亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Network

  • The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesi

    The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesian Network for discrete variables in which the conditional probability tables are specified by logistic regression models. Logistic regression can be used to incorporate restrictions on the conditional probabilities and to account for the effect of covariates. Nominal variables are modeled with multinomial logistic regression, whereas the category probabilities of ordered variables are modeled through a cumulative or adjacent-categories response function. Variables can be observed, partially observed, or hidden.

    標簽: estimating parameters functions defining

    上傳時間: 2014-12-05

    上傳用戶:天誠24

  • java聯網斗地主源代碼 這是紙牌游戲斗地主,算法完整,可以單機,網絡連線玩.-This is the card game that point, the algorithm integrity,

    java聯網斗地主源代碼 這是紙牌游戲斗地主,算法完整,可以單機,網絡連線玩.-This is the card game that point, the algorithm integrity, a stand-alone, playing to connect to the Network.

    標簽: algorithm integrity the point

    上傳時間: 2013-12-22

    上傳用戶:aig85

  • Java technology is both a programming language and a platform. The Java programming language origina

    Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of Network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, Network-based end-user applications in environments ranging from Network-embedded devices to the World-Wide Web and the desktop

    標簽: programming language Java technology

    上傳時間: 2014-01-03

    上傳用戶:huangld

  • simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiri

    simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiries, deposits, withdrawals and alter the code. Simulation of ATM terminal users logged in, their account numbers and passwords through the ATM Network to transmit to the server, ATM database server based on the information to confirm the account number and password is correct, the results back to the ATM terminal. If the correct account number and password, the ATM into the next terminal interface Otherwise prompt mistakes. Cancellation notice for the operation of the server ATM transactions concluded inquiries, deposits, withdrawals and alter the code operations are first sent an order to ATM servers, ATM by the database server implementation of the corresponding operation and operating res

    標簽: write-offs Automatic functions including

    上傳時間: 2014-01-20

    上傳用戶:semi1981

  • This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wirele

    This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wireless sensor Network we have used.It is developed with MatLab7

    標簽: Clustering Hierarchy Adaptive protocol

    上傳時間: 2013-12-09

    上傳用戶:362279997

  • this is word doccoment created on TFTP protocl i.e. Trivial File Transfer Protocol.this is the proto

    this is word doccoment created on TFTP protocl i.e. Trivial File Transfer Protocol.this is the protocol used to transfer the files over the Network.

    標簽: i.e. this doccoment Protocol

    上傳時間: 2017-03-21

    上傳用戶:fhzm5658

  • 在網絡安全中經常會遇到rootkit

    在網絡安全中經常會遇到rootkit,NSA安全和入侵檢測術語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the Network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    標簽: rootkit 網絡安全

    上傳時間: 2017-04-04

    上傳用戶:xaijhqx

  • Documentation for VxVorks 5.5. OS Libraries API Reference, Driver API Reference, BSP Developers Guid

    Documentation for VxVorks 5.5. OS Libraries API Reference, Driver API Reference, BSP Developers Guide, Network Programmers Guide, Architecture Supplement for 68K, ARM, Coldfire, Hitachi, Xscale, MIPS, Pentium and PowerPC, Programmers Guide and more.

    標簽: Reference Documentation Developers API

    上傳時間: 2014-01-05

    上傳用戶:水口鴻勝電器

  • ICC means Internet Communication Component,it has many classes and frameworks that help develop netw

    ICC means Internet Communication Component,it has many classes and frameworks that help develop Network and communication system.

    標簽: Communication frameworks Component Internet

    上傳時間: 2014-03-06

    上傳用戶:hfmm633

  • Java has become a confusing world. Five years ago, there were few decisions to make once you start

    Java has become a confusing world. Five years ago, there were few decisions to make once you started programming in Java—you used AWT for graphical user interfaces, sockets for Network programming, and hacked together everything else you needed. Since then, though, the APIs available for the Java language have grown, and grown. . . and grown. Now you can dabble in Swing, servlets, Enterprise JavaBeans (EJB), JavaMail, and more. Additionally, there are now packages of APIs, like the Java 2 Micro Edition (J2ME) and Java 2 Enterprise Edition (J2EE). While these packages seem to be nicely wrapped bundles of useful APIs, they don t help the average developer figure out how to piece together the APIs contained in these packages. Though it s simple to find documentation on the individual APIs, getting the "big picture" is difficult, at best. One of the most interesting, but difficult, aspects of Java today is building Java enterprise applications using the J2EE package.

    標簽: confusing decisions become world

    上傳時間: 2013-12-30

    上傳用戶:haoxiyizhong

主站蜘蛛池模板: 莲花县| 贵南县| 贵定县| 疏勒县| 股票| 开鲁县| 大荔县| 五莲县| 张家港市| 普定县| 乡城县| 黄石市| 湘西| 新干县| 厦门市| 措美县| 金沙县| 牟定县| 离岛区| 泰安市| 宾阳县| 清远市| 紫阳县| 大埔区| 夏津县| 永靖县| 房产| 句容市| 德清县| 彭山县| 文山县| 朝阳县| 太仆寺旗| 大名县| 乌鲁木齐市| 铜陵市| 泽普县| 双鸭山市| 新邵县| 仁寿县| 蓝田县|