虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

those

  • The source code for this package is located in src/gov/nist/sip/proxy. The proxy is a pure JAIN-SIP

    The source code for this package is located in src/gov/nist/sip/proxy. The proxy is a pure JAIN-SIP application: it does not need proprietary nist-sip classes in addition of those defined in JAIN-SIP 1.1, you can substitute the NIST-SIP stack by another JAIN-SIP-1.1 compliant stack and it should interoperate. he proxy can act as presence server and be able to process NOTIFY and SUBSCRIBE requests. If this parameter is disabled, the proxy will simply forward those kind of requests following the appropriate routing decision.

    标签: proxy The JAIN-SIP package

    上传时间: 2015-11-30

    上传用户:ippler8

  • he source code for this package is located in src/ directory. The JAIN-SIP-SERVICES is a JAIN-SIP a

    he source code for this package is located in src/ directory. The JAIN-SIP-SERVICES is a JAIN-SIP application: it does not need proprietary nist-sip classes in addition of those defined in JAIN-SIP 1.1, you can substitute the NIST-SIP stack by another JAIN-SIP-1.1 compliant stack and it should interoperate.

    标签: JAIN-SIP-SERVICES directory JAIN-SIP package

    上传时间: 2013-12-30

    上传用户:caiiicc

  • Linux in a Nutshell, 5th Edition By Stephen Figgins, Robert Love, Arnold Robbins, Ellen Siever, Aa

    Linux in a Nutshell, 5th Edition By Stephen Figgins, Robert Love, Arnold Robbins, Ellen Siever, Aaron Weber ... ... ... ... ... ... ... ..... Publisher: O Reilly Pub Date: July 2005 ISBN: 0-596-00930-5 Pages: 944 Over the last few years, Linux has grown both as an operating system and a tool for personal and business use. Simultaneously becoming more user friendly and more powerful as a back-end system, Linux has achieved new plateaus: the newer filesystems have solidified, new commands and tools have appeared and become standard, and the desktop--including new desktop environments--have proved to be viable, stable, and readily accessible to even those who don t consider themselves computer gurus.

    标签: Nutshell Edition Figgins Stephen

    上传时间: 2015-12-03

    上传用户:frank1234

  • UC Library Extensions UnderC comes with a pocket implementation of the standard C++ libraries, wh

    UC Library Extensions UnderC comes with a pocket implementation of the standard C++ libraries, which is a reasonably faithful subset. This documentation describes those UnderC functions and classes which are not part of the C++ standard. UC Library Builtin functions: Most of these are standard C functions, but there are a few unique to the UnderC system which give you runtime access to the compiler. You may evaluate expressions, execute commands, compile code, etc. * Expands the text in expr using the UnderC preprocessor, putting the result into buff. void uc_macro_subst(const char* expr, char* buff, int buffsize) * Executes a UC #-command, like #l or #help. uc_cmd() expects the name of the command, _without_ the hash, e.g. uc_cmd("l fred.cpp") or uc_cmd("help"). void uc_cmd(const char* cmd) * Evaluates any C++ expression or statement will return non-zero if unsuccessful.

    标签: implementation Extensions libraries standard

    上传时间: 2013-12-14

    上传用户:leehom61

  • In this article, we present an overview of methods for sequential simulation from posterior distribu

    In this article, we present an overview of methods for sequential simulation from posterior distributions. These methods are of particular interest in Bayesian filtering for discrete time dynamic models that are typically nonlinear and non-Gaussian. A general importance sampling framework is developed that unifies many of the methods which have been proposed over the last few decades in several different scientific disciplines. Novel extensions to the existing methods are also proposed.We showin particular how to incorporate local linearisation methods similar to those which have previously been employed in the deterministic filtering literature these lead to very effective importance distributions. Furthermore we describe a method which uses Rao-Blackwellisation in order to take advantage of the analytic structure present in some important classes of state-space models. In a final section we develop algorithms for prediction, smoothing and evaluation of the likelihood in dynamic models.

    标签: sequential simulation posterior overview

    上传时间: 2015-12-31

    上传用户:225588

  • TI warrants performance of its products to the specifications applicable at the time of sale in acc

    TI warrants performance of its products to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to support this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements.

    标签: specifications performance applicable the

    上传时间: 2016-01-16

    上传用户:weixiao99

  • This handbook is intended for anyone who wants a comprehensive survey of Fortran 90, including thos

    This handbook is intended for anyone who wants a comprehensive survey of Fortran 90, including those familiar with programming language concepts but unfamiliar with Fortran. Experienced Fortran 77 programmers will be able to use this volume to assimilate quickly those features in Fortran 90 that are not in Fortran 77 (Fortran 90 is a superset of Fortran 77).

    标签: comprehensive including handbook intended

    上传时间: 2013-11-27

    上传用户:lvzhr

  • CP detector (CPD) only reports the onset and removal of a tone. The analysis of timing (if required)

    CP detector (CPD) only reports the onset and removal of a tone. The analysis of timing (if required) shall be responsibility of a higher-level application due to uncontrollable variability of those parameters from country to country.FOR TI C54X/C55X

    标签: detector analysis required reports

    上传时间: 2013-12-02

    上传用户:ynsnjs

  • DESIGN PATTERNS JAVA COMPANION Design patterns began to be recognized more formally in the early 1

    DESIGN PATTERNS JAVA COMPANION Design patterns began to be recognized more formally in the early 1990s by Helm (1990) and Erich Gamma (1992), who described patterns incorporated in the GUI application framework, ET++. The culmination of these discussions and a number of technical meetings was the publication of the parent book in this series, Design Patterns -- Elements of Reusable Software, by Gamma, Helm, Johnson and Vlissides.(1995). This book, commonly referred to as the Gang of Four or “GoF” book, has had a powerful impact on those seeking to understand how to use design patterns and has become an all-time best seller. We will refer to this groundbreaking book as Design Patterns, throughout this book and The Design Patterns Smalltalk Companion (Alpert, Brown and Woolf, 1998) as the Smalltalk Companion.

    标签: recognized COMPANION PATTERNS patterns

    上传时间: 2016-02-27

    上传用户:大三三

  • These tools are for use by developers so that they can create more robust applications. Especially o

    These tools are for use by developers so that they can create more robust applications. Especially of use to those developing multi-threaded applications in C++ with templates. Includes TCMalloc, heap-checker, heap-profiler and cpu-profiler. http://www.soft234.com

    标签: applications Especially developers create

    上传时间: 2013-12-17

    上传用户:erkuizhang