SQL Server 2005 Service Broker (SSB) is an asynchronous messaging technology built into SQL Server. With SSB, you essentially get the power of messaging technologies like Microsoft Message Queue (MSMQ) combined with the relational database capabilities of SQL Server, all controlled with Transact SQL statements
标签: Server asynchronous technology SQL
上传时间: 2013-12-13
上传用户:koulian
A general technique for the recovery of signicant image features is presented. The technique is based on the mean shift algorithm, a simple nonparametric pro- cedure for estimating density gradients. Drawbacks of the current methods (including robust clustering) are avoided. Feature space of any nature can be processed, and as an example, color image segmentation is dis- cussed. The segmentation is completely autonomous, only its class is chosen by the user. Thus, the same program can produce a high quality edge image, or pro- vide, by extracting all the signicant colors, a prepro- cessor for content-based query systems. A 512 512 color image is analyzed in less than 10 seconds on a standard workstation. Gray level images are handled as color images having only the lightness coordinate
标签: technique presented features recovery
上传时间: 2015-10-14
上传用户:410805624
Magenta Systems Internet Packet Monitoring Components are a set of Delphi components designed to capture and monitor internet packets using either raw sockets or the WinPcap device driver. Hardware permitting, ethernet packets may be captured and interpreted, and statistics maintained about the traffic. Uses of packet monitoring include totalling internet traffic by IP address and service, monitoring external or internal IP addresses and services accessed, network diagnostics, and many other applications. The component includes two demonstration applications, one that displays raw packets, the other that totals internet traffic. The components include various filters to reduce the number of packets that need to be processed, by allowing specific IP addresses to be ignored, LAN mask to ignore local traffic, and ignore non-IP traffic such as ARP.
标签: Components Monitoring components Internet
上传时间: 2015-10-30
上传用户:水中浮云
t transistor has the characteristics of components of the sensor real-time measurement of voltage and current signals through, obtained quality factor correction circuit for the feedback and the feedback time, IBM used the feedback field effect transistor implementation, in order to achieve quality factor correction circ
标签: characteristics measurement transistor components
上传时间: 2014-12-22
上传用户:杜莹12345
Purpose of this White Paper This white paper describes a collection of standards, conventions, and guidelines for writing solid Java code. They are based on sound, proven software engineering principles that lead to code that is easy to understand, to maintain, and to enhance. Furthermore, by following these coding standards your productivity as a Java developer should increase remarkably – Experience shows that by taking the time to write high-quality code right from the start you will have a much easier time modifying it during the development process. Finally, following a common set of coding standards leads to greater consistency, making teams of developers significantly more productive.
标签: conventions collection describes standards
上传时间: 2014-02-12
上传用户:123啊
Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software is ready for release. Updated from the previous edition in 2000 to include a chapter that specifically deals with testing software for security bugs, the processes and techniques used throughout the book are timeless. This book is an excellent investment if you want to better understand what your Software Test team does or you want to write better software.
标签: practical Software provides software
上传时间: 2014-08-01
上传用户:zhaiyanzhong
VerboseGC demonstrates the use of the java.lang.management API to print the garbage collection statistics and memory usage remotely by connecting to a JMX agent with a JMX service URL: service:jmx:rmi:///jndi/rmi://<hostName>:<portNum>/jmxrmi where <hostName> is the hostname and <portNum> is the port number to which the JMX agent will be connected.
标签: the demonstrates collection management
上传时间: 2013-12-26
上传用户:lgnf
The present paper deals with the problem of calculating mean delays in polling systems with either exhaustive or gated service. We develop a mean value analysis (MVA) to compute these delay figures. The merits of MVA are in its intrinsic simplicity and its intuitively appealing derivation. As a consequence, MVA may be applied, both in an exact and approximate manner, to a large variety of models.
标签: with calculating present polling
上传时间: 2014-11-17
上传用户:kelimu
The Microsoft® Active Directory™ Service Interfaces (ADSI) Software Development Kit (SDK) is a client-side product, based on the Component Object Model (COM), that defines a directory service model and a set of COM interfaces that enables Microsoft Windows NT® /Windows® 2000 and Windows 95 client applications to access several network directory services.
标签: Development Interfaces Microsoft Directory
上传时间: 2013-12-25
上传用户:daguda
In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.
标签: priority preemptive inversion problem
上传时间: 2015-12-14
上传用户:气温达上千万的