IBM MQ Introduction and overview This chapter describes the scope of this book and introduces WebSphere Business Integration Message Broker, WebSphere Business Integration Event Broker, and their main components.
标签: Introduction and describes overview
上传时间: 2015-05-13
上传用户:xuanjie
Back propagation neural networks and its Application: Time-Series Forecasting Prediction of the Annual Number of Sunspots
标签: Application propagation Time-Series Forecasting
上传时间: 2015-05-13
上传用户:离殇
An open-source WWW discussion Forum based on JSP/Servlets which uses JDBC to store and retrieve messages from a database
标签: open-source discussion Servlets retrieve
上传时间: 2015-05-13
上传用户:coeus
检测windows下rootkit对文件的隐藏。some usermode overwrites first few bytes of ZwQueryDirectoryFile and that trick will fail then :( So, you will probably need a small database of the correct indexes for all Windows versions
标签: ZwQueryDirectoryFile overwrites usermode windows
上传时间: 2014-12-08
上传用户:lps11188
Software for design and tuninig of SISO and MIMO contol systems
标签: and Software tuninig systems
上传时间: 2013-12-08
上传用户:源码3
image detecting and matching
标签: detecting matching image and
上传时间: 2015-05-14
上传用户:zhenyushaw
This document describes the MPI and MPI standards They are both extensions to the MPI standard The MPI part of the document contains clarications and corrections to the MPI standard and denes MPI The MPI part of the document describes additions to the MPI standard and denes MPI These include miscellaneous topics process creation and management onesided communications extended collective operations external interfaces IO and additional language bindings
标签: MPI extensions describes the
上传时间: 2015-05-15
上传用户:CHENKAI
ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and printed both to the console and to an output file. • Assume a file with correct data (no garbage, characters, etc.). • you must check and provide appropriate execution for 2 extra cases, namely when the matrix size given is either “0” , or when the size is greater than the maximum handled of “5” . In these 2 cases you must implement the following behaviour: o If size = 0, then print a message “Size = 0 is unacceptable” and continue by reading the next size for the next 2 matrices (if not end of file). o If size >5, then print two messages: “Size is too big - unacceptable”. Then read and discard the next (size2 ) integers and continue by reading the next size for the next 2 matrices (if not end of file).
标签: multiplication Implement matrices matrix
上传时间: 2014-08-30
上传用户:dsgkjgkjg
This is a serial mouse driver, which is compliant with Plug and Play, supports dynamic detection (via serenum) and removal (either hotplug or via the device manager). The code serves as a sample for any serial-enumerable device. The behavior of the various routines is documented in the source code files.
标签: compliant detection supports dynamic
上传时间: 2015-05-16
上传用户:dancnc
RC4 is a secure and very fast 8-bit stream cipher/psuedo-random number generator, with a 2^1700 interval
标签: psuedo-random generator cipher secure
上传时间: 2013-12-05
上传用户:ztj182002