WiseMAC is a medium access control protocol designed for the WiseNETTMwireless sensor network. It is based on CSMA and uses the preamble sampling technique to minimize the power consumed when listening to an idle medium.
标签: WiseNETTMwireless designed protocol WiseMAC
上传时间: 2014-01-20
上传用户:x4587
Like many of my colleagues in this industry, I learned Windows programming from Charles Petzold s Programming Windows—a classic programming text that is the bible to an entire generation of Windows programmers. when I set out to become an MFC programmer in 1994, I went shopping for an MFC equivalent to Programming Windows. After searching in vain for such a book and spending a year learning MFC the old-fashioned way, I decided to write one myself. It s the book you hold in your hands. And it s the book I would like to have had when I was learning to program Windows the MFC way.
标签: programming colleagues industry Charles
上传时间: 2014-01-10
上传用户:曹云鹏
The running time of quicksort can be improved in practice by taking advantage of the fast running time of insertion sort when its input is “nearly” sorted. when quicksort is called on a subarray with fewer than k elements, let it simply return without sorting the subarray. After the top-level call to quicksort returns, run insertion sort on the entire array to finish the sorting process.
标签: running advantage quicksort improved
上传时间: 2013-12-01
上传用户:梧桐
Behavioral models are used in games and computer graphics for realistic simulation of massive crowds. In this paper, we present a GPU based implementation of Reynolds [1987] algorithm for simulating flocks of birds and propose an extension to consider environment self occlusion. We performed several experiments and the results showed that the proposed approach runs up to three times faster than the original algorithm when simulating high density crowds, without compromising significantly the original crowd behavior.
标签: Behavioral simulation realistic computer
上传时间: 2017-09-08
上传用户:hanli8870
As a general rule, PhD students and their supervisors tend to focus primarily, or even exclusively, on the content of the research that will go into the doctoral thesis. Other issues are often taken for granted: how to organize your work, give a presentation, work in a team, cope with your supervisor, and how to effectively manage your time.when asked, former PhD students usually claim that the general experience of being a graduate student, which includes learning how to solve complex problems and work well with others, was of greater value to their careers than the actual topic of their thesis.
标签: exclusively supervisors primarily students
上传时间: 2013-12-16
上传用户:qlpqlq
These codes require an ASCII input file called input.dat of the following form: Lower Limit on x Upper Limit on x Final Time Pressure for x<0 when t=0 Density for x<0 when t=0 Speed for x<0 when t=0 Pressure for x>0 when t=0 Density for x>0 when t=0 Speed for x>0 when t=0 These codes produce 8 ASCII output files: density.out. Density vs. x entropy.out. Entropy vs. x mach.out. Mach number vs. x massflux.out. Mass flux vs. x pressure.out. Pressure vs. x sound.out. Speed-of-sound vs. x velocity.out. Velocity vs. x waves.out. A description of the solution in terms of the three waves defined in the book (+,-,0).
标签: input following require called
上传时间: 2017-09-21
上传用户:希酱大魔王
as a message came into prominence with the publication in 1948 of an influential paper by Claude Shannon, "A Mathematical Theory of Communication." This paper provides the foundations of information theory and endows the word information not only with a technical meaning but also a measure. If the sending device is equally likely to send any one of a set of N messages, then the preferred measure of "the information produced when one message is chosen from the set" is the base two logarithm of N (This measure is called self-information). In this paper, Shannon cont
标签: influential publication prominence message
上传时间: 2014-01-21
上传用户:2404
this is for usart when enable it.
上传时间: 2015-03-10
上传用户:13589202641
A design about 8051 (running at 12MHz) based system with 3 7-Seg displays and two buttons to implement the following functions. 1. when press the + button, the display C = A+B. 2. when press the button, the display C = A - B. “A” and “B” are 8-bit inputs when “C” is 9-bit output.
上传时间: 2015-05-05
上传用户:guoxiy
Collection of key-value pairs. TDictionary represents a generic collection of key-value pairs. This class provides a mapping from a collection of keys to a collection of values. when you create a TDictionary object, you can specify various combinations of initial capacity, equality operation, and initial content. You can add a key that is associated with a corresponding value with the Add or AddOrSetValue methods. You can remove entries with Remove or Clear, which removes all key-value pairs. Adding or removing a key-value pair and looking up a key are efficient, close to O(1), because keys are hashed. A key must not be nil (though a value may be nil) and there must be an equality comparison operation for keys. You can test for the presence or keys and values with the TryGetValue, ContainsKey and ContainsValue methods. The Items property lists all Count dictionary entries. You can also set and get values by indexing the Items property. Setting the value this way overwrites any existing value. The class TObjectDictionary inherits from TDictionary and provides an automatic mechanism for freeing objects removed from dictionary entries.
标签: Delphi 泛型
上传时间: 2015-07-01
上传用户:mirage