• Common Gateway Interface (CGI) - стандарт интерфейса (связи) внешней прикладной программы с информационным сервером типа HTTP, Web сервер. Передача данных об информационном запросе от сервера к шлюзу. Вывод информации шлюзом. Содержание запроса и ответа.

    контрольная работа (34,9 K)
  • Development of classification method, graphic and text area of the image. Building a narrative function that characterizes the size of objects in the picture. Consideration the classification of text and graphic regions on a fragment of document image.

    статья (427,0 K)
  • Classification method of graphic and text area of the image. The principles and stages of construction of the narrative function characterizing the sizes of objects in the image, can be used for training and classification using support vector machines.

    статья (427,0 K)
  • Модель выполнения кода в среде CLR. Развертывание и администрирование приложений и типов. Совместно используемые сборки и сборки со строгим именем. Проектирование примитивных, ссылочных и значимых типов. Асинхронные вычислительные операции в программе.

    книга (5,8 M)
  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    учебное пособие (1,8 M)
  • Silicon Valley - home to many of the world's largest technology corporations as well as thousands of small startups. Zhongguancun as a technology hub in Haidian District, Beijing, China. Features of notable education and research centers in the USA.

    доклад (11,5 K)
  • Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.

    статья (171,8 K)
  • Application an extension of the well-known Abadi-Rogaway logic with hashes. Description extends Micciancio and Warinschi's completeness result for the original logic to this setting, interpretation of this extension using Canetti's oracle hashing.

    статья (182,3 K)
  • Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.

    дипломная работа (4,3 M)
  • Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.

    книга (7,0 M)
  • The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

    статья (313,3 K)
  • Disclosure mechanisms that will help to identify lines with Romanian chromatic words on the basis of computer technology, as the first stage in developing the dictionary of poetic meanings of colors. Cooperation of linguists and computer specialists.

    статья (192,7 K)
  • Develop a mechanism that identifies the line with Romanian chromatic words on the basis of computer technologies. The first phase of development of the dictionary meanings of poetic colors. Cooperation of linguists and specialists in informatics.

    статья (192,7 K)
  • The computer based mechanism which lead to the identification of lines with Romanian chromatic words as the first step in the process of elaboration of a dictionary of poetic meanings of colors. The cooperation of specialists from different fields such.

    статья (194,4 K)
  • Internet multimedia: media element such as sound, animation and video. File transfers: downloading (process of transferring the file from remote computer to your computer) and uploading (sending a copy of files from your computer to remote computer).

    лекция (1,5 M)
  • One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.

    статья (198,2 K)
  • Понятие компьютерной графики как раздела информатики, занимающегося проблемами создания и обработки на компьютере изображений. Основные виды графики: растровая, векторная и фрактальная. Краткая история программы CorelDraw и ее технологические возможности.

    контрольная работа (389,2 K)
  • Основное назначение CorelDRAW. Этапы построения преобразования перспективы, ее добавление к объекту и инструменты, необходимые для осуществления данных операций. Приемы в CorelDRAW: добавление и настройка фаски, заливка, подсветка тела экструзии.

    контрольная работа (1,2 M)
  • Система взаимоотношения с клиентами как эффективный инструмент развития бизнеса. Прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками. Классификации CRM-систем и их возможности.

    реферат (1,6 M)
  • Random generators for cryptographic applications. Evaluation criteria for the principle design. Multiplication in binary extension fields. Time simulations and spectral algorithms. Limits on the maximum clock frequency of pipelined architectures.

    учебное пособие (9,3 M)