搜索结果
找到约 10 项符合
sessions 的查询结果
Internet/网络编程 Client/server communication, automated telnet sessions, wake on lan, winsock communications using th
Client/server communication, automated telnet sessions, wake on lan, winsock communications using this easy to use component
行业发展研究 The task of clustering Web sessions is to group Web sessions based on similarity and consists of max
The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra-
group similarity while minimizing the inter-group similarity.
The first and foremost question needed to be considered in clustering
W b sessions is how to measure the similarity be ...
Linux/Unix编程 LibTorrent is a BitTorrent library written in C++ for *nix, with a focus on high performance and goo
LibTorrent is a BitTorrent library written in C++ for *nix, with a focus on high performance and good code. The library differentiates itself from other implementations by transfering directly from file pages to the network stack. On high-bandwidth connections it is able to seed at 3 times the speed ...
Linux/Unix编程 · Develop clear, readable, well-documented and well-designed programs in the C Programming Language.
· Develop clear, readable, well-documented and well-designed programs in the C Programming Language.
· Develop software in the Unix/Linux using tools such as gcc, gdb, and make.
· Locate and interpreting “man pages” applicable to application-level system programming.
· Use the POSIX/Unix A ...
网络 KPhoneIM is a simple point to point instant messaging application. You may chat with (exactly) one p
KPhoneIM is a simple point to point instant messaging application. You may chat with (exactly) one partner directly. The tool needs no server. It may be called from KPhoneSI as external session. Indeed, I develloped the tool mainly to demonstrate KPhoneSI s concept of external sessions!
行业发展研究 A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log
A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain
mode1 based on ontology semantic measurement is used to identi.
ing which active session a request should belong to.The corn— ...
网络 xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunne
xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661).
L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user
sessions from dial-in servers (modem banks, ADSL DSLAMs) to back-end PPP
servers. Another important application is Virtual Private Networks where
the I ...
书籍 Multicarrier+Techniques+for+4G
At recent major international conferences on wireless communications,
there have been several sessions on beyond third generation (3G) or fourth
generation(4G)mobilecommunicationssystems,wheremodulation/demod-
ulation and multiplexing/multiple access schemes related to multicarrier
techniques have d ...
书籍 Control+Design+Techniques
This book is intended for researchers, teachers, and students willing to ex-
plore conceptual bridges between the fields of Automatic Control and Power
Electronics. The need to bring the two disciplines closer has been felt, for
many years, both by Power Electronics specialists and by Automatic Cont ...