POS is a Java® platform-based, mission-critical, ISO-8583 based financial transaction library/framework that can be customized and extended in order to implement financial interchanges.
标签: mission-critical platform-based transaction financial
上传时间: 2013-12-15
上传用户:libenshu01
Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is somewhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s something like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.
标签: available libraries Although nearly
上传时间: 2014-01-22
上传用户:zhoujunzhen
通过 HP-UX 11i,HP 提供了高可用性、高安全性的可管理操作系统,以满足 端对端的 Internet 关键计算的需求。HP-UX 11i 支持 Enterprise、mission-critical 和 Technical computing 环境。在 PA-RISC 系统和基于 Intel Itanium 的系统 上均可使用 HP-UX 11i。
上传时间: 2014-08-06
上传用户:xiaoyunyun
Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.
标签: information techniques combining overload
上传时间: 2014-01-02
上传用户:Late_Li
wiley, create your own future how to master the 12 critical factors of unlimited success (2002).pdf
标签: unlimited critical factors success
上传时间: 2015-05-08
上传用户:ztj182002
Chi Square Test for Independence: calculuate the chi square of a vector and the critical value.
标签: Independence calculuate the critical
上传时间: 2013-11-29
上传用户:xyipie
The second volume in the Write Great Code series supplies the critical information that today s computer science students don t often get from college and university courses: How to carefully choose their high-level language statements to produce efficient code. Write Great Code, Volume 2: Thinking Low-Level, Writing High-Level, teaches software engineers how compilers translate high-level language statements and data structures into machine code. Armed with this knowledge, a software engineer can make an informed choice concerning the use of those high-level structures to help the compiler produce far better machine code--all without having to give up the productivity and portability benefits of using a high-level language
标签: information the critical supplies
上传时间: 2014-02-21
上传用户:luke5347
用VxWorks的信号量机制实现任务同步.pdf :为了保证诸任务对临界critical资源l eso~ 的互斥访问,VxWorks提供了任务同步机制。二进制信号量是VxWorks系统中实现任务同步的一种重要手段,它保证了任务在并发时结果的一致性。
上传时间: 2016-07-25
上传用户:大三三
Some paintings lyapunov chaotic attractor and the related terms, while the sub-critical and supercritical classification
标签: sub-critical paintings attractor and
上传时间: 2016-07-29
上传用户:龙飞艇
C programming guide for embedded critical application.
标签: programming application embedded critical
上传时间: 2016-08-12
上传用户:hphh