亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

istributed Computing Principles

  • 通過 HP-UX 11i

    通過 HP-UX 11i,HP 提供了高可用性、高安全性的可管理操作系統,以滿足 端對端的 Internet 關鍵計算的需求。HP-UX 11i 支持 Enterprise、Mission-Critical 和 Technical computing 環境。在 PA-RISC 系統和基于 Intel Itanium 的系統 上均可使用 HP-UX 11i。

    標簽: HP-UX 11i

    上傳時間: 2014-08-06

    上傳用戶:xiaoyunyun

  • Software given here is to accompany the textbook: W.H. Tranter, % K.S. Shanmugan, T.S. Rappaport,

    Software given here is to accompany the textbook: W.H. Tranter, % K.S. Shanmugan, T.S. Rappaport, and K.S. Kosbar, Principles of % Communication Systems Simulation with Wireless Applications, % Prentice Hall PTR, 2004.

    標簽: K.S. W.H. T.S. Shanmugan

    上傳時間: 2016-06-12

    上傳用戶:shanml

  • This white paper describes a collection of standards, conventions, and guidelines for writing solid

    This white paper describes a collection of standards, conventions, and guidelines for writing solid Java code. They are based on sound, proven software engineering principles that lead to code that is easy to understand, to maintain, and to enhance.

    標簽: conventions collection guidelines describes

    上傳時間: 2014-12-08

    上傳用戶:hakim

  • 多年來

    多年來,我一直想錄找一本適合中國計算機系學生用的算法方面的國外教材。盡管有些不錯的國外教材在中國出版,但總有篇幅過多、內容略顯陳舊或數據結構內容夾雜其中等等這樣或那樣的不甚滿意之處。 去年我有幸看到世界科學圖書出版社出版的由M.H.Alsuwaiyel撰寫的《Algorithms Design Techniques and Analysis》,它是以國際著名算法專家,我國臺灣出身的李德財教授所主編的系列叢書——Lecture Notes Series on Computing——中的一本。雖然此書不是美國的大學教材,而是沙特阿拉伯的大學計算機系教材。但是我很快就被該書的組織簡明、概括,且包含當前市面上算法一#較少涉及的概率算法和近似算法

    標簽:

    上傳時間: 2013-12-24

    上傳用戶:lhc9102

  • This methodical text aspires to present various information relevant to operating systems, computer

    This methodical text aspires to present various information relevant to operating systems, computer architecture, compilers, principles of programming languages, and C and C++ programming, specifically.

    標簽: information methodical operating computer

    上傳時間: 2016-10-09

    上傳用戶:leixinzhuo

  • This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s

    This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s i ntended as a simple guide to logistics i n NATO. It does not attempt to examine current i ssues or provide answers to the problems that logisticians will face, but i t rather aims at i ntroducing them to some of the basic principles, policies, concepts and organisations with which they will work.

    標簽: Logisticians Conference published the

    上傳時間: 2014-12-07

    上傳用戶:www240697738

  • With a worldwide community of users and more than a million dedicated programmers, Perl has proven t

    With a worldwide community of users and more than a million dedicated programmers, Perl has proven to be the most effective language for the latest trends in computing and business. Every programmer must keep up with the latest tools and techniques. This updated version of Advanced Perl Programming from O Reilly gives you the essential knowledge of the modern Perl programmer. Whatever your current level of Perl expertise, this book will help you push your skills to the next level and become a more accomplished programmer.

    標簽: programmers worldwide community dedicated

    上傳時間: 2014-01-16

    上傳用戶:磊子226

  • 網格agent平臺(GAP ,Grid AgentsPlatform)開發包

    網格agent平臺(GAP ,Grid AgentsPlatform)開發包,建造和模擬網格環境下的移動agent.類似JADE(Java Agent DEvelopment Framework).此平臺建立在Gridsim基礎上,可編程實現模擬Computing Elements, Storage Elements, Virtual Organisations, 等

    標簽: AgentsPlatform agent Grid GAP

    上傳時間: 2013-12-09

    上傳用戶:gundan

  • 15篇光流配準經典文獻

    15篇光流配準經典文獻,目錄如下: 1、A Local Approach for Robust Optical Flow Estimation under Varying 2、A New Method for Computing Optical Flow 3、Accuracy vs. Efficiency Trade-offs in Optical Flow Algorithms 4、all about direct methods 5、An Introduction to OpenCV and Optical Flow 6、Bayesian Real-time Optical Flow 7、Color Optical Flow 8、Computation of Smooth Optical Flow in a Feedback Connected Analog Network 9、Computing optical flow with physical models of brightness Variation 10、Dense estimation and object-based segmentation of the optical flow with robust techniques 11、Example Goal Standard methods Our solution Optical flow under 12、Exploiting Discontinuities in Optical Flow 13、Optical flow for Validating Medical Image Registration 14、Tutorial Computing 2D and 3D Optical Flow.pdf 15、The computation of optical flow

    標簽: 光流

    上傳時間: 2014-11-21

    上傳用戶:fanboynet

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    標簽: vulnerabilities Introduction discovered undeniably

    上傳時間: 2014-01-05

    上傳用戶:yph853211

主站蜘蛛池模板: 湘潭市| 斗六市| 驻马店市| 安塞县| 凤山县| 蒲江县| 福泉市| 丰城市| 神木县| 潮州市| 松潘县| 普洱| 邛崃市| 凯里市| 威远县| 长汀县| 兴安盟| 安塞县| 武夷山市| 永康市| 那曲县| 康保县| 平邑县| 普定县| 龙陵县| 兴安盟| 和政县| 洛浦县| 泾阳县| 千阳县| 新化县| 西峡县| 兴义市| 庆元县| 佳木斯市| 尼勒克县| 贵德县| 攀枝花市| 宿迁市| 阿克陶县| 桐梓县|