"Thisimportantvolumeisthefirstpartofatwo-parttextbook(thesecondpartisentitledConservationlawsandellipticequations).Thetextincludesinterestinghomeworkproblemsthatimplementdifferentaspectsofmostoftheschemesdiscussed.Theimplementationaspectofthistextincludesalargeamountofcomputing.Otherusefulaspectsofcomputingincludedinthisvolumearesymboliccomputingandtheuseofgraphicsforanalysis.Prerequisitessuggestedforusingthisbookmightincludeonesemesterofpartialdifferentialequationsandsomeprogrammingcapability.Thisbookwillbeagoodreferencetextforstudents."--MATHEMATICALREVIEWS
2024/6/27 8:31:32 2.74MB CFD FDM PDE
1
GuojunGanYorkUniversityToronto,Ontario,CanadaChaoqunMaHunanUniversityChangsha,Hunan,People’sRepublicofChinaJianhongWuYorkUniversityToronto,Ontario,Canada
2024/6/26 5:34:10 2.22MB clustering ML
1
RoCEv2和rdma标准文档ThisdocumentisanannextoVolume1release1.2.1oftheInfiniBandArchitecture,hereinreferredtoasthebasespecification.ThisannexisOptionalNormative,meaningthatimplementationofthefeaturedescribedbythisannexisOptional,butifpresent,theimplementationmustcomplywiththecompliancestatementscontainedwithinthisannex.ThisspecificationfollowsthespiritoftheRoCEAnnex(AnnexA16tothebasespecification)indefininganewInfiniBandprotocolvariantthatusesanIPnetworklayer(withanIPheaderinsteadofInfiniBand‘sGRH)thusallowingIProutingofitspackets.
2024/6/24 19:08:09 573KB RoCEV2 RDMA
1
DistributedSystems(3rd)英文无水印原版pdf第3版pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开本资源转载自网络,如有侵权,请联系上传者或csdn删除查看此书详细信息请在美国亚马逊官网搜索此书Copyright@2017MaartenvanSteenandAndrewS.TanenbaumPublishedbyMaartenvanSteenThisbookwaspreviouslypublishedby:PearsonEducation,IncISBN:978-15-430573-8-6(printedversion)ISBN:978-90-815406-2-9(digitalversion)Edition:3.Version:01(February2017)AllrightstotextandillustrationsarereservedbyMaartenvanSteenandAndrewS.Tanenbaum.Thisworkmaynotbecopied,reproduced,ortranslatedinwholeorpartwithoutwrittenpermissionofthepublisher,exceptforbriefexcerptsinreviewsorscholanyformofinformationstorageadaptationorwhatever,computersoftware,orbysimilarordissimilarmethodsnowknownordevelopedinthefutureisstrictlyforbiddenwithoutwrittenpermissionofthepublisherToMarielle,max,andelkeMVSToSuzanneBarbara,Marvin,Aronnathan,olivia,andmirteASTCONTENTSPreface1Introduction1.1Whatisadistributedsystem?Characteristic1:Collectionofautonomouscomputingelements2Characteristic2:SinglecoherentsystemMiddlewareanddistributedsystems1.2DesigngoalsSupportingresourcesharingMakingdistributiontransparent12Beingscalable15Pitfalls243Typesofdistributedsystems24Highperformancedistributedcomputing25Distributedinformationsystems34Pervasivesystems1.4Summary522Architectures552.1Architecturalstyles56Layeredarchitectures.57Object-basedandservice-orientedarchitectures62Resource-basedarchitectures64Publish-subscribearchitectures2.2MiddlewareorganizationWrappersInterceptors垂番Modifiablemiddleware752.3SystemarchitectureCONTENTSCentralizedorganizations76Decentralizedorganizations:peer-to-peersystemsHybridarchitectures2.4Examplearchitectures94TheNetworkFilesystem94TheWeb982.5Summary3Processes1033.1Threads..104Introductiontothreads104Threadsindistributedsystems1113.2Virtualization116Principleofvirtualizationapplicationofvirtualmachinestodistributedsystems,1223.3Clients124Networkeduserinterfaces124Client-sidesoftwarefordistributiontransparency1273.4Servers128Generaldesignissues129Objectservers133Example:TheApacheWebserver139Serverclusters,,,,,,,1413.5Codemigration152Reasonsformigratingcode152Migrationinheterogeneoussystems1583.6Summary1614Communication4.1Foundations164LayeredProtocols164TypesofCommunication.1724.2Remoteprocedurecall..173Basicrpcoperation174Parameterpassing178RPC-basedapplicationsupport182VariationsonrPc185Example:dCErPc,.1884.3Message-orientedcommunication193Simpletransientmessagingwithsockets.193Advancedtransientmessaging198Message-orientedpersistentcommunication206Example:IBM'sWebSpheremessage-queuingsystem212Example:AdvancedMessageQueuingProtocol(AMQP)....218DS3.01DOWNLOADEDBYTEWIGOMIXMAIL.INFOCONTENTS4.4Multicastcommunication221Application-leveltree-basedmulticasting221Flooding-basedmulticasting225Gossip-baseddatadissemination2294.5Summary2345Naming2375.1Names,identifiersandaddresses2385.2Flatnaming.241Simplesolutions241Home-basedapproaches245Distributedhashtables246Hierarchicalapproaches2515.3Structurednaming256Namespaces.256Nameresolution259Theimplementationofanamespace264Example:TheDomainNameSystem271Example:TheNetworkFileSystem2785.4Attribute-basednaming283Directoryservices283Hierarchicalimplementations:LDAP285Decentralizedimplementations2885.5Summary2946Coordination2976.1Clocksynchronization.298Physicalclocks299Clocksynchronizationalgorithms3026.2Logicalclocks310Lamport'slogicalclocks310Vectorclocks3166.3Mutualexclusion321322acentralizedalgorithm.322adistributedalgorithm323atoken-ringalgorithm.325adecentralizedalgorithm3266.4Electionalgorithms329Thebullyalgorithm.,..330Aringalgorithm332Electionsinwirelessenvironments333Electionsinlarge-scalesystems.3356.5Locationsystems336DOWNLOADEDBYTEWIGOMIXMAIL.INFODS301VIllCONTENTSGPS:GlobalPositioningSystem337WhengPsisnotanoption339Logicalpositioningofnodes3396.6Distributedeventmatching..343Centralizedimplementations3436.7Gossip-basedcoordination349asgregation349Apeer-samplingservice350Gossip-basedoverlayconstruction3526.8Summary3537Consistencyandreplication3557.1Introduction356Reasonsforreplication356Replicationasscalingtechnique3577.2Data-centricconsistencymodels358Continuousconsistency359Consistentorderingofoperations364Eventualconsistency3737.3Client-centricconsistencymodels375MonotonicreadsMonotonicwrites.379Readyourwrite380Writesfollowreads3827.4ReplicamanagementFindingthebestserverlocation383Contentreplicationandplacement..385Contentdistribution..388Managingreplicatedobjects3937.5Consistencyprotocols.396Continuousconsistency..........396Primary-basedprotocols398Replicated-writeprotocolsCache-coherence403Implementingclient-centricconsistency,,...4077.6Example:CachingandreplicationintheWeb4097.7Summar4208Faulttoleran4238.1Introductiontofaulttolerance424Basicconcepts.424Failuodels427Failuremaskingbyredundancy8.2Processresilience432DS3.01DOWNLOADEDBYTEWIGOMIXMAIL.INFO
2024/6/24 6:52:56 36.95MB Distributed Systems
1
AtypeofchaoticencryptionschemebycombiningcircularbitshiftwithXORoperationswasproposedin2006basedoniteratingchaoticmaps.Soonaftertheproposal,itwascryptanalyzedandimproved.Unfortunately,therearestilltwodrawbacksinthetwoimprovedschemes.Tostrengthentheperfor
1
使用AbstractTableModel构建Table在表格中添加JButton按钮,之前在网上找了2天没有找到好用的程序,最终终于找到一个好用的例子。
不要使,我退你们分。

singtheSwingJTableclasscanquicklybecomeastickybusinesswhenyouwanttocustomizeittoyourspecificneeds.FirstyoumustbecomefamiliarwithhowtheJTableclassisorganized.IndividualcellsarerenderedbyTableCellRendererimplementations.ThetablecontentsarerepresentedbyanimplementationoftheTableModelinterface.Bydefault,JTableusesDefaultTableCellRenderertodrawitscells.DefaultTableCellRendererrecognizesafewprimitivetypes,renderingthemasstrings,andcanevendisplayBooleantypesascheckboxes.ButitdefaultstodisplayingthevaluereturnedbytoString()fortypesitdoesnotspecificallyhandle.YouhavetoprovideyourownTableCellRendererimplementationifyouwanttodisplaybuttonsinaJTable.TheTableCellRendererinterfacecontainsonlyonemethod,getTableCellRendererComponent(...),whichreturnsajava.awt.Componentthatknowshowtodrawthecontentsofaspecificcell.Usually,getTableCellRendererComponent()willreturnthesamecomponentforeverycellofacolumn,toavoidtheunnecessaryuseofextramemory.Butwhenthecontentsofacellisitselfacomponent,itisallrighttoreturnthatcomponentastherenderer.Therefore,thefirststeptowardshavingJButtonsdisplaycorrectlyinaJTableistocreateaTableCellRendererimplementationthatreturnstheJButtoncontainedinthecellbeingrendered.Intheaccompanyingcodelisting,JTableButtonRendererdemonstrateshowtodothis.EvenaftercreatingacustomTableCellRenderer,you'restillnotdone.TheTableModelassociatedwithagivenJTabledoesnotonlykeeptrackofthecontentsofeachcell,butitalsokeepstrackoftheclassofdatastoredineachcolumn.DefaultTableModelisdesignedtoworkwithDefaultTableCellRendererandwillreturnjava.lang.String.classforcolumnscontainingdatatypesthatitdoesnotspecificallyhandle.Theexact
2024/6/23 0:29:22 4KB Table JButton 按钮
1
HennessyandPattersonwrotethefirsteditionofthisbookwhengraduatestudentsbuiltcomputerswith50,000transistors.Today,warehouse-sizecomputerscontainthatmanyservers,eachconsistingofdozensofindependentprocessorsandbillionsoftransistors.Theevolutionofcomputerarchitecturehasbeenrapidandrelentless,butComputerArchitecture:AQuantitativeApproachhaskeptpace,witheacheditionaccuratelyexplainingandanalyzingtheimportantemergingideasthatmakethisfieldsoexciting.
2024/6/20 9:58:41 23.76MB computer arc
1
1本程序在vc++6.0编译通过并能正常运行。
2主界面程序已经尽量做到操作简便了,用户只需要根据提示一步步进行操作就行了。
六思考和总结:这个课程设计的各个基本操作大部分都在我的综合性实验中实现了,所以做这个主要攻克插入和删除这两个算法!其中插入在书本上已经有了,其中的右平衡算法虽然没有给出,但通过给出的左平衡算法很容易就可以写出右平衡算法。
所以最终的点就在于删除算法的实现!做的过程中对插入算法进行了非常非常多次的尝试!花了非常多的时间,这其中很多时候是在对程序进行单步调试,运用了VC6。
0的众多良好工具,也学到了很多它的许多好的调试手段。
其中删除算法中最难想到的一点是:在用叶子结点代替要删除的非叶子结点后,应该递归的运用删除算法去删除叶子结点!这就是整个算法的核心,其中很强烈得体会到的递归的强大,递归的最高境界(我暂时能看到的境界)!其它的都没什么了。
选做的那两个算法很容易实现的:1合并两棵平衡二叉排序树:只需遍历其中的一棵,将它的每一个元素插入到另一棵即可。
2拆分两棵平衡二叉排序树:只需以根结点为中心,左子树独立为一棵,右子树独立为一棵,最后将根插入到左子树或右子树即可。
BSTreeEmpty(BSTreeT)初始条件:平衡二叉排序树存在。
操作结果:若T为空平衡二叉排序树,则返回TRUE,否则FALSE.BSTreeDepth(BSTreeT)初始条件:平衡二叉排序树存在。
操作结果:返回T的深度。
LeafNum(BSTreeT)求叶子结点数,非递归中序遍历NodeNum(BSTreeT)求结点数,非递归中序遍历DestoryBSTree(BSTree*T)后序遍历销毁平衡二叉排序树TR_Rotate(BSTree*p)对以*p为根的平衡二叉排序树作右旋处理,处理之后p指向新的树根结点即旋转处理之前的左子树的根结点L_Rotate(BSTree*p)对以*p为根的平衡二叉排序树作左旋处理,处理之后p指向新的树根结点,即旋转处理之前的右子树的根结点LeftBalance(BSTree*T)对以指针T所指结点为根的平衡二叉排序树作左平衡旋转处理,本算法结束时,指针T指向新的根结点RightBalance(BSTree*T)对以指针T所指结点为根的平衡二叉排序树作右平衡旋转处理,本算法结束时,指针T指向新的根结点Insert_AVL(BSTree*T,TElemTypee,int*taller)若在平衡的二叉排序树T中不存在和e有相同的关键字的结点,则插入一个数据元素为e的新结点,并返回OK,否则返回ERROR.若因插入而使二叉排序树失去平衡,则作平衡旋转处理布尔变量taller反映T长高与否InOrderTraverse(BSTreeT)递归中序遍历输出平衡二叉排序树SearchBST(BSTreeT,TElemTypee,BSTree*f,BSTree*p)在根指针T所指的平衡二叉排序树中递归的查找其元素值等于e的数据元素,若查找成功,则指针p指向该数据元素结点,并返回TRUE,否则指针p指向查找路径上访问的最后一个结点并返回FALSE,指针f指向T的双亲,其初始调用值为NULLDelete_AVL(BSTree*T,TElemTypee,int*shorter)在平衡二叉排序树中删除元素值为e的结点,成功返回OK,失败返回ERRORPrintBSTree_GList(BSTreeT)以广义表形式打印出来PrintBSTree_AoList(BSTreeT,intlength)以凹入表形式打印,length初始值为0Combine_Two_AVL(BSTree*T1,BSTreeT2)合并两棵平衡二叉排序树Split_AVL(BSTreeT,BSTree*T1,BSTree*T2)拆分两棵平衡二叉树}(2)存储结构的定义:typedefstructBSTNode{ TElemTypedata; intbf;//结点的平衡因子 structBSTNode*lchild,*rchild;//左.右孩子指针}BSTNode,*BSTree;
1
本次实验采用C编写,将内存空间定义为结构体链表,成员有作业名name[20]、作业首址s_add、作业长度length及下一节点的指针next;
空闲分区表定义为结构体数组,成员有空闲区首址s_add、空闲区长度length、表项状态state。
2024/6/16 16:37:14 89KB C语言 操作系统 内存 分配
1
浏览器出现以下问题:RightManagementAdd-onforInternetExplorer内容如下:Thefeatureyouaretryingtouseisonanetworkresourcethatisunavailable.clickoktotryagain,orenteranalternatepathtoaflodercontainingtheinstallationpackage'RMU.msi'intheboxbelow.Usesource:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\解决方法:下载RMUSetup.exe,安装即可
2024/6/16 14:34:39 4.28MB RMUSetup
1
共 563 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡