Based on studying APON, we have studyed EPON MAC protocol and put forward new upstream access algorithm.
本文在研究APON的基础上,对EPON的MAC协议进行了深入的研究,提出了较有新意的上行接入算法。
The algorithm by which a table is scanned (access method).
被扫描的表的算法(访问方法)。
A query subject that USES a stored procedure to access the cluster information of the clustering model created by the mining algorithm.
查询主题使用存储过程访问由挖掘算法创建的集群模型的集群信息。
Emad Omara's parallel merge sort algorithm assumes that you will have full access to the machine's CPUs for the duration of the sorting operation.
EmadOmara的并行合并排序算法假设了在排序操作的过程中(操作者)对计算机的所有CPU具有完全的访问权限。
The optimizer avoids generating access plans using the hash distinct algorithm if it detects that a low memory situation may occur during query execution.
如果优化程序检测到在查询执行过程中可能会出现内存不足的情况,它将避免使用非重复散列算法生成访问计划。
By theoretic analysis and experimental tests, the algorithm can be used to discover all types of users frequent access patterns.
通过理论分析和实验验证,该算法可以有效地发现用户频繁访问模式。
Code access security is a stack-based algorithm.
代码访问安全是一个基于堆栈的算法。
Simulation is performed for different number of users, and results show that this algorithm can efficiently suppress multiple access interference and improve system performance.
分别对不同用户数目的系统进行计算机仿真,结果表明,采用本算法后,能有效地抑制多址干扰,极大地提高了系统的性能。
Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm.
定义访问数据加密标准(DES)算法的加密服务提供程序(csp)版本的包装对象。
Some players cannot be trusted, and worse, they have complete access to the encryption algorithm and all communications via the client executable.
有些玩家是不可信的,更糟的是,他们能够通过客户端执行文件获取对加密算法和所有通信的了解。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
To work coordinately in a distributed network system, a synchronization algorithm must be introduced to assure mutual exclusive access and operation on the critical resource.
在分布式网络系统中,为了实现系统协调一致的工作,必须要有相应的同步互斥算法来保证临界资源的互斥访问和操作。
Based on certainty and possibility reasoning, an algorithm to determine whether an access request is authorized is proposed.
结合确定性推理和可能性推理,描述了如何判定访问请求的算法。
A isolation type of random N-ary tree collision resolution algorithm is used to analyze packet collision resolution based on random multiple access system in this paper.
文章提出一种隔离型随机N叉树形冲突分解算法,并对随机多址接入系统冲突分解进行了研究。
Using this algorithm, an organization that hosts services for other businesses to use can control the information that is used to actually access the hosted service.
使用上述这个算法,一个为其他企业提供主机服务的机构可以控制实际访问该服务的信息。
In this paper, a new random N-ary tree collision resolution algorithm of improved isolation type is used to analyze the packet collision resolution in VSAT random multiple access system.
文章提出一种新的改进隔离型随机N叉树形冲突分解算法,对VSAT随机接入多址接入系统中冲突分解进行了研究。
Elliptical curve encryption system has achieved some basic algorithms, such as rapid access modules algorithms, rapid modules plus algorithms, rapid modules reverse algorithm. etc.
实现了椭圆曲线密码体制中的一些基本算法,如快速取模算法、快速模加算法、快速模逆算法等。
Focusing on the problems of concurrent control and data availability exists in transaction processing in mobile data access system, this paper proposes a new hierarchical concurrent control algorithm.
针对移动数据访问系统中事务处理的并发控制和数据访问问题,提供了一种分层的并发控制算法。
According to the three kinds of accessing ways of the VPN users, this paper gives the design method, the internal algorithm and the data flow of the Virtual Private Network access server.
根据虚拟专用网用户三种不同的接入方法,文章给出v P N接入设备的设计方案、数据处理流程及内部算法。
This paper proposes a novel parallel I /O reactive scheduling optimizing algorithm. It's access pattern modeling and optimization-rule based automatic optimizing algorithm.
文章提出了一种并行存储反应调度算法,它是基于存储访问建模的和基于规则的存储自动优化算法。
Based on the analysis of the existing backoff algorithms in access layer, this paper proposes an adaptive slow backoff algorithm.
针对信道接入层已有退避算法,提出了一种自适应慢速退避算法。
This paper proposes a authentication and access control scheme which USES modified threshold DSA algorithm in P2P network.
在P 2 P网络中应用门限DSA算法,提出一种适应网络动态性强等特点的节点认证和访问控制方案。
Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path (DCP) searching algorithm based on binary tree.
基于SPKI技术提出了组播分布式访问控制系统MDAC,并提出了基于二叉授权委托树的委托证书路径(DCP)查找算法。
Then, gave a new lock management algorithm named DBM to support strided access pattern application, and contrasted the new and the old one by software simulation.
分析了传统的分布式锁管理中范围锁的实现及其局限,给出了一种用于支持交叉访问模式的新的分布式锁管理算法——DBM算法。
During the process of the system's implementation, we successfully use PAR method and PAR platform to implement the data access components and some algorithm components.
在系统实现过程中,我们成功地应用PAR方法、PAR平台对系统的数据访问构件和部分算法构件进行了实现。
A packet scheduling algorithm for mixed traffics was proposed in orthogonal frequency division multiple access (OFDMA) systems.
提出了一种基于正交频分多址接入系统的混合业务分组调度算法。
A near maximum-likelihood (ML) multiuser detection algorithm based on unconstrained optimization approach is proposed for code-division multiple access (CDMA) systems.
针对码分多址(CDMA)系统提出了一种基于无约束最优化的近最大似然多用户检测算法。
Imagine that we have an iterator-based algorithm that requires random access iterators.
假设我们有一个基于迭代器的算法,要求是随机访问迭代器。
This paper emphasizes on broadcast content selection strategy and broadcast scheduling algorithm for efficient access of multiple data items.
本文着重研究广播内容选择策略和多数据项广播调度算法。
This paper emphasizes on broadcast content selection strategy and broadcast scheduling algorithm for efficient access of multiple data items.
本文着重研究广播内容选择策略和多数据项广播调度算法。
应用推荐