虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

different

  • The ONE is a Opportunistic Network Environment simulator which provides a powerful tool for generat

    The ONE is a Opportunistic Network Environment simulator which provides a powerful tool for generating mobility traces, running DTN messaging simulations with different routing protocols, and visualizing both simulations interactively in real-time and results after their completion.

    标签: Opportunistic Environment simulator provides

    上传时间: 2017-04-16

    上传用户:gmh1314

  • Auctions are among the oldest economic institutions in place. They have been used since antiquity to

    Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular bidder may depend on information available only to others-and asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information held by different bidders to be shared.

    标签: institutions antiquity Auctions economic

    上传时间: 2014-07-14

    上传用户:Breathe0125

  • This guide is an attempt to compile a lot of that information in here and dummy it down. Perhaps it

    This guide is an attempt to compile a lot of that information in here and dummy it down. Perhaps it s a fairly common show, perhaps not. It might have even been a show that you taped. Whatever the case, you want to share it with others bur aren t quite sure how. This guide should be your answer. This guide is geared towards posting a show at SharingTheGroove.org. The instructions contained within are for that site. Other sites hosting BT shows may have slightly different procedures for getting the torrent to them. However, torrent creation will be the same. While this guide is being written with audio concerts in mind, the same holds true for the video section of The Groove.

    标签: information Perhaps attempt compile

    上传时间: 2013-12-19

    上传用户:zsjzc

  • C is a general-purpose programming language. It has been closely associated with the UNIX operating

    C is a general-purpose programming language. It has been closely associated with the UNIX operating system where it was developed, since both the system and most of the programs that run on it are written in C. The language, however, is not tied to any one operating system or machine and although it has been called a ``system programming language because it is useful for writing compilers and operating systems, it has been used equally well to write major programs in many different domains.

    标签: general-purpose programming associated operating

    上传时间: 2014-01-14

    上传用户:我干你啊

  • Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/

    Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/e)x] step3:Slove x=1/F(u) step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn step5:If the first packet was generated at time [0], than the second packet will be generated at time [0+x1],The third packet will be generated at time [0+x1+x2], and so on …. Random-number generation 1.static method random from class Math -Returns doubles in the range 0.0 <= x < 1.0 2.class Random from package java.util -Can produce pseudorandom boolean, byte, float, double, int, long and Gaussian values -Is seeded with the current time of day to generate different sequences of numbers each time the program executes

    标签: Generate Possion between random

    上传时间: 2017-05-25

    上传用户:bibirnovis

  • Understanding the Linux Kernel helps readers understand how Linux performs best and how it meets th

    Understanding the Linux Kernel helps readers understand how Linux performs best and how it meets the challenge of different environments. The authors introduce each topic by explaining its importance, and show how kernel operations relate to the utilities that are familiar to Unix programmers and users.

    标签: Linux Understanding understand how

    上传时间: 2017-06-17

    上传用户:ywqaxiwang

  • 1. Download the version you want: * Version 1.3.4 (30 Aug 2007) -- this is the latest v

    1. Download the version you want: * Version 1.3.4 (30 Aug 2007) -- this is the latest version for UNIX/Linux and Windows * Previous versions 2. Unzip the file, which will create a directory called klt and place all the files there 3. Compile and run the code * On UNIX / Linux, move to the klt directory, type make. Now try some examples, by typing example1, etc. * For Microsoft Visual C++ 6.0, open the klt.dsw file, compile, and run. Change the constant in main.cpp to run the different examples. * For Microsoft Visual Studio .Net/7/8, open the klt.sln file, compile, and run. Change the constant in main.cpp to run the different examples. 4. Notice that, for your convenience, unofficial copies of the User and Reference Manuals can be found in the doc directory.

    标签: the Download Version version

    上传时间: 2014-01-25

    上传用户:nanshan

  • This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the

    This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the computer networking industry to receive data at a particular frequency and transmit them at another frequency. An asynchronous FIFO has two different clocks: one for read and one for write.

    标签: Asynchronous asynchronous the discuss

    上传时间: 2013-12-09

    上传用户:Thuan

  • This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering

    This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering large sets of data, and analyzing these data sets to gain useful business understanding. The book is organized in three parts. Part I introduces concepts. Part II describes and demonstrates basic data mining algorithms. It also contains chapters on a number of different techniques often used in data mining. Part III focusses on business applications of data mining. Methods are presented with simple examples, applications are reviewed, and relativ advantages are evaluated.

    标签: fundamental demonstrate the gathering

    上传时间: 2014-12-02

    上传用户:15736969615

  • VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li

    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.

    标签: implementation twofish cipher VHDL

    上传时间: 2017-06-25

    上传用户:王小奇