虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Hard

  • The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some no

    The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some nodes of a complete binary tree of height h (the code tree) to n simultaneous connections, such that no two assigned nodes (codes) are on the same root-to-leaf path. Each connection requires a code on a specified level. The code can change over time as long as it is still on the same level. We consider the one-step code assignment problem: Given an assignment, move the minimum number of codes to serve a new request. Minn and Siu proposed the so-called DCAalgorithm to solve the problem optimally. We show that DCA does not always return an optimal solution, and that the problem is NP-Hard. We give an exact nO(h)-time algorithm, and a polynomial time greedy algorithm that achieves approximation ratio Θ(h). Finally, we consider the online code assignment problem for which we derive several results

    标签: combinatorial assignment problem arises

    上传时间: 2014-01-19

    上传用户:BIBI

  • 硬盘结构、参数、品牌等

    硬盘结构、参数、品牌等,PC3000维修介绍,硬盘维修流程介绍 --Hard disk structure , parameter , brand etc. , PC3000 are kept in repair introduce that, the technological process the Hard disk is kept in repair introduces that

    标签: 硬盘 参数

    上传时间: 2014-01-21

    上传用户:lepoke

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or Hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    标签: open-source encryption Features software

    上传时间: 2013-12-20

    上传用户:123啊

  • This article describes how to consume Web services in Java 1.5.0 using the new JAX-WS 2.0 API (JSR 2

    This article describes how to consume Web services in Java 1.5.0 using the new JAX-WS 2.0 API (JSR 228). Developers around the world, including me, have always complained about the Hard ways to work in Java to consume even a Web service as simple as adding two numbers. However, with JAX-WS 2.0 API now available in core Java in JDK 1.5.0, life is simple like never before.

    标签: describes services article consume

    上传时间: 2013-11-27

    上传用户:kelimu

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- Hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    标签: effectiveness analytically numerically cloaking

    上传时间: 2017-03-30

    上传用户:zxc23456789

  • Although some FX1-based devices may use the FX1鈥檚 CPU to process USB data directly (Port I/O Mode),

    Although some FX1-based devices may use the FX1鈥檚 CPU to process USB data directly (Port I/O Mode), most applica- tions use the FX1 simply as a conduit between the USB and external data-processing logic (e.g., an ASIC or DSP, or the IDE controller on a Hard disk drive).

    标签: Although directly devices process

    上传时间: 2014-01-08

    上传用户:2467478207

  • Generate random bits, convert to bipolar, corrupt the message by passing through noise and decode us

    Generate random bits, convert to bipolar, corrupt the message by passing through noise and decode using Hard decision decoding and calculate BER

    标签: Generate bipolar convert corrupt

    上传时间: 2013-12-25

    上传用户:1966640071

  • These documents are all classic documents relating to the domain of virus writing.Give a good insigh

    These documents are all classic documents relating to the domain of virus writing.Give a good insight about the virus which are rare and are considered best for case studies..many variants are still being produced and all these are original.Its very Hard to find them now adays..these are extremely helpfull for people working in Malware analysis and malicious code analysis

    标签: documents relating classic writing

    上传时间: 2017-08-18

    上传用户:thuyenvinh

  • This book is for someone who wants to quickly master the basics of how to install, run, and maintai

    This book is for someone who wants to quickly master the basics of how to install, run, and maintain Linux on an Intel-based personal computer. All of the tools you need are included. Your computer should have a monitor, or display, keyboard, mouse, Hard drive, floppy drive, and CD-ROM drive. Although you can jump right in and install Linux onto your Hard drive, you should have some technical information about your computer and its Hardware on hand before you start.

    标签: install someone quickly maintai

    上传时间: 2017-08-19

    上传用户:zhuoying119

  • Why do People Program? Each person can have his own reason for programming but I can tell you th

    Why do People Program? Each person can have his own reason for programming but I can tell you that programming is one of the best ways to gain a deep understanding of computers and computer technology. Learning to program makes you understand why computers and computer programs work the way they do. It also puts some sense into you about how Hard it is to create software. 1.2. What is C++ & OOP? C++ is an extended version C. C was developed at Bell Labs. in 1978.

    标签: programming can Program People

    上传时间: 2013-12-07

    上传用户:qazxsw