... +1,whereq is the field size. Hence, average throughput is equivalent to the min-cut throughput in this case. On the other hand, for q = 2, the problem was solved in [7]. Therefore, in most of the mathematical ... significantly exceed the maximum achievable common routing rates in the network. They also argued that the majority rather than the minority of multicast applications...
Ngày tải lên: 21/06/2014, 23:20
... connected together at the apex of a tower. The antenna is fed between the ground and the base of one of the wires. Alford antenna A loop antenna, in a square config- uration, with the corners bent toward the ... a cosine winding for better focus at the edges of the picture. anchorage In plastic recording tape, the adhesion of the magnetic oxide coating to the surface o...
Ngày tải lên: 19/01/2014, 17:20
Tài liệu The Illustrated Dictionary of Electronics P1 docx
... struck and then brought near the other, the second fork will begin vibrating. If the second fork has a fundamental frequency that is a harmonic of the frequency of the first fork, the second ... 1. In a storage cell, the chemical material in the plates that provides the electrical action of the cell, as distinguished from the sup- porting material of the plates themsel...
Ngày tải lên: 19/01/2014, 17:20
Tài liệu The Illustrated Dictionary of Electronics P1 doc
... struck and then brought near the other, the second fork will begin vibrating. If the second fork has a fundamental frequency that is a harmonic of the frequency of the first fork, the second ... trans- ducer at the other. An electrical input signal in the first transducer sets up sound waves that travel through the interior of the crystal; the piezoelectric reaction of...
Ngày tải lên: 25/01/2014, 12:20
Tài liệu The McAfee Network Security Platform: Bridging Network and System Security doc
... enables you to query the ePO database for the details of your network hosts right from the Alert Manager. The details that are fetched from the ePO database include the host type, host name, ... in the Alert Manager that a host in your network is port scanning the other hosts. You want to know more details about the source of these attacks. So, you right-click on an a...
Ngày tải lên: 14/02/2014, 16:20
A Beginner’s Guide to Network Security: An Introduction to the Key Security Issues for the E-Business Economy doc
... affiliates in the U.S. and certain other countries. All other brands, names, or trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner ... morale. Legislation is another force that drives the need for network security. Governments recognize both the importance of the Internet and the fact that substantial po...
Ngày tải lên: 14/03/2014, 22:20
Professional iOS Network Programming: Connecting the Enterprise to the iPhone and iPad doc
... added. These examples use the passive versioning system that merely changes the URL to specify a new version. Recall that weather_v1.php, the version 1.0 of the weather service, had the following ... that contain all of the code required to build and deploy the samples to an iOS device. Therefore, in addition to the code listings found in the text of the book, you wil...
Ngày tải lên: 23/03/2014, 06:20
The Gh0st in the Shell: Network Security in the Himalayas docx
... malware, but the majority of the traffic on these ports is harmless web surfing. We visualized the results on a map of the world in figure Figure 3. The center of each circle represents a city and the radius ... though the comparison was more aligned since both the net- works have users, the differences still outweighed the similarities given the other unique factors in Dha...
Ngày tải lên: 28/03/2014, 22:20