搜索结果: 1-15 共查到“工学 k code”相关记录82条 . 查询时间(0.062 秒)
清华大学殷柳国教授来中北大学信息与通信工程学院作“Generalized Sparse Codes for Non-Gaussian Channels: Code Design,Algorithms, and Applications”专题报告(图)
清华大学 殷柳国 中北大学信息与通信工程学院 广义随机编码 抗干扰 通信编码
2022/11/24
Browser tool aims to help researchers ID malicious websites,code(图)
Browser tool esearchers ID malicious websites code
2019/11/15
Researchers at North Carolina State University have developed an open-source tool that allows users to track and record the behavior of JavaScript programs without alerting the websites that run those...
FOSTERING PRE-UNIVERSITY STUDENT PARTICIPATION IN OSGEO THROUGH THE GOOGLE CODE-IN COMPETITION
Education Outreach Pre-university students Open Source
2018/11/8
The Open Source Geospatial Foundation’s (OSGeo) vision is to empower everyone, from pre-university students to professionals, with open source geospatial applications, tools and resources. In 2017, OS...
VECTOR AND RASTER DATA STORAGE BASED ON MORTON CODE
Vector and raster Integration Morton code Data storage Georaster
2018/5/17
Even though geomatique is so developed nowadays, the integration of spatial data in vector and raster formats is still a very tricky problem in geographic information system environment. And there is ...
Researchers find computer code that Volkswagen used to cheat emissions tests
Researchers computer code Volkswagen cheat emissions tests
2017/7/20
An international team of researchers has uncovered the mechanism that allowed Volkswagen to circumvent U.S. and European emission tests over at least six years before the Environmental Protection Agen...
美国时间2016年11月17日,国际无线标准化机构3GPP的RAN1(无线物理层)87次会议在美国拉斯维加斯召开,就5G短码方案进行讨论。中国华为公司领衔提出的PolarCode(极化码)方案,最终战胜美国团队和法国团队,成为5G控制信道eMBB场景编码最终方案。
New software continuously scrambles code to foil cyber attacks
New software continuously scrambles code foil cyber attacks
2016/11/29
As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carry...
It’s not exactly beating something into someone’s head. More like tapping it into the side.Researchers at the Georgia Institute of Technology have developed a system that teaches people Morse code wit...
STRUCTURED LIGHT BASED 3D SCANNING FOR SPECULAR SURFACE BY THE COMBINATION OF GRAY CODE AND PHASE SHIFTING
Structured Light 3D Scanning Specular Surface Maximum Min-SW Gray Code Phase Shifting
2016/7/27
Surface reconstruction using coded structured light is considered one of the most reliable techniques for high-quality 3D scanning. With a calibrated projector-camera stereo system, a light pattern is...
We describe techniques for analyzing data polymorphism in C, and show that understanding data polymorphism is important for statically verifying type casts in the Linux kernel, where our techniques pr...
Authoring Multi-Stage Code Examples with Editable Code Histories
Examples tutorials programming editable histories
2016/5/24
Multi-stage code examples present multiple versions of a program
where each stage increases the overall complexity of the
code. In order to acquire strategies of program construction
using a new la...
DEVELOPMENT OF AN INVERSION CODE, ICARE, ABLE TO EXTRACT URBAN AREAS GROUND REFLECTANCES
Urban area hyperspectral reflectance
2015/9/8
Automatic mapping of urban materials from remotely sensed radiance images remains difficult because of the complex physical
phenomena induced by relief. Indeed, shadows and environment effects disrup...
Automatic code generation for real-time convex optimization
Convex optimization embedded systems signal processing automatic control data
2015/8/7
This chapter concerns the use of convex optimization in real-time embedded systems, in areas such as signal processing, automatic control, real-time estimation, real-time resource allocation and decis...