虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Possibly

  • c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin

    c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are Possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.

    标签: fault-tolerant algorithms redundant underlyin

    上传时间: 2013-12-18

    上传用户:jkhjkh1982

  • SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY comm

    SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY command (Table 144) provides a means for the Initiator to request information regarding the capacity of the Logical Unit. This command shall not report the correct capacity of the recorded data for CD-R, CD-RW and DVD-R/-RW media that does not have a Lead-out in the last Session or last Border-out. For CD-ROM, the returned logical block address is modified to allow returning a Possibly inexact value (but one with a known error bound) based on the Table of Contents data

    标签: CAPACITY READ Multimedia Commands

    上传时间: 2017-04-17

    上传用户:liuchee

  • Copper+Cabling+-+Applications

    How will future generations refer to our times? Will it be known as one of space exploration, genetics, atomic energy or computing? Possibly, but I think it is more likely to be ‘The age of communications’. Not since printed books and newspapers were first introduced has there been such an explosion of communication. None of this technology could function without modern cables and, just as important, competent installers.

    标签: Applications Cabling Copper

    上传时间: 2020-05-27

    上传用户:shancjb

  • Propagation Channel Characterization

    The investigation of the propagation channel is becoming more and more important in mod- ern wireless communication. The demand for spectral efficiency motivates exploitation of all channels that can Possibly be used for communications. Nowadays, a common trend for designing physical layer algorithms is to adapt the transceiving strategy, either by maximizing the diversity gains or by utilizing the coherence of the channels to improve the signal-to-noise power ratio.

    标签: Characterization Propagation Channel

    上传时间: 2020-05-31

    上传用户:shancjb

  • Industrial+Control+Systems

    This book is either ambitious, brave, or reckless approaching a topic as rapidly evolving as industrial control system (ICS) security. From the advent of ICS-targeted malicious software such as Stuxnet to the advanced persistent threats posed by organized crime and state-sponsored entities, ICS is in the crosshairs and practices and controls considered safe today may be obsolete tomorrow. Possibly more so than in more traditional IT security, because of the differences inherent in ICS.

    标签: Industrial Control Systems

    上传时间: 2020-06-10

    上传用户:shancjb