虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

istributed computing principles

  • 通过 HP-UX 11i

    通过 HP-UX 11i,HP 提供了高可用性、高安全性的可管理操作系统,以满足 端对端的 Internet 关键计算的需求。HP-UX 11i 支持 Enterprise、Mission-Critical 和 Technical computing 环境。在 PA-RISC 系统和基于 Intel Itanium 的系统 上均可使用 HP-UX 11i。

    标签: HP-UX 11i

    上传时间: 2014-08-06

    上传用户:xiaoyunyun

  • Software given here is to accompany the textbook: W.H. Tranter, % K.S. Shanmugan, T.S. Rappaport,

    Software given here is to accompany the textbook: W.H. Tranter, % K.S. Shanmugan, T.S. Rappaport, and K.S. Kosbar, Principles of % Communication Systems Simulation with Wireless Applications, % Prentice Hall PTR, 2004.

    标签: K.S. W.H. T.S. Shanmugan

    上传时间: 2016-06-12

    上传用户:shanml

  • This white paper describes a collection of standards, conventions, and guidelines for writing solid

    This white paper describes a collection of standards, conventions, and guidelines for writing solid Java code. They are based on sound, proven software engineering principles that lead to code that is easy to understand, to maintain, and to enhance.

    标签: conventions collection guidelines describes

    上传时间: 2014-12-08

    上传用户:hakim

  • 多年来

    多年来,我一直想录找一本适合中国计算机系学生用的算法方面的国外教材。尽管有些不错的国外教材在中国出版,但总有篇幅过多、内容略显陈旧或数据结构内容夹杂其中等等这样或那样的不甚满意之处。 去年我有幸看到世界科学图书出版社出版的由M.H.Alsuwaiyel撰写的《Algorithms Design Techniques and Analysis》,它是以国际著名算法专家,我国台湾出身的李德财教授所主编的系列丛书——Lecture Notes Series on Computing——中的一本。虽然此书不是美国的大学教材,而是沙特阿拉伯的大学计算机系教材。但是我很快就被该书的组织简明、概括,且包含当前市面上算法一#较少涉及的概率算法和近似算法

    标签:

    上传时间: 2013-12-24

    上传用户:lhc9102

  • This methodical text aspires to present various information relevant to operating systems, computer

    This methodical text aspires to present various information relevant to operating systems, computer architecture, compilers, principles of programming languages, and C and C++ programming, specifically.

    标签: information methodical operating computer

    上传时间: 2016-10-09

    上传用户:leixinzhuo

  • This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s

    This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s i ntended as a simple guide to logistics i n NATO. It does not attempt to examine current i ssues or provide answers to the problems that logisticians will face, but i t rather aims at i ntroducing them to some of the basic principles, policies, concepts and organisations with which they will work.

    标签: Logisticians Conference published the

    上传时间: 2014-12-07

    上传用户:www240697738

  • With a worldwide community of users and more than a million dedicated programmers, Perl has proven t

    With a worldwide community of users and more than a million dedicated programmers, Perl has proven to be the most effective language for the latest trends in computing and business. Every programmer must keep up with the latest tools and techniques. This updated version of Advanced Perl Programming from O Reilly gives you the essential knowledge of the modern Perl programmer. Whatever your current level of Perl expertise, this book will help you push your skills to the next level and become a more accomplished programmer.

    标签: programmers worldwide community dedicated

    上传时间: 2014-01-16

    上传用户:磊子226

  • 网格agent平台(GAP ,Grid AgentsPlatform)开发包

    网格agent平台(GAP ,Grid AgentsPlatform)开发包,建造和模拟网格环境下的移动agent.类似JADE(Java Agent DEvelopment Framework).此平台建立在Gridsim基础上,可编程实现模拟Computing Elements, Storage Elements, Virtual Organisations, 等

    标签: AgentsPlatform agent Grid GAP

    上传时间: 2013-12-09

    上传用户:gundan

  • 15篇光流配准经典文献

    15篇光流配准经典文献,目录如下: 1、A Local Approach for Robust Optical Flow Estimation under Varying 2、A New Method for Computing Optical Flow 3、Accuracy vs. Efficiency Trade-offs in Optical Flow Algorithms 4、all about direct methods 5、An Introduction to OpenCV and Optical Flow 6、Bayesian Real-time Optical Flow 7、Color Optical Flow 8、Computation of Smooth Optical Flow in a Feedback Connected Analog Network 9、Computing optical flow with physical models of brightness Variation 10、Dense estimation and object-based segmentation of the optical flow with robust techniques 11、Example Goal Standard methods Our solution Optical flow under 12、Exploiting Discontinuities in Optical Flow 13、Optical flow for Validating Medical Image Registration 14、Tutorial Computing 2D and 3D Optical Flow.pdf 15、The computation of optical flow

    标签: 光流

    上传时间: 2014-11-21

    上传用户:fanboynet

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211