您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. (2009 Springer)Software Verification and Analysis:An Integrated, Hands-On Approach

  2. The text is devoted to the Software Analysis and Testing (SAT) methods and supporting tools for assessing and, if possible, improving software quality, specifically its correctness. The term quality assurance is avoided for it is this author’s firm
  3. 所属分类:Java

    • 发布日期:2009-05-05
    • 文件大小:2mb
    • 提供者:wuty75
  1. Cambridge.How.to.Think.About.Algorithms.2008

  2. There are many algorithm texts that provide lots of well-polished code and proofs of correctness. Instead, this one presents insights, notations, and analogies to help the novice describe and think about algorithms like an expert. It is a bit like a
  3. 所属分类:Access

    • 发布日期:2009-05-10
    • 文件大小:2mb
    • 提供者:mike_wh
  1. The Craft of System Security

  2. The Craft of System Security by Sean Smith; John Marchesini List of Figures 1.1 An access control matrix 7 1.2 Security and state spaces 10 2.1 Example clearance order 26 2.2 Example categories order 27 2.3 Example MLS lattice 28 2.4 The *-Property
  3. 所属分类:Javascript

    • 发布日期:2009-05-22
    • 文件大小:5mb
    • 提供者:awubc2008
  1. how_to_think_about_algorithms

  2. There are many algorithm texts that provide lots of well-polished code and proofs of correctness. This book is not one of them. Instead, this book presents insights, notations, and analogies to help the novice describe and think about algorithms lik
  3. 所属分类:Access

    • 发布日期:2009-06-16
    • 文件大小:6mb
    • 提供者:zxxsy
  1. algorithms_and_protocols_for_wireless_sensor_networks

  2. In order to develop algorithms for sensor networks and in order to give mathematical correctness and performance proofs, models for various aspects of sensor networks are needed. In the next three chapters, we focus upon the modeling, design, and an
  3. 所属分类:C#

    • 发布日期:2009-06-17
    • 文件大小:6mb
    • 提供者:kaieagle
  1. Logic in Computer Science Modelling and Reasoning about Systems 面向计算机科学的数理逻辑系统建模与推理

  2. In recent years, powerful tools for verifying hardware and software systems have been developed. Major companies, such as Intel, Siemens, BT, AT&T, and IBM have increasingly become interested in that technology. Students need a basic formal training
  3. 所属分类:Web开发

    • 发布日期:2009-06-23
    • 文件大小:2mb
    • 提供者:orzorz
  1. Computer+Systems-A+Programmer’s+Perspective.pdf

  2. This book is for programmers who want to improve their skills by learning about what is going on “under the hood” of a computer system. Our aim is to explain the important and enduring concepts underlying all computer systems, and to show you the co
  3. 所属分类:其它

    • 发布日期:2009-06-30
    • 文件大小:4mb
    • 提供者:luastudying
  1. a programmer

  2. However, there are no books that look systematically at the gap separating the theory of algorithms and software engineering, even though many things can go wrong in taking several algorithms and producing a software product derived from them. This
  3. 所属分类:其它

    • 发布日期:2009-07-10
    • 文件大小:3mb
    • 提供者:guluniu
  1. C++ FAQs

  2. C++ FAQs Part I. Preliminaries Chapter 1. Introduction FAQ 1.01 What is the purpose of this chapter? FAQ 1.02 What are C++ FAQs? FAQ 1.03 Who is the target audience for this book ? FAQ 1.04 Is this a book about C++ per se? FAQ 1.05 Why do deve
  3. 所属分类:C++

    • 发布日期:2007-09-15
    • 文件大小:896kb
    • 提供者:lovewhzlq
  1. Computer System A Programmer

  2. A computer system is a collection of hardware and software components that work together to run computer programs. Specific implementations of systems change over time, but the underlying concepts do not. All systems have similar hardware and softwa
  3. 所属分类:其它

    • 发布日期:2009-08-05
    • 文件大小:4mb
    • 提供者:yingzc
  1. java concurrency in practice(英文版)

  2. Chapter 1. Introduction Section 1.1. A (Very) Brief History of Concurrency Section 1.2. Benefits of Threads Section 1.3. Risks of Threads Section 1.4. Threads are Everywhere Part I: Fundamentals Chapter 2. Thread Safety Section 2.1. What is Thread S
  3. 所属分类:Java

    • 发布日期:2009-08-22
    • 文件大小:1mb
    • 提供者:auf421
  1. 【麻省理工大学】算法导论

  2. There are books on algorithms that are rigorous but incomplete and others that cover masses of material but lack rigor. Introduction to Algorithms combines rigor and comprehensiveness. The book covers a broad range of algorithms in depth, yet makes
  3. 所属分类:其它

    • 发布日期:2009-09-02
    • 文件大小:17mb
    • 提供者:dl32399051
  1. Cambridge - How to Think About Algorithms (2008).pdf

  2. Cambridge University Press There are many algorithm texts that provide lots of well-polished code and proofs of correctness. Instead, this one presents insights, notations, and analogies to help the novice describe and think about algorithms like an
  3. 所属分类:Access

    • 发布日期:2009-10-28
    • 文件大小:6mb
    • 提供者:rex77
  1. Interface Analysis for ALE / IDocs

  2. 超强悍的SAP interface 资料 详细介绍了interface 以及IDocs的具体配置 Agenda: 1. Introduction a) Background Information b) Important Transactions / Analysis Roadmap 2. Analysis Instructions a) Technical Correctness b) Performance c) Configuration 3. Appendix
  3. 所属分类:C

    • 发布日期:2009-12-01
    • 文件大小:8mb
    • 提供者:dreamskyuu
  1. mit算法导论课件.rar

  2. Introduction to Algorithms Prof. Charles E. Leiserson The theoretical study of computer-program performance and resource usage. What’s more important than performance? • modularity • correctness • maintainability • functionality • robustness • user-
  3. 所属分类:其它

    • 发布日期:2010-01-08
    • 文件大小:4mb
    • 提供者:Kiwicat
  1. Multiprocessor+Systems-on-Chips

  2. 以下的资源也很不错, 加减可以看一下o 使用C++制作3D动画人物-100%提供源码 http://download.csdn.net/source/2255453 http://hqioan.download.csdn.net/ The What, Why, and How of MPSoCs 1 Ahmed Amine Jerraya and Wayne Wolf 1.1 Introduction 1 1.2 What are MPSoCs 1 1.3 Why MPSoCs? 5 1.4
  3. 所属分类:硬件开发

    • 发布日期:2010-01-10
    • 文件大小:2mb
    • 提供者:hqioan
  1. Formal Correctness of Security Protocols

  2. This book describes a key technique, the Inductive Method, for proving the correctness of security protocols. It is clearly written, starting with the basic concepts of cryptography and leading to advanced matters such as smartcards and non-repudiat
  3. 所属分类:专业指导

    • 发布日期:2012-03-29
    • 文件大小:3mb
    • 提供者:bbikemin
  1. Computer Architecture Complexity And Correctness Risc Design

  2. Computer Architecture: Complexity and Correctness develops
  3. 所属分类:其它

    • 发布日期:2008-10-26
    • 文件大小:2mb
    • 提供者:bigbigpanda
  1. 20200722-Circuit-Capture-of-Chisel-p1-Correctness.pdf

  2. 20200722-Circuit-Capture-of-Chisel-p1-Correctness.pdf
  3. 所属分类:OS

    • 发布日期:2020-12-16
    • 文件大小:219kb
    • 提供者:ppcust
  1. Verifying correctness of inner product of vectors in cloud computing

  2. Verifying correctness of inner product of vectors in cloud computing
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:530kb
    • 提供者:weixin_38683562
« 12 3 4 5 6 7 8 »