搜索资源列表
unreliable
- This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is not le
eightpts_optiflow
- there are two parts in these codes. the first implements an eight point algorithm which is used to compute the fundamental matrix in computer vision. the second is used to compute the optical flow and the unreliable regi
Embedded.Controller.Hardware.Design
- A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes
passfile4
- 密码框,想必大家都很熟悉了吧?上网时,我们就要在密码框中输入我们的账号密码。 不知你有没有发现,这个至关重大的密码框,盖茨老总竟如此不负责,把它做得如此不可靠,别人可以随随便便把你的密码拿走。不信,咱们做个实验。-password box, you must be very familiar with it by now? Internet, we will have the password box into our accoun
passfile4
- 密码框,想必大家都很熟悉了吧?上网时,我们就要在密码框中输入我们的账号密码。 不知你有没有发现,这个至关重大的密码框,盖茨老总竟如此不负责,把它做得如此不可靠,别人可以随随便便把你的密码拿走。不信,咱们做个实验。-password box, you must be very familiar with it by now? Internet, we will have the password box into our accoun
unreliable
- This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is not le
communication
- 这是一个学习WinSocket编程的程序,它由3部分组成,一是发送Sender的程序,另一个是接收Receiver的程序,还有一个是信道channel。发送方发送的数据需要经过信道才能够被接收方接收到。这个信道是一个模拟信道,可以自由设置它成为可靠或者不可靠,在不可靠时又有几种情况。这些都是为了能够更好地去理解数据链路层的编程,对学习很有帮助。-This is a learning process WinSocket programmi
ErrRbstSpiht
- 用于SPIHT压缩图像在不可靠信道,比如无线或丢包信道上传输的差错鲁棒性检测的工具代码-SPIHT image compression for unreliable channels, such as wireless or packet loss channel transmission error robustness testing tool for code
eightpts_optiflow
- there are two parts in these codes. the first implements an eight point algorithm which is used to compute the fundamental matrix in computer vision. the second is used to compute the optical flow and the unreliable regi
Embedded.Controller.Hardware.Design
- A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes
tcp
- TCP数据包的填充并发送,考虑到课设并没有严格要求我们成功发送到目的地,所以利用函数sendto()来实现数据包的发送,这种方式不可靠,只能保证数据是否从源地发送出去,至于有没有到达目的地就不管了。-TCP packet and send the filled, taking into account the lessons did not set strict demands of our success is sent to the
udp
- 网络编程 udp扫描 不可靠的连接 无conecct函数-Network programming udp scan unreliable connections no conecct function
linux_network_UDP
- 这是一款很通用的linux下的UDP通讯编程。适合于嵌入式linux平台不可靠网络通讯的开发等相关研究。-This is a very common UDP communications under linux programming. Suitable for embedded linux platform unreliable network communications development and other related
Server.java
- 不可靠传输协议,可靠用户数据报协议(RUDP)是一种基于可靠数据协议 (RDP: RFC908 和 1151 (第二版 )) 的简单分组传输协议。作为一个可靠传输协议, RUDP 用于传输 IP 网络间的电话信号。 -Unreliable transport protocol, reliable User Datagram Protocol (RUDP) is based on reliable data protocol (RDP
VC6.0Example_of_communication_based_UDP
- UDP是一种面向非连接,不可靠的通讯协议。其可靠性虽然不及TCP,但传输效率高,所以在偏重效率而对可靠性要求不高的场合,UDP被广泛应用。本文主要讨论udp通讯的过程并做了一个测试例程。希望对大家有帮助。-UDP is a non-connection-oriented, unreliable communication protocol. Although less than the reliability of TCP, but
AT45DB161
- 1、直到批号为0645的片子,chip erase指令还是不可靠的, 这在datasheet 52页有描述。 2、芯片的页大小寄存器只能写一次(OTP), 如果配置为每页512字节后就再也不能写回每页528字节了。 3、网上很多例程是旧版的161B的程序,跟161D操作指令有不少差别, ATMEL已经不建议使用这些旧指令了, 移植的时候注意对照DATASHEET修改过来。 4、写入
UDP
- 用UDP实现可靠文件传输 大家都清楚,如果用TCP传输文件的话,是很简单的,根本都不用操心会丢包,除非是网络坏了,就得重来。用UDP的话,因为UDP是不可靠的,所以用它传输文件,要保证不丢包,就得我们自己写额外的代码来保障了-Use UDP to achieve a reliable file transfer we all know that if we use TCP to transfer files, it will
StereoRegion1
- 基于区域的立体匹配算法 本算法从两幅彩色立体图像对中提取深度信息,使用过滤器消除视差图深度估计中的不稳定性。-Region Based Stereo Matching Algorithms region based stereo matching algorithms are developed for extraction depth information from two color stereo image
Unreliable_Guide_To_Locking(CN)
- Unreliable Guide to Kernel Locking
Chapters_11-13_from_Pages_from_Internetworking_wi
- We have said that protocols allow one to specify or understand communication without knowing the details of a particular vendor s network hardware. They are to computer communication what programming languages are to