搜索资源列表
adaptive-signal-arithmetic
- Some algorithms of variable step size LMS adaptive filtering are studied.The VS—LMS algorithm is improved. Another new non-linear function between肛and e(/ t)is established.The theoretic analysis and computer simulati
Network_Security
- Detecting Network Intrusions via Sampling_A Game Theoretic Approach Internet Quarantine_Requirements for Containing Self-Propagating Code Modeling Malware Spreading Dynamics Modeling the Spread of Active Worm
adaptive-signal-arithmetic
- Some algorithms of variable step size LMS adaptive filtering are studied.The VS—LMS algorithm is improved. Another new non-linear function between肛and e(/ t)is established.The theoretic analysis and computer simulati
Network_Security
- Detecting Network Intrusions via Sampling_A Game Theoretic Approach Internet Quarantine_Requirements for Containing Self-Propagating Code Modeling Malware Spreading Dynamics Modeling the Spread of Active Worm
ei2002_stego.ps
- Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unaut
AnalgorithmSTFPDAforManeuveringTargetTracking
- 一种实现机动目标跟踪的STF动态模型PDA算法 我存的一篇论文,拿来与大家共享-An algorithmSTF-PDAhas been presented based on the strongtracking filterwith dynamicallymodifying structure of model.The performance of probability data association (PDA) can b
2297.full
- document about information theoretic learning
book
- An ebook on information theoretic learning using neural networks
segmentation
- This paper provides an algorithm for partitioning grayscale images into disjoint regions of coherent brightness and texture. Natural images contain both textured and untextured regions, so the cues of contour and tex
FromWeaktoStrongWatermarking
- From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark withou
mathematicalstatistics
- "This graduate textbook covers topics in statistical theory essential for graduate students preparing for work on a Ph.D. degree in statistics. The first chapter provides concepts and results in measure-theoretic probabi
AGame-TheoreticAnalysisofDecode-and-ForwardUserCoo
- 博弈论在协作通信中的应用,采用解码前传协作方式,典型的囚徒困境,用重复博弈来促成协作,分瑞利和高斯信道两种情况讨论。-a game-theoretic analysis of decode-and-forward user cooperation
5
- Information theoretic criterion-based spectrum sensing for cognitive radio
INFORMATION_THEORETIC_LEARNING
- 模式识别方面的文章,基于瑞利熵的机器学习方法,以及应用举例,建议做MMI的同志学习。-Pattern Recognition in the article, based on Rayleigh entropy machine learning methods, and application examples, it is recommended to do MMI comrades to learn.
113
- 无线网络信息理论安全研究,是研究信息理论安全课题的经典资料-Wireless Information-Theoretic Security.pdf
Game-theoretic-approach-in-routing-protocol-for-w
- 2009, Game theoretic approach in routing protocol for wireless ad hoc networks
A-Game-Theoretic-Approach-to-Spectrum-2012
- IEEE A Game Theoretic Approach to Spectrum Management in Cognitive Radio Network 2012
graph-theoretic-algorithm
- 关于图论算法的各种问题的matlab代码-Various questions about the graph theoretic algorithm of matlab code
information-theoretic-learning
- 国外信息论大牛Jose C. Principe最新出版,关于信息论的最新方法介绍-the recently publishment of information theoretic learn by Jose C. Principe
information-theoretic-learning
- 国内信息论经典李梅李亦农随书课件教案,内容丰富充实-information theoretic learning