虫虫首页|资源下载|资源专辑|精品软件
登录|注册

suffer

  • Many programs today suffer from the fact that their users have to connect using IP addresses. This i

    Many programs today suffer from the fact that their users have to connect using IP addresses. This is impossible for dialup users, whose IPs change all the time, and painful for LAN users who don t know their IP addresses or whose addresses also change. In addition, many collaborative programs could benefit from offering friends lists, showing friends as online or offline, providing status information. This kind of functionality is hard to provide, requiring a dedicated Internet database and a new client - client protocol. But it is offered today through a system called AwareNet, which is offered free of charge and royalty

    标签: addresses programs connect suffer

    上传时间: 2013-12-05

    上传用户:CHENKAI

  • Wireless range extenders or wireless repeaters can extend the range of an existing wireless network.

    Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device connected to any of the repeaters in the chain will have a throughput that is limited by the weakest link between the two nodes in the chain from which the connection originates to where the connection ends

    标签: wireless range extenders repeaters

    上传时间: 2014-01-01

    上传用户:zhangyigenius

  • 卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章

    卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.

    标签: 大学 数据

    上传时间: 2017-08-28

    上传用户:thinode