搜索结果: 1-15 共查到“计算机科学技术 access”相关记录29条 . 查询时间(6.062 秒)
山东大学计算机网络课件 Medium Access Control Sublayer。
Ohio Supercomputer Center releases open-source HPC access portal
Ohio Supercomputer Center open-source HPC access portal
2017/9/20
An innovative web-based portal for accessing high performance computing services has matured beyond the beta phase and now is available to HPC centers worldwide.The Ohio Supercomputer Center (OSC) has...
安徽师范大学计算机基础(公共课)课件第6章 Access 2003
安徽师范大学 计算机 课件 第6章 Access 2003
2017/1/14
安徽师范大学计算机基础(公共课)课件第6章 Access 2003。
Tumble! Splat! Helping Users Access and Manipulate Occluded Content in 2D Drawings
Layer management 2D drawing occlusion interaction technique
2016/5/24
Accessing and manipulating occluded content in layered 2D drawings
can be difficult. This paper characterizes a design space of
techniques that facilitate access to occluded content. In addition,
w...
Interoperable Image Data Access through ArcGIS Server
OGC Standard Interoperability Web Service Web Coverage Service Arcgis Server
2015/12/18
As networking and data storage technologies advance, web services have become a commonplace for data mining and sharing in an e-business model. Compared with business information, geospatial informati...
宁夏大学数学计算机学院计算机网络课件第四章 The Medium Access Control
宁夏大学 数学计算机学院 计算机网络 课件 第四章 The Medium Access Control
2015/8/24
宁夏大学数学计算机学院计算机网络课件第四章 The Medium Access Control。
Generalized access control strategies for integrated services token passing systems
Integrated services LAN application factory automation distributed computing multimedia communication
2015/8/12
The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and mu...
ARCHER:Using Symbolic,Path-sensitive Analysis to Detect Memory Access Errors
ARCHER Using Symbolic Path-sensitive Analysis Detect Memory Access Errors
2015/8/7
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER usespath-sensitive, interprocedural s...
Heterogeneous Graphene Nanoribbon-CMOS Multi-State Volatile Random Access Memory Fabric
Graphene GNTRAM heterogeneous memory multistate memory graphene nanoribbons
2014/12/8
CMOS SRAM area scaling is slowing down due to several challenges faced by transistors at nanoscale such as increased leakage. This calls for new concepts and technologies to overcome CMOS scaling limi...
Partnerships for computer science education: Improving access at the K-12 levels
computer science education K-12 levels
2014/12/30
The National Science Foundation (NSF) and the White House Office of Science and Technology Policy (OSTP) kicked off Computer Science Education Week today with an event in Washington, D.C., celebrating...
Uniform Language Resource Access and Distribution
Uniform Language Resource Access Distribution
2014/3/20
The reuseability and accessibility of lexical and linguistic resources often requires substantial programming overhead and detailed
knowledge of the structure and nature of resource-specific in...
Visualization Analysis of Multi-Domain Access Control Policy Integration Based on Tree-Maps and Semantic Substrates
Cross-Domain Information Exchange Visualization Analysis Tree-Maps Semantic Substrates
2013/1/28
The complexity of multi-domain access control policy integration makes it difficult to understand and manage the policy conflict information. The policy information visualization technology can expres...
Dynamic Contention Resolution in Multiple-Access Channels
Contention Resolution Multiple-Access Channel Radio Networks Distributed Algorithm Randomized Algorithm.
2012/12/3
Contention resolution over a multiple-access channel can be modeled as a k-selection problem in wireless networks, where a subsetk of n network nodes want to broadcast their messages over a shared cha...
Cops, Computers and the Right to Privacy in the Information Age: unauthorised access and inapropriate disclosure of information complaints in New South Wales
police computer access
2009/12/9
The term the 'information age' is particularly applicable to Australia. In a recent email, the Australian Institute of Criminology's Chief Librarian, John Myrtle, passed on statistics which showed tha...