Downloaded:0
Now a days Optical Multistage Interconnection Networks (OMINs) are being used as communication media for distributed computing systems. Neural network solution is used in case of OMINs in order to avoid crosstalk.
Date
: 2025-06-12
Size
: 3.36mb
User
:
izzy
Assignment1-7006-COMP
Downloaded:0
The twin problems of Internet Population Measurement and Address Exhaustion & IPv6 Deployment Computer Networks Research Essay
Date
: 2025-06-12
Size
: 689kb
User
:
gygy
AD6_PCB_lib
Downloaded:0
AD6 package library, contains a variety of commonly used package is quite complete
Date
: 2025-06-12
Size
: 67kb
User
:
高文
ScaleDlg
Downloaded:0
Scaling an image based on userinput
Date
: 2025-06-12
Size
: 1kb
User
:
dour
Binary-Patch-Comparison
Downloaded:0
Aiming at the analyzing process of software binary patch, this paper proposes an instruction normalization algorithm to distinguish whether the corresponding basic blocks are reordered
Date
: 2025-06-12
Size
: 362kb
User
:
lijie
Dynamic-Detection-of-Buffer-overflow
Downloaded:0
】This paper proposes a method to detect buffer-overflow vulnerabilities for executables. Combining dynamic analysis and static analysis,it makes further detection of buffer-overflow vulnerabilities.
Date
: 2025-06-12
Size
: 73kb
User
:
lijie
Taxonomyof-Software-Vulnerabilities
Downloaded:0
The vulnerabilities of software are the root of most security incident. When these vulnerabilities can be exploited, this has a seriousimpact.
Date
: 2025-06-12
Size
: 72kb
User
:
lijie
cengcifengxi
Downloaded:0
This the Analytic Hierarchy Process, modelers can look at.
Date
: 2025-06-12
Size
: 6.58mb
User
:
你大爷
CAMERA-CALIBRATION-APPROACHES
Downloaded:0
a paper on camera calibration
Date
: 2025-06-12
Size
: 147kb
User
:
Mohammad Shayesteh
«
1
2
...
.91
.92
.93
.94
.95
496
.97
.98
.99
.00
.01
...
991
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.