Welcome![Sign In][Sign Up]
Location:
Search - scenario.t

Search list

[WinSock-NDISTribeFloodNet2k

Description: Tribe FloodNet 2k Distributed Denial Of Service Network 分布式拒绝服务工具的源代码,下面为英文说明: TFN can be seen as the yet most functional DoS attack tool with the best performance that is now almost impossible to detect. What is my point in releasing this? Let me assure you it isn t to harm people or companies. It is, however, to scare the heck out of everyone who does not care about systematically securing his system, because tools sophisticated as this one are out, currently being improved drastically, kept PRIVATE, and some of them not with the somewhat predictable functionality of Denial Of Service. It is time for everyone to wake up, and realize the worst scenario that could happen to him if he does not care enough about security issues. Therefore, this program is also designed to compile on a maximum number of various operating systems, to show that almost no modern operating system is specifically secure, including Windows, Solaris, most UNIX flavors and Linux. -Tribe FloodNet 2k Distributed Denial Of Se rvice Network Distributed denial of service tools source code for the English below : TFN can be seen as the most functional yet DoS att Ack tool with the best performance that is now al most impossible to detect. What is my point in re this leasing Let me assure you it isn t to harm peo ple or companies. It is, however, to scare the heck out of everyone who does not car e about systematically securing his system, because tools sophisticated as this one are out , currently being improved drastically. PRIVATE kept, and some of them not with the somewhat predictab le functionality of Denial Of Service. It is tim e for everyone to wake up. and realize the worst scenario that could Happe n to him if he does not care enough about security issues. There
Platform: | Size: 44662 | Author: onlyu | Hits:

[Internet-NetworkTribeFloodNet2k

Description: Tribe FloodNet 2k Distributed Denial Of Service Network 分布式拒绝服务工具的源代码,下面为英文说明: TFN can be seen as the yet most functional DoS attack tool with the best performance that is now almost impossible to detect. What is my point in releasing this? Let me assure you it isn t to harm people or companies. It is, however, to scare the heck out of everyone who does not care about systematically securing his system, because tools sophisticated as this one are out, currently being improved drastically, kept PRIVATE, and some of them not with the somewhat predictable functionality of Denial Of Service. It is time for everyone to wake up, and realize the worst scenario that could happen to him if he does not care enough about security issues. Therefore, this program is also designed to compile on a maximum number of various operating systems, to show that almost no modern operating system is specifically secure, including Windows, Solaris, most UNIX flavors and Linux. -Tribe FloodNet 2k Distributed Denial Of Se rvice Network Distributed denial of service tools source code for the English below : TFN can be seen as the most functional yet DoS att Ack tool with the best performance that is now al most impossible to detect. What is my point in re this leasing Let me assure you it isn t to harm peo ple or companies. It is, however, to scare the heck out of everyone who does not car e about systematically securing his system, because tools sophisticated as this one are out , currently being improved drastically. PRIVATE kept, and some of them not with the somewhat predictab le functionality of Denial Of Service. It is tim e for everyone to wake up. and realize the worst scenario that could Happe n to him if he does not care enough about security issues. There
Platform: | Size: 44032 | Author: onlyu | Hits:

[VC/MFCDigdemo

Description: As an alternate to the migration scenario, Microsoft offers some interoperation solutions (in an interoperation scenario, you don t try to turn the MFC code into .NET automatically, you just try to ensure that they can work together):-As an alternate to the migration scenario, Microsoft offers some interoperation solutions (in an interoperation scenario, you don t try to turn the MFC code into .NET automatically, you just try to ensure that they can work together):
Platform: | Size: 201728 | Author: Cooper Chen | Hits:

[Windows DevelopMFC_demo

Description: The MFC Windows Forms support classes allow the backwards integration of the .NET code in an MFC application. It lets you arrange .NET Forms as Views or Dialogs. There are some important limitations in this case: the .NET Framework cannot be integrated (the old MFC Framework has to be used), the part of the integrated Forms functionality is not available (for example, laying out), and a separate control can be integrated as a Form only (for example, the .NET MenuStrip cannot be used in the MFC Framework). I find that these kinds of interoperation solutions are pure alternates to the migration scenario, and I haven t found real examples of these solutions on the Internet.
Platform: | Size: 246784 | Author: Cooper Chen | Hits:

[Internet-Networkex-lan.tcl.tar

Description: LAN simulation script to show network topology and simulation scenario
Platform: | Size: 1024 | Author: babab | Hits:

[OtherUML

Description: Use cases may represent user goals, or user interactions for example, ScheduleMtg can be thought as a goal (there are many ways to schedule a meeting), but ValidateUser is probably not.  Use cases make sense for usable things, such as designed artifacts, including processes they don’t make sense for unusable things (e.g., the sky).  (Consequently) Use cases constitute a special-purpose modeling construct for software or other artifacts.  [The notion of scenario, as a typical course of actions or events, is probably more appropriate for a general purpose modeling language.]-Use cases may represent user goals, or user interactions for example, ScheduleMtg can be thought as a goal (there are many ways to schedule a meeting), but ValidateUser is probably not.  Use cases make sense for usable things, such as designed artifacts, including processes they don’t make sense for unusable things (e.g., the sky).  (Consequently) Use cases constitute a special-purpose modeling construct for software or other artifacts.  [The notion of scenario, as a typical course of actions or events, is probably more appropriate for a general purpose modeling language.]
Platform: | Size: 254976 | Author: odhank | Hits:

[OtherKalman_Filtering

Description: 卡尔曼滤波在目标跟踪中应用仿真研究。 子函数能完成对运动目标位置的卡尔曼滤波跟踪。 主函数针对一具体假设完成跟踪,并且完成蒙特卡罗仿真。 情景假定:有一两座标雷达对一平面上运动的目标进行观测,目标在 0-600秒沿x轴作恒速直线运动,运动速度为15米/秒,目标的起始点为(-10000米,2000米)。雷达扫描周期T=2秒,x和y独立地进行观测,观测噪声的标准差均为100米。-This program described the Kalman filter algorithm according to a given scenario, simulation achieved the target tracking observation data and Kalman filter results, and the experimental results is studied using the Monte Carlo simulation.
Platform: | Size: 2048 | Author: | Hits:

[RFIDNRF24l01_device

Description: The Nordic Semiconductor nRF24L01 is a transceiver chip operating in the 2.4GHz band. The following code is my first driver for Atmel ATMEGA8 and ATMEGA168. In my test scenario the ATMEGA168 and ATMEGA8 were connected different. The reason for this is that the ATMEGA168 supports Pin Change Interrupt which the ATMEGA8 doesn t.
Platform: | Size: 7168 | Author: sworddragon | Hits:

[Special Effectsclothes-CVPR12

Description: cvpr2012_oral Street-to-Shop: Cross-Scenario Clothing Retrieval via Parts Alignment and Auxiliary Set-In this paper, we address a practical problem of crossscenario clothing retrieval- given a daily human photo captured in general environment, e.g., on street, finding similar clothing in online shops, where the photos are captured more professionally and with clean background. There are large discrepancies between daily photo scenario and online shopping scenario. We first propose to alleviate the human pose discrepancy by locating 30 human parts detected by a well trained human detector. Then, founded on part features, we propose a two-step calculation to obtain more reliable one-to-many similarities between the query daily photo and online shopping photos: 1) the within-scenario one-to-many similarities between a query daily photo and the auxiliary set are derived by direct sparse reconstruction and 2) by a crossscenario many-to-many similarity transfer matrix inferred offline from an extra auxiliary set and the online shopping set, the reliable cross-scenario one-t
Platform: | Size: 1098752 | Author: 费炳超 | Hits:

[Data structsQ4.8

Description: // You are given a binary tree in which each node contains a value. Design a lgorithm to print all paths which sum up to that value. Note that it can be any path in the tree - it does not have to start at the root. // 给定一棵二叉树,每个结点包含一个值。打印出所有满足以下条件的路径: 路径上结点的值加起来等于给定的一个值。注意:这些路径不必从根结点开始。 方案1:如果结点中包含指向父亲结点的指针,那么,只需要去遍历这棵二叉树, 然后从每个结点开始,不断地去累加上它父亲结点的值直到父亲结点为空(这个具有唯一性, 因为每个结点都只有一个父亲结点。也正因为这个唯一性, 可以不另外开额外的空间来保存路径),如果等于给定的值sum,则打印输出。 方案2:如果结点中不包含指向父亲结点的指针,则在二叉树从上向下查找路径的过程中, 需要为每一次的路径保存中间结果,累加求和仍然是从下至上的,对应到保存路径的数组, 即是从数组的后面开始累加的,这样能保证遍历到每一条路径。 -// You are given a binary tree in which each node contains a value Design an algorithm to print all paths which sum up to that value Note that it can be any path in the tree-.. It does not have to start at the root // Given a binary tree, each node contains a value. Print out all the following conditions are met path: the path to the node values ​ ​ add up to a given value. Note: These paths do not have to start the root. Scenario 1: If the node contains a pointer pointing to the father node, then just go to traverse the binary tree, and then start each node to constantly tired, plus the value of its parent node until the father node empty (this is unique, because each node has only one parent node. It is because of this uniqueness, can not otherwise open additional space to store the path), if the value is equal to a given sum, the printout . Scenario 2: If the node does not contain a pointer pointing to the father node, then the binary search path down the process, t
Platform: | Size: 18432 | Author: nothing | Hits:

[matlabexample_channelEQ_Godard - 副本

Description: 信道均衡的MATLAB程例,是一个很好的例子,对于做通信信道仿真研究的就有较高的参考和使用价值。(In this example we have a typical channel equalization scenario. We want to estimate the transmitted sequence with 4-QAM symbols. In order to accomplish this task we use an adaptive filter with N coefficients The procedure is: 1) Apply the originally transmitted signal distorted by the channel plus environment noise as the input signal to an adaptive filter. In this case, the transmitted signal is a random sequence with 4-QAM symbols and unit variance. The channel is a multipath complex-valued channel whose impulse response is h = [1.1+j*0.5, 0.1-j*0.3, -0.2-j*0.1]^T In addition, the environment noise is AWGN with zero mean and variance 10^(-2.5). 2) Choose an adaptive filtering algorithm to govern the rules of coefficient updating.)
Platform: | Size: 1024 | Author: ZJL0110 | Hits:

CodeBus www.codebus.net