Answering Queries using views is an article that contains an introduction to the theory and some algorithms, examples for the queries that uses views to resolve some problems. Also this article have a large references for more information about this subject.
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths ...
Cromfs is a compressed read-only filesystem for Linux. Cromfs is best at archiving gigabytes of big files that have a lot of redundancy. It aims primarily at achieving a strong compression, even at the cost of memory and CPU time resources. It uses the LZMA compression algorithm from 7-zip and block ...
Face Recognition Library
========================
Advanced face recognition DLL using two functions : Train and Recognize. Uses neural net back propogation alogorithm with more AI tools added for imaging optimization. Library works great even for a low resolution web cam image and requires the user ...
The 2D CFD Program NaSt2D
The program is a 2D solver for the incompressible, transient Navier-Stokes equations including the temperature equation and free boundary problems. It uses finite differences for discretization on a structured equidistant staggered grid, central and upwind (donor-cell) d ...
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.