搜索资源列表
dispatcher
- A dispatcher system using leaky bucket architecture. The code was written for HC12, HCS08, and compiled using codewarrior for HCS08
cifafenxi
- 词法分析代码:词法分析的目的是将输入的源程序进行划分,给出基本符号(token)的序列,并掠过注解和空格等分隔符号。基本符号是与输入的语言定义的词法所规定的终结符。-cifafenxi
cifa
- C语言词法分析器 输入Pascal语句,输出token序列-c language lexical analyzer input a pascal statement, the output token sequence
Lab02_TokenRing
- A token ring network consists of a set of nodes connected in a ring. The ring is a single shared medium. The token ring technology involves a distributed algorithm that controls when each node is allowed to transmit. All nodes see all frames, and
qqq
- Secured Authentication of Space Specified Token with Biometric Traits – Face and Fingerprint
P2Pliaotian
- 客户端得到登录令牌之后.就会向服务器发送一个包含登录信息的登录请求.要求登录.服务顺会首先看看客户端的号码-After the client receive login token. Will be sent to the server log that contains login information request. Require a login. Service along the client will first look at the numbers
lecture4.pdf.tar
- Multi-access communication transmission protocol lecture four in Computer networks. Author: Guevara Noubir. Course: COM3510 Outline: Pure and slotted Aloha and its mathematical analysis, performance, stability etc. Other MAC protocols: CSMA
WTRP.tar
- 关于WTRP的介绍,无线令牌环的论文,很有参考!-About WTRP introduction, Wireless Token Ring papers, great reference!
Internetworking-2_LANs(zslcn)
- 本文介绍了用于局域网(LAN)的各种媒体访问方法,传送方法,拓扑,和设备。所讲的题目集中在用于以太网/IEEE 802.3,令牌环/IEEE 802.5,和FDDI(光纤分布式数据接口)。在手册第二部分LAN协议各篇文章中将更详细地讲述具体的协议。 -This article introduces the various media-access methods, transmission methods, topologies, and devices used in a local
2-Internetworking-LAN_2(zslcn)
- 令牌环网络最初是由IBM在20世纪70年代开发的。它现在仍然是IBM的主要局域网络(LAN)技术。相关的IEEE 802.5规范与IBM的令牌环网络几乎是相同的,完全兼容。事实上,IEEE802.5规范仿照IBM令牌环,并不断跟踪IBM的令牌环网开发。术语令牌环网一般通常用来既指IBM的令牌环网,也指IEEE 802.5网络。本文讨论令牌环网和IEEE802.5这两者。-The Token Ring network was originally developed by IBM in the 1
ANSAScraper
- ANSA scraper extract file document and gives all token from it
WTRP_SCI02
- wireless token ring
WLTR-protocol
- wireless token ring protocol
wpes2008
- Recent approaches for protecting information in data out- sourcing scenarios exploit the combined use of access control and cryptography. In this context, the number of keys to be distributed and managed by users can be maintained limited by
1021613
- Survey on token passing techniques in wireless networks
htsim_0.1.tar
- "checking system version (for dynamic loading)... ./configure: line 7624: syntax error near unexpected token ) ./configure: line 7624: OSF*) tcl8.3.2 configuration failed! Exiting ... -"checking system version (for dynamic loading)... ./con
lingpaitong
- QoS技术中令牌桶算法实现方式比较 算法设计 实现-QoS technologies token bucket algorithm implementations comparison algorithm design and implementation
IEC-62055-41_2007
- IEC 62055-41_2007 电量测量.付费测量系统.第41部分标准传输规范-Electricity metering – Payment systems –Part 41:Standard transfer specification (STS) –Application layer protocol for one-way token carrier systems
pkcs-11v2-20d3
- 在密码系统中,PKCS#11是公钥加密标准(PKCS, Public-Key Cryptography Standards)中的一份子 ,由RSA实验室(RSA Laboratories)发布[1],它为加密令牌定义了一组平台无关的API ,如硬件安全模块和智能卡。 PKCS#11称为Cyptoki,定义了一套独立于技术的程序设计接口,USBKey安全应用需要实现的接口。 -In cryptography, PKCS# 11 is the Public Key Cryptography
WCS-ispacs-2012-CR-v2
- This paper presents a two-factor authentication with key agreement scheme for web-based collaborative systems. The proposed mechanism integrates URI fragment identifier with secure email token and identity-based remote mutual authentication schem