亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

systems-Keyword

  • This handbook presents a thorough overview in 45 chapters from more than 100 renowned experts in the

    This handbook presents a thorough overview in 45 chapters from more than 100 renowned experts in the field. It provides the tools to help overcome the problems of video storage, cataloging, and retrieval, by exploring content standardization and other content classification and analysis methods. The challenge of these complex problems make this book a must-have for video database practitioners in the fields of image and video processing, computer vision, multimedia systems, data mining, and many other diverse disciplines. Topics include video segmentation and summarization, archiving and retrieval, and modeling and representation.

    標簽: handbook chapters presents overview

    上傳時間: 2013-12-15

    上傳用戶:yuzsu

  • Pipeline synchronization is a simple, low-cost, highbandwidth,highreliability solution to interfaces

    Pipeline synchronization is a simple, low-cost, highbandwidth,highreliability solution to interfaces between synchronous and asynchronous systems, or between synchronous systems operating from different clocks.

    標簽: synchronization highreliability highbandwidth interfaces

    上傳時間: 2014-12-05

    上傳用戶:l254587896

  • This paper presents several low-latency mixed-timing FIFO (first-in–first-out) interfaces designs t

    This paper presents several low-latency mixed-timing FIFO (first-in–first-out) interfaces designs that interface systems on a chip working at different speeds. The connected systems can be either synchronous or asynchronous. The designs are then adapted to work between systems with very long interconnect delays, by migrating a single-clock solution by Carloni et al. (1999, 2000, and 2001) (for “latency-insensitive” protocols) to mixed-timing domains. The new designs can be made arbitrarily robust with regard to metastability and interface operating speeds. Initial simulations for both latency and throughput are promising.

    標簽: mixed-timing low-latency interfaces first-out

    上傳時間: 2015-10-08

    上傳用戶:dapangxie

  • 1、對于凱撒密文

    1、對于凱撒密文,實現了:1種盲目式搜索,4種啟發式搜索,以及利用密鑰實現的凱撒加密系統。 2、對于代入法密文,實現了:2種啟發式搜索,1種利用密鑰的代入法加密系統以及隨機生成密鑰的代入法加密系統。 3、字典工具,實現了對詞庫的增加,刪除,檢查等一系列的操作。 4、7種其他較為經典的加密方法的加密解密工具。包括:DES、Vigenere、IDEA、Keyword、LFSR、Playfair以及RC4等。

    標簽:

    上傳時間: 2014-01-06

    上傳用戶:chenxichenyue

  • This book describes the following communications applications: Mail, Message Handler( MH), Transmiss

    This book describes the following communications applications: Mail, Message Handler( MH), Transmission ControlProtocol/ Internet Protocol(TCP/ IP), Basic Networking Utilities( BNU), and Asynchronous Terminal Emulation( ATE). It provides overviews, concepts, and procedures on receiving and sending mail and messages, transferring files( ftp command), printing files from and to a remote system, running commands on other systems, communicating between local and remote systems, and customizing the communications environment.

    標簽: communications applications Transmiss describes

    上傳時間: 2013-12-18

    上傳用戶:woshini123456

  • A general technique for the recovery of signi cant image features is presented. The technique is ba

    A general technique for the recovery of signi cant image features is presented. The technique is based on the mean shift algorithm, a simple nonparametric pro- cedure for estimating density gradients. Drawbacks of the current methods (including robust clustering) are avoided. Feature space of any nature can be processed, and as an example, color image segmentation is dis- cussed. The segmentation is completely autonomous, only its class is chosen by the user. Thus, the same program can produce a high quality edge image, or pro- vide, by extracting all the signi cant colors, a prepro- cessor for content-based query systems. A 512  512 color image is analyzed in less than 10 seconds on a standard workstation. Gray level images are handled as color images having only the lightness coordinate

    標簽: technique presented features recovery

    上傳時間: 2015-10-14

    上傳用戶:410805624

  • Scalable Wavelet Coding for Synthetic/Natural Hybrid Images IEEE Transactions on Circuits and System

    Scalable Wavelet Coding for Synthetic/Natural Hybrid Images IEEE Transactions on Circuits and Systems for Video Technology

    標簽: Transactions Synthetic Scalable Circuits

    上傳時間: 2015-10-18

    上傳用戶:ryb

  • Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely

    Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques and practical solutions for programmers designing modern software systems with C++, from small projects to enterprise applications.

    標簽: problem-and-solution Exceptional Organized practical

    上傳時間: 2015-10-20

    上傳用戶:chenbhdt

  • 書名:基本商業程序的建模 Essential Business Process Modeling (Paperback) 作者: Mike Havey 出版商:O Reilly 1 editio

    書名:基本商業程序的建模 Essential Business Process Modeling (Paperback) 作者: Mike Havey 出版商:O Reilly 1 edition (August 18, 2005) 內容介紹: Ten years ago, groupware bundled with email and calendar applications helped track the flow of work from person to person within an organization. Workflow in today s enterprise means more monitoring and orchestrating massive systems. A new technology called Business Process Management, or BPM, helps software architects and developers design, code, run, administer, and monitor complex network-based business processes. BPM replaces those sketchy flowchart diagrams that business analysts draw on whiteboards with a precise model that uses standard graphical and XML representations, and an architecture that allows it converse with other services, systems, and users.

    標簽: Essential Paperback Business Modeling

    上傳時間: 2015-10-21

    上傳用戶:zhangyigenius

  • Every day, patches are created to cover up security holes in software applications and operating sys

    Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.

    標簽: applications operating security software

    上傳時間: 2015-11-01

    上傳用戶:fhzm5658

主站蜘蛛池模板: 上杭县| 鸡西市| 岑溪市| 成安县| 吉林市| 新竹县| 望城县| 济阳县| 肥城市| 广平县| 阜平县| 睢宁县| 龙口市| 永康市| 禹州市| 景洪市| 沈阳市| 天津市| 剑阁县| 海伦市| 伊通| 涿鹿县| 城步| 甘肃省| 门源| 密山市| 广昌县| 汨罗市| 图们市| 彰化市| 册亨县| 巨鹿县| 洪雅县| 修武县| 金门县| 白朗县| 讷河市| 达尔| 苗栗县| 金坛市| 宜都市|