The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some nodes of a complete binary tree of height h (the code tree) to n simultaneous connections, such that no two assigned nodes (codes) are on the same root-to-leaf path. Each connection requires a code on a specified level. The code can change over time as long as it is still on the same level. We consider the one-step code assignment problem: Given an assignment, move the minimum number of codes to serve a new request. Minn and Siu proposed the so-called DCAalgorithm to solve the problem optimally. We show that DCA does not always return an optimal solution, and that the problem is NP-hard. We give an exact nO(h)-time algorithm, and a polynomial time greedy algorithm that achieves approximation ratio Θ(h). Finally, we consider the online code assignment problem for which we derive several results
標簽: combinatorial assignment problem arises
上傳時間: 2014-01-19
上傳用戶:BIBI
This book explains how to write device drivers for the newest members of the MicrosoftWindows family of operating systems using the Windows Driver Model (WDM). In this Introduction, I ll explain who should be reading this book, the organization of the book, and how to use the book most effectively. You ll also find a note on errors and a section on other resources you can use to learn about driver programming. Looking ahead, Chapter 1 explains how the two main branches of the Windows family operate internally, what a WDM device driver is, and how it relates to the rest of Windows.
標簽: MicrosoftWindows the explains drivers
上傳時間: 2014-01-04
上傳用戶:dongqiangqiang
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/
標簽: open-source encryption Features software
上傳時間: 2013-12-20
上傳用戶:123啊
These are P-Channel enhancement mode silicon gate power fi eld effect transistors. They are advanced power MOSFETs designed, tested, and guaranteed to withstand a specifi ed level of energy in the breakdown avalanche mode of operation. All of these power MOSFETs are designed for applications such as switching regulators, switching converters, motor drivers, relay drivers and drivers for other high-power switching devices. The high input impedance allows these types to be operated directly from integrated circuits.
標簽: enhancement transistors P-Channel are
上傳時間: 2017-02-17
上傳用戶:aeiouetla
a MATLAB program which tries to correct situations in which a triangulation includes corner triangles, that is, triangles which have two sides on boundary
標簽: which triangulation situations includes
上傳時間: 2014-01-23
上傳用戶:cursor
IEC 62056 的很有價值的參考文檔,包括: DLMS UA 1000-1 ed.8, Blue book, COSEM Identification System and Interface Classes DLMS UA 1000-2 ed.6, Green book, DLMS/COSEM Architecture and Protocols DLMS UA 1001-1 ed.3,Yellow book, DLMS/COSEM Conformance Testing Proce
上傳時間: 2017-02-18
上傳用戶:小眼睛LSL
To review what a metaball is, and how to render them and to describe a new optimization I ve made for rendering metaballs. For complex scenes, it can render hundreds of times faster, though I m certain others have discovered this trick as well. It does very slightly change the characteristic shape of the blobs, but there is no loss in image quality whatsoever. (I actually developed all this about two years ago, but just now felt like writing it all down, and had the time!)
標簽: optimization and metaball describe
上傳時間: 2013-12-27
上傳用戶:彭玖華
The basic principle using the branchand- bound strategy to solve the traveling salesperson optimization problem (TSP) consists of two parts. There is a way to split the solution space. There is a way to predict a lower bound for a class of solutions. There is also a way to find an upper bound of an optimal solution. If the lower bound of a solution exceeds this upper bound, this solution cannot be optimal. Thus, we should terminate the branching associated with this solution.
標簽: salesperson principle branchand the
上傳時間: 2017-02-19
上傳用戶:comua
The C++ Editor is a text editor for C++ programmers. The editor have color syntax highlighting. Editor s main purpose is to edit source code files outside the IDE (Integrated Development Environment) with multiple opened copies of program, when programmer needs to find, replace or compare source code. The program can compile the file using for this purpose the Microsoft VC compiler. Most effectively the editor can be used with a file search utility. The search utility Search&Edit or IDE Helper is available for download on developer s WEB site (http://www.easydevtools.com/dwnl_frame.htm).
標簽: editor highlighting programmers The
上傳時間: 2013-12-09
上傳用戶:x4587
調試通道例子。DCC is available on ARM cores which contain EmbeddedICE logic, e.g. ARM7TDMI, ARM9TDMI, etc. DCC is accessed by the target via coprocessor 14 using the ARM instructions MCR and MRC. The two assembler source files provided are: outchan.s for Target to debugger communication inchan.s for Debugger to target communication
標簽: ARM e.g. TDMI EmbeddedICE
上傳時間: 2013-12-21
上傳用戶:liuchee