Welcome![Sign In][Sign Up]
Location:
Search - holes

Search list

[Industry researchSpectralSurfaceReconstructionfromNoisyPointClouds.

Description: We introduce a noise-resistant algorithm for reconstructing a watertight surface from point cloud data. It forms a Delaunay tetrahedralization, then uses a variant of spectral graph partitioning to decide whether each tetrahedron is inside or outside the original object. The reconstructed surface triangulation is the set of triangular faces where inside and outside tetrahedra meet. Because the spectral partitioner makes local decisions based on a global view of the model, it can ignore outliers, patch holes and undersampled regions, and surmount ambiguity due to measurement errors. Our algorithm can optionally produce a manifold surface. We present empirical evidence that our implementation is substantially more robust than several closely related surface reconstruction programs.
Platform: | Size: 7606272 | Author: madison | Hits:

[JSP/JavaSocket

Description: java实现UDP socket打洞,使消息在nat之间传递-java implementation UDP socket holes, so that messages passed between the nat! ! !
Platform: | Size: 111616 | Author: bobhpf | Hits:

[Voice CompressNOISE_BS

Description: Noise training sequences used to check convergence rate in echo cancellers (8kHz - middle holes).-Noise training sequences used to check convergence rate in echo cancellers (8kHz- middle holes).
Platform: | Size: 66560 | Author: moth | Hits:

[Voice CompressNOISE_BSN

Description: Noise training sequences used to check convergence rate in echo cancellers (8kHz - middle narrow holes).-Noise training sequences used to check convergence rate in echo cancellers (8kHz- middle narrow holes).
Platform: | Size: 168960 | Author: moth | Hits:

[.netP2P

Description: 利用了UDP打洞技术.分服务器端跟客户端.服务器端负责登陆记录用户的IP和端口及转发打洞消息-Use of UDP hole punching techniques. Sub-server-side with the client. Server-side is responsible for landing records the user' s IP and port holes, and forwarding the message
Platform: | Size: 5120 | Author: Tracy | Hits:

[Internet-Networkp2ppackages

Description: p2p打洞的功能封装,对于需要使用P2P的地方可以直接引用-p2p holes feature packages that require the use of P2P where you can refer directly to
Platform: | Size: 4096 | Author: 章建俊 | Hits:

[BooksTheShellcodersHandbook

Description: The Shellcoders Handbook 来自看雪论坛的一本讲解shellcode的好书 目录 1 在开始之前 2 栈溢出 3 Shellcode 4 格式化串漏洞 5 堆溢出 6 Windows的广阔原野 7 Windows Shellcode. 8 Windows 溢出 9 战胜过滤器 10 Solaris破解入门 11 高级Solaris破解 . 12 破解HP Tru64 Unix 13 建立工作环境 14 故障注入 15 Fuzzing的技巧 16 源码审计:在 C-Based 语言里寻找漏洞 17 Instrumented Investigation: 手工的方法 18 跟踪漏洞 19 二进制审计:Hacking不公开源码的软件 20 Alternative Payload Strategies 21 编写在野外运行的代码 22 攻击数据库软件 23 内核溢出 24 破解内核漏洞 25 附录 -The Shellcoders Handbook to see the snow from the forum a good book to explain shellcode Contents 1 Before you begin 2 stack overflow 3 Shellcode 4 Format String Vulnerability 5 heap overflow 6 Windows of the vast wilderness 7 Windows Shellcode. 8 Windows spill over nine filters 10 Solaris Senior Solaris crack crack entry 11. 12 crack HP Tru64 Unix 13 establish a working environment 14 Fault Injection 15 Fuzzing techniques 16 source code audit: In the C-Based Language in search of holes 17 Instrumented Investigation: manual methods to track 18 holes 19 binary audit : Hacking is not open source software 20 Alternative Payload Strategies 21 write the code in the wild, running 22 attacks on the database software 23 crack kernel kernel overflow vulnerability 25 Appendix 24
Platform: | Size: 2791424 | Author: 孙锋 | Hits:

[Internet-Networkflawfinder_1.27-2.tar

Description: 用于代码扫描的工具,可以对C或C++源代码进行检查和审计,发现可能存在的安全漏洞,尤其是缓冲区漏洞-For code scanning tools, can be C or C++ source code inspections and audits and found that there may be security holes, particularly the buffer overflow
Platform: | Size: 142336 | Author: chenfagui | Hits:

[J2MEBeatSusliks

Description: 手机上的一个打地鼠的小游戏,地鼠在几个洞口随机出现,过关越多,难度越大-Playing on the phone a little hamster games, hamster in a few holes appeared randomly pass the more difficult the greater the
Platform: | Size: 299008 | Author: dqwda | Hits:

[Otherrpo

Description: 通过ugopen的API函数进行孔操作时,重新定位孔的位置-The API function through the ugopen hole operation to reposition the location of holes
Platform: | Size: 3072 | Author: liangalan | Hits:

[.netbluesee

Description: 1 新闻 产品 多级分类 搜索功能 2 新闻 产品 公告 投票 评论 调查 留言 连接 招聘 3 access版本 4 fck编辑器(自带远程图片上传功能) 5 新闻 产品 可以评论(ajax) 带有上下篇的功能 6 图片上传功能 7 下载地址 http://www.wanwanmeimei.cn/bluesee.rar 美国空间 http://bluesee.0530bb.com/bluesee.rar 国内空间 8 QQ 461231504 9 首页页 生成 静态 10 列表页 只用 动态 11 新闻内容页 生成 静态 12 产品内容页 暂时不生成 静态 13 防止了注入漏洞-1 Press Multi-level category search feature two news product announcements Commenting on the survey to vote a message to connect recruit 3 access version 4 fck editor (comes with a remote image upload feature) 5 news products and can not comment (ajax) with the functions of six pictures on the next upload feature 7 Download http://www.wanwanmeimei.cn/bluesee.rar U.S. space http://bluesee.0530bb.com/bluesee.rar domestic space 8 QQ 461231504 9 home pages to generate a static list of pages with only 10 dynamic 11 news content pages to generate static content pages 12 products temporarily generate a static 13 prevents the injection holes
Platform: | Size: 5180416 | Author: 777777777 | Hits:

[Graph programPCFairhole

Description: 用于绘制光子晶体光纤空气孔形状的可扩展程序。-This is a simple and expandable programm for the air hole shape of Photonic crystal fiber
Platform: | Size: 80896 | Author: 江鹏 | Hits:

[Program docBAS

Description: These cooperations are facilitated by dynamically and opportunistically assigning one of the secondary users as a relay to assist the other one, which results in more efficient spectrum hole detection. Also, we investigate the impact of erroneous detection of spectrum holes and thereof missing communication opportunities on the capacity of the secondary channel. The capacity of the secondary users with interference-avoiding spectrum access is affected by 1) how effectively the availability of vacant spectrum is sensed by the secondary transmitter-receiver pair, and 2) how correlated are the perceptions of the secondary ransmitter-receiver pair about network spectral activity. We show that both factors are improved by using the proposed cooperative protocols.
Platform: | Size: 1133568 | Author: hossein | Hits:

[Special EffectsImage_Interpolation

Description: 图像孔洞/裂缝的填充算法。根据图像的同态性,采用最邻近插值的思想。-Image holes/cracks in the fill algorithm. According to the image of the same state, using the nearest interpolation ideas.
Platform: | Size: 1024 | Author: Liu Xi | Hits:

[Otherscare_analyst

Description: Source Code Analysis Risk Evaluation Tool-The Source Code Analysis Risk Evaluation project is a study to create a security complexity metric that will analyze source code and provide a realistic and factual representation of the potential of that source code to create a problematic binary. This metric will not say that the binary will be exploited nor does it do a static analysis for known limitations like vulnerabilities. However it will flag code for a particular interaction type or control and allow the developer to understand which OpSec holes are not protected even if it can t say the effectiveness of that protection. The level of required effectiveness would require a much more sophisticated analysis tool and not within the scope of this project at this time. The goal of this study is to apply the ISECOM research findings for security metrics represented as the Risk Assessment Values (RAVs) in OSSTMM 3.0. These metrics define
Platform: | Size: 16384 | Author: piowang | Hits:

[Com Portrevisedplans

Description: New speech for the detection of holes
Platform: | Size: 309248 | Author: Waqar | Hits:

[TreeViewdyingtree

Description: New speech for the detection of holes
Platform: | Size: 850944 | Author: Waqar | Hits:

[P2PMakeTCPHole

Description: P2P打洞 穿透NAT 制作聊天软件基础 适合中级程序爱好者-Holes through NAT P2P chat software based production process for intermediate lovers
Platform: | Size: 12126208 | Author: 伍永超 | Hits:

[OtherEffectiveDose

Description: :随着无线技术的飞速发展,频谱缺乏已经成为一个非常严重的问题.感知无线电技术能有效解 决频谱紧张的现状.介绍了感知无线电概念及其内涵,然后介绍了检测频谱空穴的方法.为提高检测概率、 降低设备复杂度及计算复杂度,将UWB与感知无线电结合,提出了基于能量检测及用户合作(EDAUC)的 协作感知方法.仿真和分析表明:该方法能有效提高检测频谱空穴的概率.-: With the rapid development of wireless technology, the lack of spectrum has become a very serious problem. Cognitive radio technology can effectively solve the spectrum tense situation. Introduced the concept of cognitive radio and its content, and then introduces the method of detection of spectrum holes. To improve the detection probability and reduces the complexity and computational complexity, the combination of UWB and cognitive radio is proposed based on energy detection and user cooperation (EDAUC) the cooperative sensing methods. Simulation and analysis: This method can improve the probability of detection of spectrum holes.
Platform: | Size: 282624 | Author: 林熙怡 | Hits:

[Game EnginevbspComplete

Description: HL2源码 编译完成 包内不含资源. vbsp算法 PVS 孔洞.-HL2 Source compile complete package without resources. Vbsp algorithm PVS holes.
Platform: | Size: 11826176 | Author: 王璞 | Hits:
« 1 2 3 4 5 67 8 9 10 11 ... 16 »

CodeBus www.codebus.net