... considered part of Xen The multiplexer may or may not In the example of networking, the firewalling component of the network stack already provides this functionality In others, there may be no existing ... Memory Access (DMA) transfers The device is given a physical memory address by the driver and writes a chunk of data there Because the device exists outside the normal framework of the operating ... System/360 machines A company with a few System/360 minicomputers could save money by upgrading to a single S/360 mainframe, assuming the mainframe could provide the same features The Model 67...
Ngày tải lên: 06/07/2014, 15:31
the definitive guide to the xen hypervisor
... considered part of Xen The multiplexer may or may not In the example of networking, the firewalling component of the network stack already provides this functionality In others, there may be no existing ... Memory Access (DMA) transfers The device is given a physical memory address by the driver and writes a chunk of data there Because the device exists outside the normal framework of the operating ... System/360 machines A company with a few System/360 minicomputers could save money by upgrading to a single S/360 mainframe, assuming the mainframe could provide the same features The Model 67...
Ngày tải lên: 06/07/2014, 15:34
... of the main theorems Now we are ready to prove the main theorems We first note that the theorems can be reduced to the ones in the real analytic category by approximations The key fact is that the ... continuation of Fefferman’s program [7] for studying the geometry and analysis of strictly pseudoconvex domains The key idea of the program is to consider the Bergman and Szeg¨ kernels of the domains as o ... 1) We also show that the same invariant appears as the coefficient of the logarithmic term of the volume expansion of the domain with respect to the Bergman volume element (Theorem 2) This second...
Ngày tải lên: 16/02/2014, 05:20
Báo cáo hóa học: " Research Article On the Performance of Kernel Methods for Skin Color Segmentation" pot
... points, and −1 in the other half region The criterion followed therein consists of first mapping the data into F, and then separating the mapped points from the origin with maximum margin This decision ... models in the feature space, and their schematic is depicted in Figure One of them uses a maximum margin hyperplane in F that separates the mapped data from the origin of F [18], whereas the other ... formulation [26], and then, maximizing the margin is equivalent to minimizing the norm of the hyperplane vector w On the other hand, the domain description is required to bound the space region that...
Ngày tải lên: 21/06/2014, 20:20
Nghiên cứu biến dạng đàn hồi của hợp kim thay thế AB xen kẽ nguyên tử C
... khối K môđun trượt G thỏa mãn điều kiện : K ≤ K ≤ K max , Gmin ≤ G ≤ Gmax (1.53) 1 1 K max = Ciikk , Gmax = Cikik − Ciikk ÷ 10 (1.54) Theo Voigh [40], Trong [38] Reuss đưa giá trị giới ... (2.18) α tham số, Vˆ toán tử tùy ý Ta có Qˆ k a =− ∂ψ ⇒ Vˆ ∂ak α =− ∂ψ (α) ∂α (2.19) Năng lượng tự ψ (α ) hệ ứng với Hamiltonien Hˆ xác định theo lượng tự ψ hệ ứng với Hamiltonien Hˆ theo công ... (1.19) Chỉ số chạy itheo tất nguyên tử hệ, số α chạy theo tất quỹ đạo sở định vị nguyên tử cho.Thay (1.19) vào (1.18), phần tử ma trận Hmn thu kết hợp tuyến tính phần tử ma trận quỹ đạo sở H...
Ngày tải lên: 12/04/2016, 07:57
Compiling the linux kernel
... để tiến hành biên dịch kernel: o make dep: kiểm tra phụ thuộc file C o make clean: dọn dẹp file biên dịch cũ, tạo gói source o make bzImage: tạo kernel image o make modules: biên dịch module chọn ... tạo file config: o make config: dạng text file, hình nhiều câu hỏi, trả lời o make menuconfig: dạng đồ họa, (kiểu đồ họa DOS), dễ sử dụng o make xconfig: giao diện đồ họa o make oldconfig: lấy ... MẠNG ATHENA Bis Đinh Tiên Hoàng, P Đa Cao, Q.1, TP.HCM Tel: (84-8) 38244041 – 0989012418 www.athena.edu.vn o make modules_install: module biên dịch đưa vào /lib/modules/kernel-version Kernel image...
Ngày tải lên: 29/09/2013, 20:20
Tài liệu Understanding the Linux Kernel doc
... areas for: q q q q q q The The The The The The executable code of the program initialized data of the program uninitialized data of the program initial program stack (i.e., the User Mode stack) ... up( ) The down( ) method decrements the value of the semaphore If the new value is less than 0, the method adds the running process to the semaphore list and then blocks (i.e., invokes the scheduler) ... directory names that lead to the file If the first item in the pathname is a slash, the pathname is said to be absolute, since its starting point is the root directory Otherwise, if the first...
Ngày tải lên: 21/12/2013, 11:15
Tài liệu Linux Device Drivers-Chapter 16 :Physical Layout of the Kernel Source ppt
... of the time, when powering on the system, the user can select whether to boot Linux or to type firmware commands [65]We are not describing the formats or the tools in detail, because the information ... (usually on the #! or "shebang" line), the file relies on the other binary formats to load the interpreter Miscellaneous binary formats (such as the Java executable format) can be defined by the user ... as the system console At boot time, before frame buffer initialization, the console is either the native text screen or, if none is there, the first serial port The command line starting the...
Ngày tải lên: 21/01/2014, 07:20
Tài liệu Sự xen plasmid F vào trong nhiễm sắc thể vật chủ ppt
... "cho" F+ tạo thành nhiễm sắc thể có kích thước lớn vi khuẩn "nhậni" Hfr trao đổi chéo đơn; tượng mang tính thuận nghịch (b) Truyền DNA sợi đơn từ thể cho (Hfr) sang thể nhận (F-) Bởi nhân tố F...
Ngày tải lên: 26/01/2014, 07:20
tìm hiểu thể thơ thất ngôn xen lục ngôn trong quốc âm thi tập
... cứu ông Xuân Diệu, Phạm Văn Đồng, Đặng Thai Mai đăng tải công trình nghiên cứu như: Các nhà thơ cổ điển Việt Nam, Đặng Thai Mai toàn tập Như vậy, theo hiểu biết sưu tầm được, thể thơ thất ngôn ... định đựợc vị trí lịch sử văn học Việt Nam Người có công “xây dựng lối thơ Việt Nam” (Đặng Thai Mai) Nguyễn Trãi Với Quốc âm thi tập, lịch sử văn học Việt Nam thực tế có thêm thể loại mới: thơ Nôm ... tấu 3/4 tiết tấu riêng thơ Việt Nam Để khẳng định điều này, trước tiên phải kể đến có mặt hệ thống thơ ca dân gian Việt Nam Tục ngữ Việt Nam có nhiều câu ngắt theo kiểu 3/4 Ví dụ: - Đêm tháng...
Ngày tải lên: 19/02/2014, 14:30
Báo cáo khoa học: "THE DESIGN OF THE KERNEL ARCHITECTURE FOR THE EUROTRA* SOFTWARE" pptx
... for manipulating the data upon request of the CPU - : The meaning of the definition follows : is as M is defined to be the application of capply to the internal programe ip FORMALDEFINITION OF THE ... Backus cit, Williams 1982) Readers unfamiliar with these formalisms may skip this section ip.> capply is the semantic definition of the machine's CPU (see below) ip is obtained in the following ... interpreting the scheduling (control) parts of 231 (metacomposition) the user program It can pass control to the MMU at defined points (p
Ngày tải lên: 08/03/2014, 18:20
Linux system programming talking directly to the kernel and c library
... filename be opened, the kernel opens the directory containing the filename and searches for the given name From the filename, the kernel obtains the inode number From the inode number, the inode ... of the kernel) in the pathname to find the inode of the next entry In the preceding example, the kernel starts at /, gets the inode for home, goes there, gets the inode for blackbeard, runs there, ... Events Mapping Files into Memory mmap() munmap() Mapping Example Advantages of mmap() Disadvantages of mmap() Resizing a Mapping Changing the Protection of a Mapping Synchronizing a File with a Mapping...
Ngày tải lên: 19/03/2014, 13:39
Rootkits - subverting the windows kernel
... represents the importance of recognizing the interconnectedness of the world in which we live The sword is the tool of the Samurai, the object of his skill You'll notice that his sword is centered in the ... users of the infected computer Like rootkits, spyware may be difficult to detect Some types of spyware hook into Web browsers or program shells, making them difficult to remove They then make the ... if a software worm infects the power control network and disables it, the target country still loses use of the power plants' output, but the damage is neither permanent nor as expensive How...
Ngày tải lên: 19/03/2014, 13:42
Báo cáo khoa học: "State-of-the-Art Kernels for Natural Language Processing" pdf
Ngày tải lên: 23/03/2014, 14:20
Báo cáo khoa học: " New Ranking Algorithms for Parsing and Tagging: Kernels over Discrete Structures, and the Voted Perceptron" docx
... N the D N man N the man NP man D the NP N D N man Figure 2: a) An example parse tree b) The sub-trees of the NP covering the man The tree in (a) contains all of these subtrees, as well as many ... different If the state labels at and are the same, but the words at and are different, then Else if the state labels at and are the same, and the words at and are the same, then There are a ... entities on the test set, and of these are correct then the precision of a method is Similarly, if is the number of entities in the human annotated version of the test set, then the recall is...
Ngày tải lên: 23/03/2014, 20:20
o'reilly - understanding the linux kernel
... • • • • • • The executable code of the program The initialized data of the program The uninitialized data of the program The initial program stack (that is, the User Mode stack) The executable ... method decrements the value of the semaphore If the new value is less than 0, the method adds the running process to the semaphore list and then blocks (i.e., invokes the scheduler) The up( ) method ... pathname f1 When this command is executed, the filesystem creates a soft link and writes into it the f1 pathname It then inserts— in the proper directory—a new entry containing the last name of the...
Ngày tải lên: 25/03/2014, 10:52
The Book of Xen: A Practical Guide for the System Administrator doc
... trademarks of their respective owners Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the ... about the network device: First, it’s got a dummy MAC address You can see the actual MAC address of the virtual Ethernet device from within the domU Second, the counters are reversed— the domain’s ... to hardware The domain kernel has the usual hardware drivers and uses them to export abstractions of hardware devices to the hypervisor and thence to virtual machines Think of the machine as a...
Ngày tải lên: 30/03/2014, 20:20
the kernel trick for distances
... The present paper attempts to extend the utility of the kernel trick by looking at the problem of which kernels can be used to compute distances in feature spaces Again, the underlying mathematical ... trick allows the formulation of nonlinear variants of any algorithm that can be cast in terms of dot products, SVMs being but the most prominent example 14, 9, 4] Although the mathematical result ... of one of the simplest similarity measures, the dot product (x x ), x x RN The question arises as to whether there also exist generalizations of the simplest dissimilarity measure, the distance...
Ngày tải lên: 24/04/2014, 14:08
Báo cáo hóa học: " Research Article A Hilbert-Type Integral Inequality in the Whole Plane with the Homogeneous Kernel of Degree −2 Dongmei Xin and Bicheng Yang" pdf
... , we may get a contradiction that the constant factor in the reverse of 3.1 is not the best possible Thus the theorem is proved By the same way of Theorem 3.3, we still have the following theorem ... valid Setting the same g y as Theorem 3.1, by the reverse of 2.10 , we have J > If J ∞, then the reverse of 3.2 is obvious value; if J < ∞, then by the reverse of 3.1 , we obtain the reverses ... contradicts the fact that k λ < K Hence the constant factor k λ in the reverse of 3.1 is the best possible If the constant factor in reverse of 3.2 is not the best possible, then by the reverse...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo khoa học nông nghiệp " Investigation of rice kernel cracking and its control in the field and during post-harvest processes in the Mekong Delta of Vietnam " docx
... here that the amount allocated following each milestone deadline does not match with the investment to be made for the purchase of the driers and other equipment The delay start of the project ... feasibility of the research The glass transition was successfully measured by TMCT (Thermal Mechanical Compression Test) device developed at the UQ (Figure 9) The same technique will be used in NLU The ... Nong Lam University project team to Provincial Departments of Agriculture and Rural Development to highlight the project objectives 5.5 Project Management The project has been managed by the team...
Ngày tải lên: 21/06/2014, 06:20