搜索结果

找到约 357 项符合 different 的查询结果

3G开发 The ONE is a Opportunistic Network Environment simulator which provides a powerful tool for generat

The ONE is a Opportunistic Network Environment simulator which provides a powerful tool for generating mobility traces, running DTN messaging simulations with different routing protocols, and visualizing both simulations interactively in real-time and results after their completion.
https://www.eeworm.com/dl/701/428149.html
下载: 145
查看: 1084

Java编程 Auctions are among the oldest economic institutions in place. They have been used since antiquity to

Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular ...
https://www.eeworm.com/dl/633/430541.html
下载: 47
查看: 1030

其他书籍 This guide is an attempt to compile a lot of that information in here and dummy it down. Perhaps it

This guide is an attempt to compile a lot of that information in here and dummy it down. Perhaps it s a fairly common show, perhaps not. It might have even been a show that you taped. Whatever the case, you want to share it with others bur aren t quite sure how. This guide should be your answer. Thi ...
https://www.eeworm.com/dl/542/433158.html
下载: 116
查看: 1058

VC书籍 C is a general-purpose programming language. It has been closely associated with the UNIX operating

C is a general-purpose programming language. It has been closely associated with the UNIX operating system where it was developed, since both the system and most of the programs that run on it are written in C. The language, however, is not tied to any one operating system or machine and although i ...
https://www.eeworm.com/dl/686/440184.html
下载: 190
查看: 1125

Java编程 Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/

Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/e)x] step3:Slove x=1/F(u) step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn step5:If the first packet was generated at time [0], than the second packet will be generated at time ...
https://www.eeworm.com/dl/633/444481.html
下载: 109
查看: 1142

嵌入式Linux Understanding the Linux Kernel helps readers understand how Linux performs best and how it meets th

Understanding the Linux Kernel helps readers understand how Linux performs best and how it meets the challenge of different environments. The authors introduce each topic by explaining its importance, and show how kernel operations relate to the utilities that are familiar to Unix programmers and us ...
https://www.eeworm.com/dl/653/454103.html
下载: 161
查看: 1048

文件格式 1. Download the version you want: * Version 1.3.4 (30 Aug 2007) -- this is the latest v

1. Download the version you want: * Version 1.3.4 (30 Aug 2007) -- this is the latest version for UNIX/Linux and Windows * Previous versions 2. Unzip the file, which will create a directory called klt and place all the files there 3. Compile and run the code * ...
https://www.eeworm.com/dl/639/454385.html
下载: 41
查看: 1050

通讯编程文档 This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the

This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the computer networking industry to receive data at a particular frequency and transmit them at another frequency. An asynchronous FIFO has two different clocks: one for read and one for write.
https://www.eeworm.com/dl/646/454681.html
下载: 108
查看: 1048

其他书籍 This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering

This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering large sets of data, and analyzing these data sets to gain useful business understanding. The book is organized in three parts. Part I introduces concepts. Part II describes and demonstrates basic data ...
https://www.eeworm.com/dl/542/455926.html
下载: 112
查看: 1152

加密解密 VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li

VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipeline ...
https://www.eeworm.com/dl/519/457412.html
下载: 144
查看: 1063