نتایج جستجو برای: حدسیه bsd

تعداد نتایج: 2172  

2012

Most standard software development methodologies are often not applied to software projects in many developing countries of the world. The approach generally practice is close to what eXtreme Programming (XP) is likely promoting, just keep coding and testing as the requirement evolves. XP is an agile software process development methodology that has inherent capability for improving efficiency ...

Journal: :Computing Systems 1989
W. Richard Stevens

The throughput of a disk subsystem is critical to the performance of a computer system. The 4.3BSD UNIX operating system provides a good example for looking at the heuristics that are used to optimize the positioning of the read-write heads of a disk drive. In this paper we investigate the heuristics used in the BSD hp disk driver. These heuristics are driven by three parameters that can be cha...

Journal: :Simons symposia 2021

Recently, all Birch and Swinnerton-Dyer invariants, except for the order of , have been computed curves genus 2 contained in L-functions Modular Forms Database [LMFDB]. This report explains improvements made to implementation algorithm described [vBom19] that were needed do computation Tamagawa numbers real period reasonable time. We also explain some more technical details algorithm, give a br...

2011
X. Li C. Bao

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

Journal: :RFC 2015
Scott Hollenbeck

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

2013
A. Gulbrandsen

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

Journal: :RFC 2014
Miriam Ortseifen Gunnar Dickfeld

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

2015
N. Williams

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

2014
M. Perumal P. Ravindran

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید