Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - management
Search - management - List
A Survey on Spectrum Management in Cognitive Radio Networks 认知无线电网络的频谱管理(IEEE通信杂志 调研文献)
Date : 2010-10-12 Size : 126.88kb User : ningqiqi

一种基于预测PI控制器的自相似网络主动队列管理算法-A PI controller based on the prediction of self-similar network of Active Queue Management Algorithm
Date : 2025-12-18 Size : 349kb User : Lily

DL : 0
本章主要介绍GSM 有关的基础知识,诸如:GSM 发展简史、数字移动通信 技术、GSM 系统结构及相关接口、TDMA 帧结构、GSM 的区域定义及GSM 识别号、无线接口的逻辑信道及系统消息、GSM 系统的移动性管理和安全性 管理以及GSM 移动网络结构和信令网等。-This chapter introduces the basic knowledge of GSM-related, such as: GSM development history, digital mobile communication technology, GSM system architecture and related interfaces, TDMA frame structure, GSM regional definition and GSM identification numbers, logical channel wireless interfaces and systems news GSM system mobility management and security management, and GSM mobile network architecture and signaling networks.
Date : 2025-12-18 Size : 629kb User : littleboy85

DL : 0
Database Management Systems (3rd edition) by Raghu Ramakrishnan and Johannes Gehrke的英文讲义,来自韩国名牌大学的讲义-Database Management Systems (3rd edition) by Raghu Ramakrishnan and Johannes Gehrke English lectures from prestigious universities in Korea lectures
Date : 2025-12-18 Size : 2.29mb User : 谌林

DL : 0
项目管理知识体系(Project Management Body of Knowledge, PMBOK ® )是美国项目管理协会(PMI)对项目管理所需的知识、技能和工具进行的概括性描述,现已成为国际社会普遍接受的项目管理知识体系标准。 《项目管理知识体系指南》(《PMBOK指南》)对项目管理知识体系的子集进行了专业分类和描述,定义了项目生命周期、5步流程和9大知识领域。 -Project Management Body of Knowledge (Project Management Body of Knowledge, PMBOK ?) is the American Project Management Institute (PMI) project management of the necessary knowledge, skills and tools to carry out the general description of the international community has now become widely accepted Project Management Body of Knowledge system standards. Guide to Project Management Body of Knowledge ( PMBOK Guide ) on the Project Management Body of Knowledge a subset of a professional classification and description, the definition of the project life-cycle, 5-step processes and 9 knowledge areas of major.
Date : 2025-12-18 Size : 1.2mb User : 袁杰

DL : 0
深入理解LINUX内存管理,帮助您深入理解linux的内存管理,更好的编写程序-LINUX-depth understanding of memory management, to help you in depth understanding of linux memory management, better programming
Date : 2025-12-18 Size : 414kb User : phil

Database Management Systems 3Rd Edition Raghu Ramakrishnan Johannes Gehrke Mcgraw Hill -Database Management Systems 3Rd Edition Raghu Ramakrishnan Johannes Gehrke Mcgraw Hill
Date : 2025-12-18 Size : 16.91mb User : bird

software configuration management untuk memanage software
Date : 2025-12-18 Size : 30kb User : blackID

Linux系统实现集群配置/集群管理的超强文档.-Linux cluster system configuration/management of the super-cluster document.
Date : 2025-12-18 Size : 873kb User : 老俞

DL : 0
产权制度创新与管理创新的良性互动_山东诸城四达绝缘材料股份有限公司改革与发展纪实-黄少安-revolution about institution and management
Date : 2025-12-18 Size : 20kb User : Liu Chang

分析嵌入式系统对动态电源管理的需求,并在此基础上提出了与之适应的,以策略框架为中心的系统级动态电源管理架构。-Analysis of embedded systems for dynamic power management needs, and on this basis with the adaptation made to the strategy as the central framework for system-level dynamic power management framework.
Date : 2025-12-18 Size : 42kb User : jessic

本书比较系统地阐述了现代生产管理中最新的、具有代表性的思想、方 式和方法。如:物料需要计划(MRP)和制造资源计划(MRPⅡ);准时化生 产方式(JIT);柔性制造系统(FMS);以及计算机集成制造系统(CIMS)。 在编写中,结合我国企业的实践,特别侧重于上述思想、方式和方法在我国 企业中应用的可能性,以及必需具备的环境条件,并列举了一些已有效应用 上述方法的我国企业的典型案例。-This book systematically expounded the latest in modern production management, and a representative of the thinking of ways and means. Such as: materials need to plan (MRP) and manufacturing resource planning (MRP Ⅱ) just-in-time production (JIT) flexible manufacturing system (FMS) and computer integrated manufacturing system (CIMS). At the time of writing, the combination of the practice of China' s enterprises, with particular emphasis on the above-mentioned ideas, ways and means in our country the possibility of enterprise applications, as well as the environmental conditions necessary for, and lists some of the effective application of these methods a typical case of China' s enterprises .
Date : 2025-12-18 Size : 436kb User : lijncos

DL : 0
全国第二次土地调查数据库建设的培训教材,包括土地调查数据库建设总体要求; 土地调查数据库建设的基本流程; 土地调查数据库及管理系统建设总体思路,相信对研究土地信息系统的相关人员有一定帮助-The second national land survey database of training materials for construction, including land survey database of the general requirements of the building land survey of the basic process of building a database land survey management system database and the overall idea, I believe that the study of the relevant land information system to help staff have a certain
Date : 2025-12-18 Size : 83kb User : xiyicheng

DL : 0
Lingo是最优化问题的一种建模语言,包括许多常用的函数可供使用者建立优化模型时调用,并提供与其他数据文件(如文本文件、Excel电子表格文件、数据库文件等)的接口,易于方便地输入、求解和分析大规模最优化问题。   由于这些特点,Lindo系统公司的线性、非线性和整数规划求解程序已经被全世界数千万的公司用来做最大化利润和最小化成本的分析。应用的范围包含生产线规划、运输、财务金融、投资分配、资本预算、混合排程、库存管理、资源配置等等... -Lingo is a kind of optimization problem modeling language, including many commonly used functions available for users to create optimized model call, and provide other data files (such as a text file, Excel spreadsheet files, database files, etc.) interface, easy easy to enter, solving and analyzing large-scale optimization problem. As a result of these characteristics, Lindo Systems, Inc. linear, nonlinear and integer programming solver has been the company tens of millions around the world used to maximize profit and minimize the cost of analysis. The scope of application include production line planning, transport, finance finance, investment allocation, capital budgeting, mixed scheduling, inventory management, resource allocation and so on ...
Date : 2025-12-18 Size : 310kb User : huierqing

非常好的学习PYTHON入门书,对项目管理有比较好的益处。-A very good learning PYTHON primer on project management, have better benefits.
Date : 2025-12-18 Size : 955kb User : wts

After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing-After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing
Date : 2025-12-18 Size : 5.28mb User : chen

DL : 0
ebook Management Information System (Laudon & Laudon)
Date : 2025-12-18 Size : 2.47mb User : zayed

DL : 0
object-oriented project management with uml
Date : 2025-12-18 Size : 1.4mb User : basar aif

Cisco Network Management Book (Networking book)
Date : 2025-12-18 Size : 10.18mb User : Van Thanh

title : Database.Management.Systems.Solution.Book Author : Ramakrishnan.Gehrke Edition : 3rd
Date : 2025-12-18 Size : 867kb User : ss_bgs
« 12 3 4 5 6 7 8 9 10 ... 50 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.