This book provides information about the concepts and procedures needed by a developer of messaging applications in a Sun™ ONE Message Queue (MQ) environment. This preface contains the following sections: • Audience for This Guide • Organization of This Guide • Conventions • Other Documentation Resources
标签: information procedures developer messaging
上传时间: 2013-12-14
上传用户:netwolf
Cracking the Code - Wireless Programming with J2ME This book is based on the unique concept of cracking the code and mastering the technology.The technologies covered are J2ME version 1.0.2 and the applications are also tested on version 1.0.3 Beta.
标签: Programming the Cracking Wireless
上传时间: 2015-08-20
上传用户:fhzm5658
/* * EULER S ALGORITHM 5.1 * * TO APPROXIMATE THE SOLUTION OF THE INITIAL VALUE PROBLEM: * Y = F(T,Y), A<=T<=B, Y(A) = ALPHA, * AT N+1 EQUALLY SPACED POINTS IN THE INTERVAL [A,B]. * * INPUT: ENDPOINTS A,B INITIAL CONDITION ALPHA INTEGER N. * * OUTPUT: APPROXIMATION W TO Y AT THE (N+1) VALUES OF T. */
标签: APPROXIMATE ALGORITHM THE SOLUTION
上传时间: 2015-08-20
上传用户:zhangliming420
This book contains a detailed analysis of the International Standard for the C language,-3.1 excluding the library from a number of perspectives. The organization of the material is unusual in that it is based on the actual text of the published C Standard. The unit of discussion is the individual sentences from the C Standard (2022 of them). Readers are assumed to have more than a passing familiarity with C.
标签: International the Standard analysis
上传时间: 2015-09-15
上传用户:13188549192
This book code procedure according to the chapter arrangement, the 1st chapter of example under "1" the table of contents, the 2nd chapter of example under "2" the table of contents, to the order analogizes. Under corresponding table of contents including Java source code document and by it correspondence translation class document. The reader may use software and so on the text editor opens the Java source code document, examines this book the detailed code. 13th chapter the code defers to the project project laying aside. May directly use NetBeans to open the project document to carry on the code examination.
标签: chapter arrangement according procedure
上传时间: 2014-11-01
上传用户:希酱大魔王
The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra- group similarity while minimizing the inter-group similarity. The first and foremost question needed to be considered in clustering W b sessions is how to measure the similarity between Web sessions.However.there are many shortcomings in traditiona1 measurements.This paper introduces a new method for measuring similarities between Web pages that takes into account not only the URL but also the viewing time of the visited web page.Yhen we give a new method to measure the similarity of Web sessions using sequence alignment and the similarity of W eb page access in detail Experiments have proved that our method is valid and e币cient.
标签: sessions clustering similarity Web
上传时间: 2014-01-11
上传用户:songrui
Produce Java classes to calculate and display the root of a quadratic equation when input the coefficients a, b and c within the range of -100 to 100 by user.
标签: calculate the quadratic equation
上传时间: 2014-01-17
上传用户:aappkkee
The W3C DOM Core interfaces defines a minimal set of: A. interfaces for accessing and manipulating document objects B. Java object implementations for use with XML parsers. C. Conventions and processes for creating live HTML pages. D. Mutable document
标签: interfaces A. manipulating accessing
上传时间: 2017-01-24
上传用户:edisonfather
汉诺塔!!! Simulate the movement of the Towers of Hanoi puzzle Bonus is possible for using animation eg. if n = 2 A→B A→C B→C if n = 3 A→C A→B C→B A→C B→A B→C A→C
标签: the animation Simulate movement
上传时间: 2017-02-11
上传用户:waizhang
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
标签: effectiveness analytically numerically cloaking
上传时间: 2017-03-30
上传用户:zxc23456789