搜索结果
找到约 15 项符合
Possibly 的查询结果
按分类筛选
编译器/解释器 c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths ...
SCSI/ASPI SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY comm
SCSI Multimedia Commands 鈥?3 (MMC-3)
T10/1363-D
5.16 READ CAPACITY Command
The READ CAPACITY command (Table 144) provides a means for the Initiator to request information
regarding the capacity of the Logical Unit. This command shall not report the correct capacity of the
recorded data for CD-R, CD ...
书籍 Copper+Cabling+-+Applications
How will future generations refer to our times? Will it be known as one
of space exploration, genetics, atomic energy or computing? Possibly,
but I think it is more likely to be ‘The age of communications’. Not since
printed books and newspapers were first introduced has there been
such an explosi ...
书籍 Propagation Channel Characterization
The investigation of the propagation channel is becoming more and more important in mod-
ern wireless communication. The demand for spectral efficiency motivates exploitation of
all channels that can possibly be used for communications. Nowadays, a common trend for
designing physical layer algorithm ...
书籍 Industrial+Control+Systems
This book is either ambitious, brave, or reckless approaching
a topic as rapidly evolving as industrial control system (ICS)
security. From the advent of ICS-targeted malicious software
such as Stuxnet to the advanced persistent threats posed by
organized crime and state-sponsored entities, ICS is i ...