点击切换搜索课件文库搜索结果(561)
文档格式:PDF 文档大小:715KB 文档页数:51
上海交通大学:《供应链管理 Supply Chain Management》课程教学资源(讲义资料)LectureNote(UnderG)03_Logistics Network Configuration(2013Fall with script)
文档格式:PDF 文档大小:2.64MB 文档页数:34
上海交通大学:《物流地理学 Geography of Logistics》课程教学资源(教学资料)1 THE WORLDWIDE MARITIME NETWORK OF CONTAINER SHIPPING:SPATIAL STRUCTURE AND REGIONAL DYNAMICS
文档格式:PDF 文档大小:1.13MB 文档页数:12
上海交通大学:《物流地理学 Geography of Logistics》课程教学资源(教学资料)The complex network of global cargo ship movements
文档格式:PDF 文档大小:4.79MB 文档页数:40
III. DNA-Binding Proteins and Regulation of Transcription by Negative and Positive Control (Transcriptional level regulation) DNA结合蛋白与转录水平的调控 8.5 Negative control of transcription: Repression and Induction转录的负调控 8.6 Positive Control of Transcription ----Activator mediated regulation by protein-DNA binding IV. Global Regulation Mechanisms 8.7 Catabolite Repression ----Global control and the lac operon代谢分解物抑制 8.8 Other global control network 8.9 Quorum Sensing 群体感应
文档格式:PDF 文档大小:4.37MB 文档页数:73
Basic Principles in Computer Architecture Multiprocessor, many-core Design Power-aware CPU Design Scheduling Techniques GPU-related Techniques Datacenter-related Techniques Neural Network Chips Design of TianHe Supercomputer
文档格式:PDF 文档大小:360.89KB 文档页数:65
1 Asynchronous I/O Latency Asynchronous I/O interfaces Message queues 2 I/O optimizations Optimizing network transfers Optimizing local transfers 3 Influence of data structures on I/O Measuring I/O efficiency of algorithms 4 Caching Principles Policies Distributed Caches 5 Conclusion
文档格式:PPT 文档大小:283KB 文档页数:44
The Role of Transportation Factors Affecting Transportation Decision Transportation Mode Design Options for Transportation Network Trade-off in Transportation Design
文档格式:PPT 文档大小:187KB 文档页数:21
Network and System Security Risk Assessment(PPT讲稿)Introduction
文档格式:PDF 文档大小:52.98MB 文档页数:1061
Chapter 0. Reader's Guide Chapter 2. Classical Encryption Techniques Chapter 3. Block Ciphers and the Data Encryption Standard Chapter 4. Finite Fields Chapter 5. Advanced Encryption Standard Chapter 6. More on Symmetric Ciphers Chapter 7. Confidentiality Using Symmetric Encryption Chapter 8. Introduction to Number Theory Chapter 9. Public-Key Cryptography and RSA Chapter 10. Key Management; Other Public-Key Cryptosystems Chapter 11. Message Authentication and Hash Functions Chapter 12. Hash and MAC Algorithms Chapter 13. Digital Signatures and Authentication Protocols Chapter 14. Authentication Applications Chapter 15. Electronic Mail Security Chapter 16. IP Security Chapter 17. Web Security Chapter 18. Intruders Chapter 19. Malicious Software Chapter 20. Firewalls
文档格式:PDF 文档大小:4.64MB 文档页数:38
中国科学技术大学:《网络安全协议》课程教学资源(专利或标准草案)Binding registration method, data forwarding method, related device, and network system(US10257802B2)
首页上页1415161718192021下页末页
热门关键字
搜索一下,找到相关课件或文库资源 561 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有