搜索结果: 1-15 共查到“Access”相关记录103条 . 查询时间(0.062 秒)
【有机化学学术报告】Access Molecular Complexity by Breaking Symmetry of Dicarbonyl Compounds(图)
Molecular Complexity Breaking Symmetry Dicarbonyl Compounds
2023/6/20
【有机化学学术报告】Access Molecular Complexity by Breaking Symmetry of Dicarbonyl Compounds
山东大学计算机网络课件 Medium Access Control Sublayer。
ACCESS AND WEB-SHARING OF 3D DIGITAL DOCUMEACCESS AND WEB-SHARING OF 3D DIGITAL DOCUMENTATION OF ENVIRONMENTAL AND ARCHITECTURAL HERITAGENTATION OF ENVIRONMENTAL AND ARCHITECTURAL HERITAGE
Cultural Heritage 3D documentation 3D surveying HBIM Valorisation
2019/3/4
The techniques and methods to capture and represent in a three-dimensional digital space the shape of objects belonging to Cultural Heritage have become more widespread, regarding both the economic an...
Ohio Supercomputer Center releases open-source HPC access portal
Ohio Supercomputer Center open-source HPC access portal
2017/9/20
An innovative web-based portal for accessing high performance computing services has matured beyond the beta phase and now is available to HPC centers worldwide.The Ohio Supercomputer Center (OSC) has...
安徽师范大学计算机基础(公共课)课件第6章 Access 2003
安徽师范大学 计算机 课件 第6章 Access 2003
2017/1/14
安徽师范大学计算机基础(公共课)课件第6章 Access 2003。
Tumble! Splat! Helping Users Access and Manipulate Occluded Content in 2D Drawings
Layer management 2D drawing occlusion interaction technique
2016/5/24
Accessing and manipulating occluded content in layered 2D drawings
can be difficult. This paper characterizes a design space of
techniques that facilitate access to occluded content. In addition,
w...
Interoperable Image Data Access through ArcGIS Server
OGC Standard Interoperability Web Service Web Coverage Service Arcgis Server
2015/12/18
As networking and data storage technologies advance, web services have become a commonplace for data mining and sharing in an e-business model. Compared with business information, geospatial informati...
Limited Access Orders in the Developing World: A New Approach to the Problems of Development
Industrial countries government monopoly
2015/9/22
The upper-income, advanced industrial countries of
the world today all have market economies with open
competition, competitive multi-party democratic
political systems, and a secure government mon...
Misallocation, Property Rights, and Access to Finance: Evidence from Within and Across Africa
Misallocation Firms Investor Rights Financing Obstacles MPK
2015/9/21
We study capital misallocation within and across 10 African countries using the World Bank
Enterprise Surveys. First, we compare the extent of misallocation among rms within countries. We document h...
An Open Access Wireless Market Supporting Public Safety, Universal Service, and Competition
Wireless Market Supporting Public Safety
2015/9/18
We present a market design for an open access wireless market. Open access means that in real
time, network capacity cannot be withheld—network throughput is priced dynamically by the
marginal dem...
An Open Access Wireless Market Supporting Public Safety, Universal Service, and Competition
Supporting Public Safety Universal Service
2015/9/18
We present a market design for an open access wireless market. Open access means that in real
time, network capacity cannot be withheld—network throughput is priced dynamically by the
marginal dem...
宁夏大学数学计算机学院计算机网络课件第四章 The Medium Access Control
宁夏大学 数学计算机学院 计算机网络 课件 第四章 The Medium Access Control
2015/8/24
宁夏大学数学计算机学院计算机网络课件第四章 The Medium Access Control。
Multiple Access Channels with Arbitrarily Correlated Sources
Multiple Access Channels Arbitrarily Correlated Sources
2015/8/14
Multiple Access Channels with Arbitrarily Correlated Sources.
Generalized access control strategies for integrated services token passing systems
Integrated services LAN application factory automation distributed computing multimedia communication
2015/8/12
The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and mu...
ARCHER:Using Symbolic,Path-sensitive Analysis to Detect Memory Access Errors
ARCHER Using Symbolic Path-sensitive Analysis Detect Memory Access Errors
2015/8/7
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER usespath-sensitive, interprocedural s...