Welcome![Sign In][Sign Up]
Location:
Search - network designing

Search list

[Exploitsafety

Description: 信息网络安全方案(计算机安全论文:设计一个信息网络安全方案)。-information network security program (computer security thesis : designing an information network security solutions).
Platform: | Size: 8132 | Author: 王成 | Hits:

[Develop Toolscpp_network_prog_volume2

Description: C++ Network Programming, Volume 2, focuses on ACE frameworks, providing thorough coverage of the concepts, patterns, and usage rules that form their structure. This book is a practical guide to designing object-oriented frameworks and shows developers how to apply frameworks to concurrent networked applications. C++ Networking, Volume 1, introduced ACE and the wrapper facades, which are basic network computing ingredients. Volume 2 explains how frameworks build on wrapper facades to provide higher-level communication services.
Platform: | Size: 2253557 | Author: sherry | Hits:

[JSP/JavajaNet

Description: JaNet: Java Neural Network Toolkit resume: A well documented toolkit for designing and training, and a java library for inclusion in third party programs. description: jaNet package is a java neural network toolkit, which you can use to design, test, train and optimize an ideal Neural Network for your private application. You can then include your saved network in your program using the jaNet.backprop package. The consequent documentation is only in french for the moment, but an english translation is planned. The java source code is released under GPL, and can be compiled with JDK, Symantec Cafe or MS Visual J
Platform: | Size: 117832 | Author: desertwing | Hits:

[Bookscpp_network_prog_volume2

Description: C++ Network Programming, Volume 2, focuses on ACE frameworks, providing thorough coverage of the concepts, patterns, and usage rules that form their structure. This book is a practical guide to designing object-oriented frameworks and shows developers how to apply frameworks to concurrent networked applications. C++ Networking, Volume 1, introduced ACE and the wrapper facades, which are basic network computing ingredients. Volume 2 explains how frameworks build on wrapper facades to provide higher-level communication services.
Platform: | Size: 2252800 | Author: sherry | Hits:

[SCMOReilly.Designing.Embedded.Hardware.May.2005.eBook

Description: John Catsoulis编写的Designing Embedded Hardware 。介绍了汇编语言,SPI,I2C,串口,usb,网口等硬件电路设计。模拟电路设计,AVR单片机原理-John Catsoulis prepared Designing Embedded Hardware. Introduction of assembly language, SPI, I2C, serial, usb, network hardware such as circuit design of the mouth. Analog circuit design, AVR Singlechip Principle
Platform: | Size: 4277248 | Author: 汤林 | Hits:

[JSP/JavajaNet

Description: JaNet: Java Neural Network Toolkit resume: A well documented toolkit for designing and training, and a java library for inclusion in third party programs. description: jaNet package is a java neural network toolkit, which you can use to design, test, train and optimize an ideal Neural Network for your private application. You can then include your saved network in your program using the jaNet.backprop package. The consequent documentation is only in french for the moment, but an english translation is planned. The java source code is released under GPL, and can be compiled with JDK, Symantec Cafe or MS Visual J
Platform: | Size: 117760 | Author: desertwing | Hits:

[Program docDesigning_PROFIBUS_Network

Description: Designing and Modeling PROFIBUS Network
Platform: | Size: 313344 | Author: AZ | Hits:

[Internet-NetworkImplementation_of_CSMA

Description: 无限局域网MAC层的CSMA协议的三种实现方法,使用java完成,三种分别是NonePersistent,NonePersistent1和OnePersistent,是无线MAC设计的良好参考代码-Wireless network CSMA implementation using Java,containing NonePersistent,NonePersistent1 and OnePersistent,very useful when designing MAC layer protocol.
Platform: | Size: 6144 | Author: kabiluofu | Hits:

[OtherDesigning

Description: Designing Embedded Hardware(pic,avr,68h,msp430..) about IrDA,USB,Network,RS232,RS485
Platform: | Size: 4526080 | Author: huynh lam | Hits:

[OtherNetwork-Algorithmics-An-Interdisciplinary-Approach

Description: 交换技术经典外文教材,适用于电脑网络,通信技术-In designing a network device, you make dozens of decisions that affect the speed with which it will performsometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principlesranging from the commonly recognized to the groundbreakingthat are key to breaking these bottlenecks.The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who ha
Platform: | Size: 2243584 | Author: opaque | Hits:

[Internet-NetworkThe-designing-of-the-network

Description: 网络程序设计的小例子 根据里面的教程ppt有单独的学习代码。适合初学者-Small example of network programming tutorial ppt under which a separate study code. For beginners
Platform: | Size: 1377280 | Author: JAY | Hits:

[Software EngineeringTopology-Network-Algrithm

Description: 设计传感器网络时需要考虑到的移动网络自组功能,这是一个拓扑结构的算法说明,可以利用嵌入式开发的手段实现,不过网络层会比较麻烦。-Be considered when designing sensor networks to mobile networks from the set of functions, this algorithm is a topology that can be achieved by means of embedded development, but the network layer would be more trouble.
Platform: | Size: 181248 | Author: dimitri | Hits:

[Internet-NetworkCPP-Network-Programming-Volume-1-CBT

Description: C++网络编程资料参考书,全英文版。主要阐述了通讯环境编程所需的完全的开发工具,以及ACE体系结构的编程。-C++ Network Programming Volume II- Systematic Reuse with ACE and Frameworks The ADAPTIVE Communication Environment (ACE) is an open-source toolkit for building high-performance networked applications and next generation middleware. This book focuses on ACE frameworks, covering the concepts, patterns, and usage rules that form their structure. It offers a practical guide to designing object-oriented frameworks and shows developers how to apply frameworks to concurrent networked applications, explaining how frameworks build on wrapper facades to provide higher-level communication services. Huston is president and CEO of a technical support and consulting firm. Volume 2 picks up where volume 1 left off, and guides C++ programmers through using the Adaptive Communication Environment (ACE), the most complete toolkit available for networked programming.
Platform: | Size: 3518464 | Author: james zhang | Hits:

[Windows MobileDesigning-a-Wireless-Network

Description: • Step-by-Step Instructions for Designing a Wireless Project from Inception to Completion • Everything You Need to Know about Bluetooth,LMDS, 802.11, and Other Popular Standards • Complete Coverage of Fixed Wireless,Mobile Wireless, and Optical Wireless Technology-• Step-by-Step Instructions for Designing a Wireless Project from Inception to Completion • Everything You Need to Know about Bluetooth,LMDS, 802.11, and Other Popular Standards • Complete Coverage of Fixed Wireless,Mobile Wireless, and Optical Wireless Technology
Platform: | Size: 3803136 | Author: brite | Hits:

[Program docDesigning.a.Wireless.Network

Description: This book is very nice for designing a wireless network which describes in details how the wireless systems are designed.
Platform: | Size: 4532224 | Author: abebe | Hits:

[Crack HackCisco---Designing-Network-Security-(2)

Description: Throughout this book, authentication, authorization, and access control are incorporated into the concept of identity. Although these concepts are distinct, they all pertain to each individual user of the network---be it a person or device.
Platform: | Size: 754688 | Author: Mayank | Hits:

[Software Engineeringdesigning-the-network-topology-for-the-cluster.ra

Description: designing the network topology for the cluster
Platform: | Size: 534528 | Author: faust | Hits:

[DocumentsDesigning-A-Multipath---AODV

Description: Designing A Multipath Routing protocol Basedon AODV For Load Balancing In Mobile AD HOC Network (Persian Article)-Designing A Multipath Routing protocol Basedon AODV For Load Balancing In Mobile AD HOC Network (Persian Article)
Platform: | Size: 479232 | Author: yasoob_dear | Hits:

[CommunicationPython-network-programming

Description: This book is presenting a possible way of designing network-oriented applications using Python
Platform: | Size: 246784 | Author: hwangkiha | Hits:

[Network DevelopComputer Network

Description: This book is now in its fifth edition. Each edition has corresponded to a dif ferent phase in the way computer networks were used. When the first edition ap peared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in 1996, computer networks, especially the Internet, had become a daily reality for millions of people. By the fourth edition, in 2003, wire less networks and mobile computers had become commonplace for accessing the Web and the Internet. Now, in the fifth edition, networks are about content dis tribution (especially videos using CDNs and peer-to-peer networks) and mobile phones are small computers on the Internet. New in the Fifth Edition Among the many changes in this book, the most important one is the addition of Prof. David J. Wetherall as a co-author. David brings a rich background in net working, having cut his teeth designing metropolitan-area networks more than 20 years ago. He has worked with the Internet and wireless networks ever since and is a professor at the University of Washington, where he has been teaching and doing research on computer networks and related topics for the past decade. Of course, the book also has many changes to keep up with the: ever-changing world of computer networks. Among these are revised and new material on Wireless networks (802.12 and 802.16) The 3G networks used by smart phones RFID and sensor networks Content distribution using CDNs Peer-to-peer networks Real-time media (from stored, streaming, and live sources) Internet telephony (voice over IP) Delay-tolerant networks
Platform: | Size: 6765433 | Author: tareqemeish@gmail.com | Hits:
« 12 3 »

CodeBus www.codebus.net