This paper first analyzes the basic concepts of Cisco router user certification, XTACACS certification protocol and describes the data architecture of user data protocol, then defines a kind of doubly temporal databas...
详细信息
This paper first analyzes the basic concepts of Cisco router user certification, XTACACS certification protocol and describes the data architecture of user data protocol, then defines a kind of doubly temporal databases and log-in transaction processing based on network management property, at last, introduces implementation technology and method.
The number of applications for central catadioptric systems, often called central panoramic systems, are increasing. Among these are surveillance systems, commercial systems for web navigation and robot localization a...
详细信息
The number of applications for central catadioptric systems, often called central panoramic systems, are increasing. Among these are surveillance systems, commercial systems for web navigation and robot localization a...
详细信息
This paper introduces the development of a programming environment, called D++, that increases the software development productivity for Digital Signal Processors (DSPs). D++, focuses in reducing the development time ...
详细信息
ISBN:
(纸本)1889335185
This paper introduces the development of a programming environment, called D++, that increases the software development productivity for Digital Signal Processors (DSPs). D++, focuses in reducing the development time of new projects by using the concepts of visual programming and object oriented programming, trying to be an alternative to the existing programming tools.
In this paper pseudo 3-D Hidden Markov Models (P3DHMMs) are applied to the task of dynamic facial expression recognition. P3DHMMs are an extension of the pseudo 2-D case, which has been successfully used for the class...
详细信息
The United States Army is designing and implementing a revolutionary advance in the combat power of individual infantrymen on the battlefield: Land Warrior. In Land Warrior, each soldier becomes a node in a wireless l...
详细信息
The United States Army is designing and implementing a revolutionary advance in the combat power of individual infantrymen on the battlefield: Land Warrior. In Land Warrior, each soldier becomes a node in a wireless local area network (WLAN). In order to account for likely losses of line of site between soldiers, the On Demand Multicast Routing Protocol (ODMRP) is used. The purpose of this research was to construct a simulation study to determine whether the communications architecture of Land Warrior was sufficiently scalable to use in large Army units. This paper describes the input analysis conducted to determine probability distributions used to generate message traffic. This paper also describes the development of the simulation model used to determine the scalability of the Land Warrior communications architecture.
The Rapid Prototyping (RP) process is evolving beyond just making three dimensional models and it is beginning to have an impact on tool construction. The sheet metal forming industries are reluctant to implement the ...
详细信息
Bounded Model Checking (BMC) is the problem of checking if a model satisfies a temporal property in paths with bounded length k. Propositional SAT-based BMC is conducted in a gradual manner, by solving a series of SAT...
详细信息
暂无评论