DISTRIBUTED
共 208 篇文章
DISTRIBUTED 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 208 篇文章,持续更新中。
This book is distributed in the hope it will be useful, but without any warranty, without even the i
This book is distributed in the hope it will be useful, but without any warranty, without even the implied
warranty of merchantability or fitness for a particular purpose.
an external program called from Adam s FitnessFunction class in order to evaluate the fitness of a
an external program called from Adam s FitnessFunction class in
order to evaluate the fitness of a genome within a distributed grid.
This book presents an insightful view of XML that places this emerging technology in the context of
This book presents an insightful view of XML that places this emerging technology in the context of the ongoing Web revolution. Written for business and technical professionals, this book revals the t
解释绑定的原理
解释绑定的原理,Distributed interactive simulation system/High level architrcture
unRAR - free utility for RAR archives The unRAR utility is a freeware program, distributed with so
unRAR - free utility for RAR archives
The unRAR utility is a freeware program, distributed with source code and developed for extracting, testing and viewing the contents of archives created with th
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY without ev
This library is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
本文介绍了Dos(Denial of severance 拒绝服务)和Ddos(Distributed Denial of Severance 分布式拒绝服务)网络攻击的原理和c语言实现。并且在着重分
本文介绍了Dos(Denial of severance 拒绝服务)和Ddos(Distributed Denial of Severance 分布式拒绝服务)网络攻击的原理和c语言实现。并且在着重分析SYN-flooding的基础之上,介绍了UDP-flooding和Icmp-flooding攻击,并做出比较。最后,就软件防火墙对于Dos Ddos攻击的过滤给出了相应对策。
关键字:Dos D
Distributed Data Warehousing
Distributed Data Warehousing
Distributed computing with hierarchical master-worker paradi.pdf
Distributed computing with hierarchical master-worker paradi.pdf
/* This program generates the DApkg.vhd file that is used to define * the DA filter core and give
/* This program generates the DApkg.vhd file that is used to define
* the DA filter core and gives its parameters and the contents of the
* Distributed Arithmetic Look-up-table "DALUT" according
ARTMAP source code. include: Fuzzy ARTMAP, Default ARTMAP, Instance-Counting ARTMAP, Distributed ART
ARTMAP source code. include: Fuzzy ARTMAP, Default ARTMAP, Instance-Counting ARTMAP, Distributed ARTMAP
java network programming and distributed computing java network programming and distributed computin
java network programming and distributed computing java network programming and distributed computing
The Hopfield model is a distributed model of an associative memory. Neurons are pixels and can take
The Hopfield model is a distributed model of an associative memory. Neurons are pixels and can take the values of -1 (off) or +1 (on). The network has stored a certain number of pixel patterns. During
*西门子6688上使用 * konGPS.java * * Implementation of konGPS for Siemens SL45i * * Copyright (C) 2002
*西门子6688上使用
* konGPS.java
*
* Implementation of konGPS for Siemens SL45i
*
* Copyright (C) 2002-2003 by KoncaOnLine (http://www.konca.com).
*
* Author: Konca Fung (konca@tom.com)
*
* This pro
VIP专区-嵌入式/单片机编程源码精选合集系列(77)
<b>VIP专区-嵌入式/单片机编程源码精选合集系列(77)</b><font color="red">资源包含以下内容:</font><br/>1. 基于arm3000列表框控件的设置基于arm3000列表框控件的实现.<br/>2. c51 book very good for 51 study.<br/>3. 立宇泰的2410实验板的测试代码,包括各个硬件部分的使用.<br/>4. 这是一个
Distributed Computing Principles
istributed Computing
Principles, Algorithms, and Systems
LineWatcher dials your ISP, keeps your connection alive and logs errors. Originally distributed as f
LineWatcher dials your ISP, keeps your connection alive and logs errors. Originally distributed as freeware, this program counts over 10.000 downloads since its first release in 2001. See home page ht
The data files included are .MAT or *.dat (ASCII)files. The m-files and the data may be distributed
The data files included are .MAT or *.dat (ASCII)files. The m-files and the
data may be distributed, provided that the source is acknowledged in any
publication and the data are not sold. Since this
This code was used to produce simulation results described in: Using Directional Antennas to Pre
This code was used to produce simulation results described in:
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu and David Evans. Network and Distributed System Security
Symp
The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, wh
The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In ad