虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

One

  • KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware.

    KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware. It consists of a loadable kernel module (kvm.ko) and a userspace compOnent. Using KVM, One can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc. The kernel compOnent of KVM is included in mainline Linux, and will appear in Linux 2.6.20. KVM is open source software.

    标签: virtualization Kernel-based for hardware

    上传时间: 2015-08-20

    上传用户:lijianyu172

  • The code, images and designs for this book are released under a Creative Commons Attribution-NonComm

    The code, images and designs for this book are released under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 License. http://creativecommons.org/licenses/by-nc-sa/2.5/ You are free: * to copy, distribute, display, and perform the work * to make derivative works Under the following conditions: *Attribution. You must attribute the work in the manner specified by the author or licensor. *Noncommercial. You may not use this work for commercial purposes. *Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this One. *For any reuse or distribution, you must make clear to others the license terms of this work. *Any of these conditions can be waived if you get permission from the copyright holder. CONTACT ME Please address any questions to info@andybudd.com.

    标签: Attribution-NonComm Creative released Commons

    上传时间: 2014-01-19

    上传用户:chfanjiang

  • Three-dimensional real-time graphics are a prevalent technology nowadays, thanks to the steady rise

    Three-dimensional real-time graphics are a prevalent technology nowadays, thanks to the steady rise of processing power and specialized graphics hardware. One of the goals of computer graphics most sought after and difficult to achieve is to reproduce realistic outdoor environments featuring dense forests.

    标签: Three-dimensional technology real-time prevalent

    上传时间: 2014-01-15

    上传用户:坏天使kk

  • 一个开源heml语意分析器 ekhtml: The El-Kabong HTML parser SUMMARY: El-Kabong: A speedy, yet forgiving,

    一个开源heml语意分析器 ekhtml: The El-Kabong HTML parser SUMMARY: El-Kabong: A speedy, yet forgiving, SAX-stylee HTML parser. PROJECT INFORMATION: Web Site: ekhtml.sourceforge.net The web site contains links to locations where One can: - file bugs - join mailing lists - download the latest release - browse documentation - get CVS information BUILDING: See the file INSTALL for information、目标代码生成、符号表的构造和运行时存储空间的组织等8部分组成。

    标签: El-Kabong forgiving SUMMARY ekhtml

    上传时间: 2014-12-08

    上传用户:dapangxie

  • /* Check_SST_39VF400A Check manufacturer and device ID /* CFI_Query CFI Query Entry/Exit command se

    /* Check_SST_39VF400A Check manufacturer and device ID /* CFI_Query CFI Query Entry/Exit command sequence /* Erase_One_Sector Erase a sector of 2048 words /* Erase_One_Block Erase a block of 32K words /* Erase_Entire_Chip Erase the contents of the entire chip /* Program_One_Word Alter data in One word /* Program_One_Sector Alter data in 2048 word sector /* Program_One_Block Alter data in 32K word block

    标签: manufacturer Check_SST CFI_Query command

    上传时间: 2013-12-15

    上传用户:jjj0202

  • Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search ma

    Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to One connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.

    标签: Implemented following compile command

    上传时间: 2014-01-01

    上传用户:lhc9102

  • Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its co

    Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its competitors because of stability, performance, that fact that it s open source, and many other advantages. But when deciding on which version of Apache to use, the choice is not always so simple. On the One hand there is a very popular, stable version used by millions of users, version 1.3, and on the other hand, there is an enhanced and re-designed version 2.0.

    标签: Apache Step-by-Step Securing choosing

    上传时间: 2015-09-06

    上传用户:gundamwzc

  • Hard-decision decoding scheme Codeword length (n) : 31 symbols. Message length (k) : 19 symbols.

    Hard-decision decoding scheme Codeword length (n) : 31 symbols. Message length (k) : 19 symbols. Error correction capability (t) : 6 symbols One symbol represents 5 bit. Uses GF(2^5) with primitive polynomial p(x) = X^5 X^2 + 1 Generator polynomial, g(x) = a^15 a^21*X + a^6*X^2 + a^15*X^3 + a^25*X^4 + a^17*X^5 + a^18*X^6 + a^30*X^7 + a^20*X^8 + a^23*X^9 + a^27*X^10 + a^24*X^11 + X^12. Note: a = alpha, primitive element in GF(2^5) and a^i is root of g(x) for i = 19, 20, ..., 30. Uses Verilog description with synthesizable RTL modelling. Consists of 5 main blocks: SC (Syndrome Computation), KES (Key Equation Solver), CSEE (Chien Search and Error Evaluator), Controller and FIFO Register.

    标签: symbols length Hard-decision Codeword

    上传时间: 2014-07-08

    上传用户:曹云鹏

  • Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement

    Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement formany computer vision applications. One of the key fac-ors in enhancing the robustness of dynamic scene analy-sis that of accurate and reliable means for shadow de-ection. Shadowdetectioniscriticalforcorrectobjectde-ection in image sequences. Many algorithms have beenproposed in the literature that deal with shadows. How-ever,acomparativeevaluationoftheexistingapproachesisstill lacking. In this paper, the full range of problems un-derlyingtheshadowdetectionareidenti?edanddiscussed.Weclassifytheproposedsolutionstothisproblemusingaaxonomyoffourmainclasses, calleddeterministicmodeland non-model based and statistical parametric and non-parametric. Novelquantitative(detectionanddiscrimina-ionaccuracy)andqualitativemetrics(sceneandobjectin-dependence,?exibilitytoshadowsituationsandrobustnesso noise) are proposed to evaluate these classes of algo-rithms on a benchmark suite of indoor and outdoor videosequences.

    标签: Robustnesstochangesinillumination conditionsaswellas perspectives requirement

    上传时间: 2014-01-23

    上传用户:whenfly

  • //Basic packet sending test at the MAC level, used for internal testing only. //This packet test ha

    //Basic packet sending test at the MAC level, used for internal testing only. //This packet test has One node sending out a variety of //differently formatted packets to two assumed destination nodes.

    标签: packet test internal sending

    上传时间: 2014-08-21

    上传用户:CSUSheep