The Business Benefits of EJB and J2EE Technologies over COM+ and Windows DNA This whitepaper highlights the business advantages of the J2EE architecture over Windows DNA. For a technical analysis of these two architectures, please see the accompanying whitepaper, The Technical Benefits of EJB and J2EE Technologies over COM+ and Windows DNA.
标签: Technologies whitepaper and Business
上传时间: 2014-01-17
上传用户:1427796291
A general technique for the recovery of signicant image features is presented. The technique is based on the mean shift algorithm, a simple nonparametric pro- cedure for estimating density gradients. Drawbacks of the current methods (including robust clustering) are avoided. Feature space of any nature can be processed, and as an example, color image segmentation is dis- cussed. The segmentation is completely autonomous, only its class is chosen by the user. Thus, the same program can produce a high quality edge image, or pro- vide, by extracting all the signicant colors, a prepro- cessor for content-based query systems. A 512 512 color image is analyzed in less than 10 seconds on a standard workstation. Gray level images are handled as color images having only the lightness coordinate
标签: technique presented features recovery
上传时间: 2015-10-14
上传用户:410805624
penMesh is a generic and efficient data structure for representing and manipulating polygonal meshes. OpenMesh is developed at the Computer Graphics Group, RWTH Aachen , as part of the OpenSGPlus project, is funded by the German Ministry for Research and Education ( BMBF), and will serve as geometry kernel upon which the so-called high level primitives (e.g. subdivision surfaces or progressive meshes) of OpenSGPlus are built. It was designed with the following goals in mind : Flexibility : provide a basis for many different algorithms without the need for adaptation. Efficiency : maximize time efficiency while keeping memory usage as low as possible. Ease of use : wrap complex internal structure in an easy-to-use interface.
标签: manipulating representing and efficient
上传时间: 2015-10-14
上传用户:米卡
INTERFACES FOR DIGITAL COMPONENT VIDEO SIGNALS IN 525-LINE AND 625-LINE TELEVISION SYSTEMS OPERATING AT THE 4:2:2 LEVEL OF RECOMMENDATION ITU-R BT.601
标签: LINE INTERFACES TELEVISION COMPONENT
上传时间: 2014-01-25
上传用户:trepb001
HDOJ ACM input:The input consists of T test cases. The number of test cases ) (T is given in the first line of the input. Each test case begins with a line containing an integer N , 1<=N<=200 , that represents the number of tables to move. Each of the following N lines contains two positive integers s and t, representing that a table is to move from room number s to room number t (each room number appears at most once in the N lines). From the N+3-rd line, the remaining test cases are listed in the same manner as above.
上传时间: 2015-10-18
上传用户:三人用菜
要学MFC必看之书,由Jeff Prosise编写。下面是作者前言: The production of this book required the efforts of many people, but two in particular deserve to be singled out for their diligent, sustained, and unselfish efforts. Sally Stickney, the book s principal editor, navigated me through that minefield called the English language and contributed greatly to the book s readability. Marc Young, whose talents as a technical editor are nothing short of amazing, was relentless in tracking down bugs, testing sample code, and verifying facts. Sally, Marc: This book is immeasurably better because of you. Thanks.
标签: MFC
上传时间: 2015-10-20
上传用户:waizhang
Verilog HDL: Magnitude For a vector (a,b), the magnitude representation is the following: A common approach to implementing these arithmetic functions is to use the Coordinate Rotation Digital Computer (CORDIC) algorithm. The CORDIC algorithm calculates the trigonometric functions of sine, cosine, magnitude, and phase using an iterative process. It is made up of a series of micro-rotations of the vector by a set of predetermined constants, which are powers of two. Using binary arithmetic, this algorithm essentially replaces multipliers with shift and add operations. In a Stratix™ device, it is possible to calculate some of these arithmetic functions directly, without having to implement the CORDIC algorithm.
标签: representation Magnitude the magnitude
上传时间: 2013-12-24
上传用户:金宜
This paper studies the problem of categorical data clustering, especially for transactional data characterized by high dimensionality and large volume. Starting from a heuristic method of increasing the height-to-width ratio of the cluster histogram, we develop a novel algorithm – CLOPE, which is very fast and scalable, while being quite effective. We demonstrate the performance of our algorithm on two real world
标签: data transactional categorical clustering
上传时间: 2015-10-24
上传用户:evil
In this first-ever paperback edition of his long-time best-seller, motivational speaker Steve Chandler helps you create an action plan for living your vision in business and in life. It features 100 proven methods to positively change the way you think and act-methods based on feedback from the hundreds of thousands of corporate and public seminar attendees Chandler speaks to each year. 100 Ways to Motivate Yourself will help you break through the negative barriers and banish the pessimistic thoughts that are preventing you from fulfilling your lifelong goals and dreams. Whether you re self-employed, a manager, or a high-level executive, it s still easy to get stuck in the daily routines of life, fantasizing about what could have been. Steve Chandler helps you turn that way of thinking around and make what could have been into what can and will be.
标签: motivational best-seller first-ever paperback
上传时间: 2015-10-26
上传用户:牛津鞋
Magenta Systems Internet Packet Monitoring Components are a set of Delphi components designed to capture and monitor internet packets using either raw sockets or the WinPcap device driver. Hardware permitting, ethernet packets may be captured and interpreted, and statistics maintained about the traffic. Uses of packet monitoring include totalling internet traffic by IP address and service, monitoring external or internal IP addresses and services accessed, network diagnostics, and many other applications. The component includes two demonstration applications, one that displays raw packets, the other that totals internet traffic. The components include various filters to reduce the number of packets that need to be processed, by allowing specific IP addresses to be ignored, LAN mask to ignore local traffic, and ignore non-IP traffic such as ARP.
标签: Components Monitoring components Internet
上传时间: 2015-10-30
上传用户:水中浮云