search for: atmost

Displaying 12 results from an estimated 12 matches for "atmost".

Did you mean: almost
2010 Jan 30
3
Checksum fletcher4 or sha256 ?
Hi, I''m atmost ready to deploy my new homeserver for final testing. Before I want to be sure that nothing big is left untouched. Reading ZFS Admin Guide About the checksum method, there''s no advice about it. The default is fletcher4. there''s also SHA256 Now the sha256 is pretty ''heavy...
2004 Jan 21
2
[Fwd: Re: Comboot Menu]
...t;On Tuesday 20 January 2004 16:34, Murali Krishnan Ganapathy wrote: > > >>Thanks for your reply. Here is my first attempt at a file format for >>describing the menu. >> >>menus 5 # I am declaring 5 menus numbered 0,1,2,3,4 >>menusize 10 # All of them have atmost 10 items >> >>Are these two necessary ? Can't you compute them from the rest of the file ? >> >> >> >>startmenu 1 # The main menu is menu number 1 (is this needed? or should >>I just assume menu 0) >> >> > >I would default to...
2006 Mar 20
0
unchanging session id
...us users even if their host, user-agent access times etc. are completely different. I am using session.session_id to track this data. and this session id changes every day. 1 day session_id A is given to 16000 accesses second day session_id B is given to 16000 accesses (other session ids total upto atmost 50 accesses). What can be the reason? what can be the thing that changes this session id everyday? How can I override session_id generating function (I couldnt find it) Thanks in advance, onur
2005 Oct 26
0
Help regarding TBF and CBQ
...modem(so we don`t know the bandwidth in advance for the WAN and depends on the ADSL connection taken). We need to give highest priority to the Voice and control the WAN bandwidth to 2Mbps. I tried with the TBF by giving 500kbps for voice and 1.5Mbps for other traffic(I`m assuming that a user takes atmost 2Mbps line). But the maximum throughput i`m getting for the data is 1.15 only. Even if create only one TBF class with full 2 Mbps rate). I need to simulate different WAN bandwidth speeds like 64kbps, 128kbps, 256kbps..etc, How to do simulate this?. What is the maximum bandwidth that a TBF can cont...
2012 Aug 01
1
Efficient deterministic algorithm for Matching Weighted Graphs with bounded degree.
...g problem for then the complexity n^4. It seems the best way to model the solution is to consider only edges with are at distance of 1 unit i.e. closest edge from every vertex and not every edge from the given vertex. This will bring down the complexity from n^4 to 6*6*n^2 assuming every vertex has atmost 6 neighboring vertex. Quadratic complexity seems manageable. Ofcourse now the solution become lot more sensitive to the errors in Graph G2. Assuming best case if I have no errors in G2 i.e. for every vertex I know correctly it's closest neighbored in the rectangular grid then optimizing distanc...
2007 Dec 06
10
Feedback on RC2
I tried to upgrade my existing application to RC2 last night. Like many, I use this mostly for running scheduled tasks. For the moment, I''ve abandoned the effort, but am looking forward to being able to use this. Feedback below: First, the reason I was looking forward to this upgrade was to use the threaded scheduler. I have an application with long-running tasks. I found that
2010 Dec 08
0
No subject
...menting the host/guest protocol. 2) A user level daemon that is + * responsible for data gathering. + * + * Host/Guest Protocol: The host iterates over an index and expects the = guest + * to assign a key name to the index and also return the value correspondi= ng to + * the key. The host will have atmost one KVP transaction outstanding at = any + * given point in time. The host side iteration stops when the guest = returns + * an error. Microsoft has specified the following mapping of key names = to + * host specified index: + * + * Index Key Name + * 0 FullyQualifiedDomainName + * 1 Integration...
2010 Dec 08
0
No subject
...menting the host/guest protocol. 2) A user level daemon that is + * responsible for data gathering. + * + * Host/Guest Protocol: The host iterates over an index and expects the = guest + * to assign a key name to the index and also return the value correspondi= ng to + * the key. The host will have atmost one KVP transaction outstanding at = any + * given point in time. The host side iteration stops when the guest = returns + * an error. Microsoft has specified the following mapping of key names = to + * host specified index: + * + * Index Key Name + * 0 FullyQualifiedDomainName + * 1 Integration...
2010 Dec 17
0
[PATCH 3/4] Staging: hv: Implement key/value pair (KVP)
...mplementing the host/guest protocol. 2) A user level daemon that is + * responsible for data gathering. + * + * Host/Guest Protocol: The host iterates over an index and expects the guest + * to assign a key name to the index and also return the value corresponding to + * the key. The host will have atmost one KVP transaction outstanding at any + * given point in time. The host side iteration stops when the guest returns + * an error. Microsoft has specified the following mapping of key names to + * host specified index: + * + * Index Key Name + * 0 FullyQualifiedDomainName + * 1 IntegrationServic...
2010 Dec 17
0
[PATCH 3/4] Staging: hv: Implement key/value pair (KVP)
...mplementing the host/guest protocol. 2) A user level daemon that is + * responsible for data gathering. + * + * Host/Guest Protocol: The host iterates over an index and expects the guest + * to assign a key name to the index and also return the value corresponding to + * the key. The host will have atmost one KVP transaction outstanding at any + * given point in time. The host side iteration stops when the guest returns + * an error. Microsoft has specified the following mapping of key names to + * host specified index: + * + * Index Key Name + * 0 FullyQualifiedDomainName + * 1 IntegrationServic...
2010 Nov 22
1
[PATCH 3/3]: An implementation of HyperV KVP functionality
An implementation of key/value pair feature (KVP) for Linux on HyperV. In this version of the patch I have addressed all the comments I have received to date. I have also included the code for the user-level daemon here for your reference. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> -------------- next part -------------- An embedded and charset-unspecified text was
2010 Nov 22
1
[PATCH 3/3]: An implementation of HyperV KVP functionality
An implementation of key/value pair feature (KVP) for Linux on HyperV. In this version of the patch I have addressed all the comments I have received to date. I have also included the code for the user-level daemon here for your reference. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> -------------- next part -------------- An embedded and charset-unspecified text was