Client/Server application. This application was written using RMI Java. It resolve "access to critical section " example problem.
To use this program you should change in *.bat / *.sh files the java path according in your computer
FERRET - a broadcast analysis tool
This tool is designed to demonstrate the problem of "data seapage".
The average machine broadcasts a lot of information about itself
on open networks. This tool captures and organizes this information.
This code is extremely low quality, hacked together in order to
demonstrate the problem at the BlackHat Federal 2007 conference.
Higher quality code should be available around May 2007 on our
website at http://www.erratasec.com.
This book is intended as a thorough introduction to both PCI and PCI-X. Is as a “companion” to the specifications. If you’re designing boards or systems using offthe-shelf PCI interface silicon, this book together with the silicon vendor’s data sheets should be sufficient for your needs. On the other hand, if your goal is to design PCI silicon, motherboards or backplanes, you will undoubtedly need to reference the specifications for additional detail.
This book is for someone who wants to quickly master the basics of how to install, run, and
maintain Linux on an Intel-based personal computer. All of the tools you need are included.
Your computer should have a monitor, or display, keyboard, mouse, hard drive, floppy drive,
and CD-ROM drive. Although you can jump right in and install Linux onto your hard drive,
you should have some technical information about your computer and its hardware on hand
before you start.
Since the field of object oriented programming is probably new to you, you will find that there is a significant amount of new terminology for you to grasp. This is true of any new endeavor and you should be warned not to be intimidated by all of the new concepts.
Implementation of Edmonds Karp algorithm that calculates maxFlow of graph.
Input:
For each test case, the first line contains the number of vertices (n) and the number of arcs (m). Then, there exist m lines, one for each arc (source vertex, ending vertex and arc weight, separated by a space). The nodes are numbered from 1 to n. The node 1 and node n should be in different sets. There are no more than 30 arcs and 15 nodes. The arc weights vary between 1 and 1 000 000.
Output:
The output is a single line for each case, with the corresponding minimum size cut.
Example:
Input:
7 11
1 2 3
1 4 3
2 3 4
3 1 3
3 4 1
3 5 2
4 6 6
4 5 2
5 2 1
5 7 1
6 7 9
Output:
5
Its a project that i create.
The program its like an helpdesk, that allows the user to introduce requests and manage them.
The data is saved in .dat files and in .txt files.
The main file, the u should run is: n2006131015_Main
Insurance A Vehicle
Vehicle Insured In Accident
Vehicle Inspected Online fprms goto insurer
Claim Approved
Vehicle Repaired
Insurer Pays
All data should be saved to the data base
To use the MSSP port to communicate with 3-wire
devices, the bytes to be output must be aligned
such that the LSB of the address is the 8th bit
(LSB) of a byte to be output. From there, the
bits should fill the byte from right to left
consecutively.
Solving Problem inheritance by Prolog
The parents of Mark are Linda and Peter. The parents of Fiona are Linda and Peter. The parents of Andrea are Fiona and Andrew. The parents of John are Fiona and Andrew. The parents of Eileen are Andrea and Alan. The parents of Jane are Andrea and Alan.
Total Inheritance Everyone in my family, who holds a PhD should receive $100,000. Everyone in my family, receives $3,000 for every aunt they have who holds a PhD. Everyone in my family, receives $2,000 for every uncle they have who holds a PhD. Everyone in my family, receives $100 for every sibling holding a University degree.
Peter, Mark, and Fiona hold a PhD. Mark, Linda, and Andrea all hold a MSc. Andrew, John, Alan, Eileen hold a BSc. Jane holds a Tafe certificate.