Answering Queries using views is an article that contains an introduction to the theory and some algorithms, examples for the queries that uses views to resolve some problems. Also this article have a large references for more information about this subject.
標簽: introduction Answering contains Queries
上傳時間: 2017-03-18
上傳用戶:wangyi39
in this document basic frame details and data rate specification about 802.11a is given.ofdm based wireless lan system uses this.
標簽: specification document details 802.11
上傳時間: 2017-04-03
上傳用戶:invtnewer
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
標簽: fault-tolerant algorithms redundant underlyin
上傳時間: 2013-12-18
上傳用戶:jkhjkh1982
Cromfs is a compressed read-only filesystem for Linux. Cromfs is best at archiving gigabytes of big files that have a lot of redundancy. It aims primarily at achieving a strong compression, even at the cost of memory and CPU time resources. It uses the LZMA compression algorithm from 7-zip and block merging.
標簽: Cromfs compressed filesystem archiving
上傳時間: 2013-12-15
上傳用戶:王楚楚
Face Recognition Library ======================== Advanced face recognition DLL using two functions : Train and Recognize. uses neural net back propogation alogorithm with more AI tools added for imaging optimization. Library works great even for a low resolution web cam image and requires the user to align to a mirror frame on screen. Complete Source Code with Video capture and feature extraction kit for Registered Users. Please register here for only $299 with Source Code : http://www.research-lab.com/facerecognitionorder.htm (c) www.research-lab.com
標簽: Recognition recognition Advanced Library
上傳時間: 2017-04-25
上傳用戶:784533221
The 2D CFD Program NaSt2D The program is a 2D solver for the incompressible, transient Navier-Stokes equations including the temperature equation and free boundary problems. It uses finite differences for discretization on a structured equidistant staggered grid, central and upwind (donor-cell) discretization of the convective parts and an explicit time stepping scheme. The free boundary value problems are treated with the MAC technique.
標簽: incompressible Navier-Sto The transient
上傳時間: 2013-11-30
上傳用戶:xfbs821
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
標簽: This deterministic concentrates guarantees
上傳時間: 2017-05-17
上傳用戶:日光微瀾
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
標簽: This deterministic concentrates guarantees
上傳時間: 2017-05-17
上傳用戶:teddysha
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
標簽: This deterministic concentrates guarantees
上傳時間: 2013-12-12
上傳用戶:15736969615
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
標簽: This deterministic concentrates guarantees
上傳時間: 2013-11-28
上傳用戶:maizezhen