通過 HP-UX 11i,HP 提供了高可用性、高安全性的可管理操作系統,以滿足 端對端的 Internet 關鍵計算的需求。HP-UX 11i 支持 Enterprise、Mission-Critical 和 Technical computing 環境。在 PA-RISC 系統和基于 Intel Itanium 的系統 上均可使用 HP-UX 11i。
上傳時間: 2014-08-06
上傳用戶:xiaoyunyun
Software given here is to accompany the textbook: W.H. Tranter, % K.S. Shanmugan, T.S. Rappaport, and K.S. Kosbar, Principles of % Communication Systems Simulation with Wireless Applications, % Prentice Hall PTR, 2004.
上傳時間: 2016-06-12
上傳用戶:shanml
This white paper describes a collection of standards, conventions, and guidelines for writing solid Java code. They are based on sound, proven software engineering principles that lead to code that is easy to understand, to maintain, and to enhance.
標簽: conventions collection guidelines describes
上傳時間: 2014-12-08
上傳用戶:hakim
多年來,我一直想錄找一本適合中國計算機系學生用的算法方面的國外教材。盡管有些不錯的國外教材在中國出版,但總有篇幅過多、內容略顯陳舊或數據結構內容夾雜其中等等這樣或那樣的不甚滿意之處。 去年我有幸看到世界科學圖書出版社出版的由M.H.Alsuwaiyel撰寫的《Algorithms Design Techniques and Analysis》,它是以國際著名算法專家,我國臺灣出身的李德財教授所主編的系列叢書——Lecture Notes Series on Computing——中的一本。雖然此書不是美國的大學教材,而是沙特阿拉伯的大學計算機系教材。但是我很快就被該書的組織簡明、概括,且包含當前市面上算法一#較少涉及的概率算法和近似算法
標簽:
上傳時間: 2013-12-24
上傳用戶:lhc9102
This methodical text aspires to present various information relevant to operating systems, computer architecture, compilers, principles of programming languages, and C and C++ programming, specifically.
標簽: information methodical operating computer
上傳時間: 2016-10-09
上傳用戶:leixinzhuo
This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s i ntended as a simple guide to logistics i n NATO. It does not attempt to examine current i ssues or provide answers to the problems that logisticians will face, but i t rather aims at i ntroducing them to some of the basic principles, policies, concepts and organisations with which they will work.
標簽: Logisticians Conference published the
上傳時間: 2014-12-07
上傳用戶:www240697738
With a worldwide community of users and more than a million dedicated programmers, Perl has proven to be the most effective language for the latest trends in computing and business. Every programmer must keep up with the latest tools and techniques. This updated version of Advanced Perl Programming from O Reilly gives you the essential knowledge of the modern Perl programmer. Whatever your current level of Perl expertise, this book will help you push your skills to the next level and become a more accomplished programmer.
標簽: programmers worldwide community dedicated
上傳時間: 2014-01-16
上傳用戶:磊子226
網格agent平臺(GAP ,Grid AgentsPlatform)開發包,建造和模擬網格環境下的移動agent.類似JADE(Java Agent DEvelopment Framework).此平臺建立在Gridsim基礎上,可編程實現模擬Computing Elements, Storage Elements, Virtual Organisations, 等
標簽: AgentsPlatform agent Grid GAP
上傳時間: 2013-12-09
上傳用戶:gundan
15篇光流配準經典文獻,目錄如下: 1、A Local Approach for Robust Optical Flow Estimation under Varying 2、A New Method for Computing Optical Flow 3、Accuracy vs. Efficiency Trade-offs in Optical Flow Algorithms 4、all about direct methods 5、An Introduction to OpenCV and Optical Flow 6、Bayesian Real-time Optical Flow 7、Color Optical Flow 8、Computation of Smooth Optical Flow in a Feedback Connected Analog Network 9、Computing optical flow with physical models of brightness Variation 10、Dense estimation and object-based segmentation of the optical flow with robust techniques 11、Example Goal Standard methods Our solution Optical flow under 12、Exploiting Discontinuities in Optical Flow 13、Optical flow for Validating Medical Image Registration 14、Tutorial Computing 2D and 3D Optical Flow.pdf 15、The computation of optical flow
標簽: 光流
上傳時間: 2014-11-21
上傳用戶:fanboynet
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
標簽: vulnerabilities Introduction discovered undeniably
上傳時間: 2014-01-05
上傳用戶:yph853211