DISTRIBUTED

共 208 篇文章
DISTRIBUTED 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 208 篇文章,持续更新中。

This book is distributed in the hope it will be useful, but without any warranty, without even the i

This book is distributed in the hope it will be useful, but without any warranty, without even the implied warranty of merchantability or fitness for a particular purpose.

an external program called from Adam s FitnessFunction class in order to evaluate the fitness of a

an external program called from Adam s FitnessFunction class in order to evaluate the fitness of a genome within a distributed grid.

This book presents an insightful view of XML that places this emerging technology in the context of

This book presents an insightful view of XML that places this emerging technology in the context of the ongoing Web revolution. Written for business and technical professionals, this book revals the t

解释绑定的原理

解释绑定的原理,Distributed interactive simulation system/High level architrcture

unRAR - free utility for RAR archives The unRAR utility is a freeware program, distributed with so

unRAR - free utility for RAR archives The unRAR utility is a freeware program, distributed with source code and developed for extracting, testing and viewing the contents of archives created with th

This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY without ev

This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

本文介绍了Dos(Denial of severance 拒绝服务)和Ddos(Distributed Denial of Severance 分布式拒绝服务)网络攻击的原理和c语言实现。并且在着重分

本文介绍了Dos(Denial of severance 拒绝服务)和Ddos(Distributed Denial of Severance 分布式拒绝服务)网络攻击的原理和c语言实现。并且在着重分析SYN-flooding的基础之上,介绍了UDP-flooding和Icmp-flooding攻击,并做出比较。最后,就软件防火墙对于Dos Ddos攻击的过滤给出了相应对策。 关键字:Dos D

Distributed Data Warehousing

Distributed Data Warehousing

Distributed computing with hierarchical master-worker paradi.pdf

Distributed computing with hierarchical master-worker paradi.pdf

/* This program generates the DApkg.vhd file that is used to define * the DA filter core and give

/* This program generates the DApkg.vhd file that is used to define * the DA filter core and gives its parameters and the contents of the * Distributed Arithmetic Look-up-table "DALUT" according

ARTMAP source code. include: Fuzzy ARTMAP, Default ARTMAP, Instance-Counting ARTMAP, Distributed ART

ARTMAP source code. include: Fuzzy ARTMAP, Default ARTMAP, Instance-Counting ARTMAP, Distributed ARTMAP

java network programming and distributed computing java network programming and distributed computin

java network programming and distributed computing java network programming and distributed computing

The Hopfield model is a distributed model of an associative memory. Neurons are pixels and can take

The Hopfield model is a distributed model of an associative memory. Neurons are pixels and can take the values of -1 (off) or +1 (on). The network has stored a certain number of pixel patterns. During

*西门子6688上使用 * konGPS.java * * Implementation of konGPS for Siemens SL45i * * Copyright (C) 2002

*西门子6688上使用 * konGPS.java * * Implementation of konGPS for Siemens SL45i * * Copyright (C) 2002-2003 by KoncaOnLine (http://www.konca.com). * * Author: Konca Fung (konca@tom.com) * * This pro

VIP专区-嵌入式/单片机编程源码精选合集系列(77)

<b>VIP专区-嵌入式/单片机编程源码精选合集系列(77)</b><font color="red">资源包含以下内容:</font><br/>1. 基于arm3000列表框控件的设置基于arm3000列表框控件的实现.<br/>2. c51 book very good for 51 study.<br/>3. 立宇泰的2410实验板的测试代码,包括各个硬件部分的使用.<br/>4. 这是一个

Distributed Computing Principles

istributed Computing Principles, Algorithms, and Systems

LineWatcher dials your ISP, keeps your connection alive and logs errors. Originally distributed as f

LineWatcher dials your ISP, keeps your connection alive and logs errors. Originally distributed as freeware, this program counts over 10.000 downloads since its first release in 2001. See home page ht

The data files included are .MAT or *.dat (ASCII)files. The m-files and the data may be distributed

The data files included are .MAT or *.dat (ASCII)files. The m-files and the data may be distributed, provided that the source is acknowledged in any publication and the data are not sold. Since this

This code was used to produce simulation results described in: Using Directional Antennas to Pre

This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symp

The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, wh

The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In ad