亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Blitz-Ball-The

  • The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he

    The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are some simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)

    標簽: ptfsf following the contains

    上傳時間: 2013-11-28

    上傳用戶:風之驕子

  • The module LSQ is for unconstrained linear least-squares fitting. It is based upon Applied Statisti

    The module LSQ is for unconstrained linear least-squares fitting. It is based upon Applied Statistics algorithm AS 274 (see comments at the start of the module). A planar-rotation algorithm is used to update the QR- factorization. This makes it suitable for updating regressions as more data become available. The module contains a test for singularities which is simpler and quicker than calculating the singular-value decomposition. An important feature of the algorithm is that it does not square the condition number. The matrix X X is not formed. Hence it is suitable for ill- conditioned problems, such as fitting polynomials. By taking advantage of the MODULE facility, it has been possible to remove many of the arguments to routines. Apart from the new function VARPRD, and a back-substitution routine BKSUB2 which it calls, the routines behave as in AS 274.

    標簽: least-squares unconstrained Statisti Applied

    上傳時間: 2015-05-14

    上傳用戶:aig85

  • This a very simple Yee algorithm 3D FDTD code in C implementing the free space form of Maxwell s equ

    This a very simple Yee algorithm 3D FDTD code in C implementing the free space form of Maxwell s equations on a Cartesian grid. There are no internal materials or geometry. The code as delivered simulates an idealized rectangular waveguide by treating the interior of the mesh as free space/air and enforcing PEC (Perfect Electric Conductor) conditions on the faces of the mesh.

    標簽: implementing algorithm Maxwell simple

    上傳時間: 2015-05-14

    上傳用戶:水中浮云

  • I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

    I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1

    標簽: I. vulnerability Introduction undisclosed

    上傳時間: 2015-05-15

    上傳用戶:xhz1993

  • SMS SDK classes.This is the archive that must be included in the classpath.

    SMS SDK classes.This is the archive that must be included in the classpath.

    標簽: classpath the included classes

    上傳時間: 2014-01-16

    上傳用戶:410805624

  • ANNUAL REPORT TO CONGRESS The Military Power of the People’s Republic of China 2005

    ANNUAL REPORT TO CONGRESS The Military Power of the People’s Republic of China 2005

    標簽: CONGRESS Military Republic ANNUAL

    上傳時間: 2013-12-27

    上傳用戶:zhengzg

  • This document describes the MPI and MPI standards They are both extensions to the MPI st

    This document describes the MPI and MPI standards They are both extensions to the MPI standard The MPI part of the document contains clarications and corrections to the MPI standard and denes MPI The MPI part of the document describes additions to the MPI standard and denes MPI These include miscellaneous topics process creation and management onesided communications extended collective operations external interfaces IO and additional language bindings

    標簽: MPI extensions describes the

    上傳時間: 2015-05-15

    上傳用戶:CHENKAI

  • Ion Team Lord Of The Rings Demo 模擬指環(huán)王的3D游戲 VS.NET編譯 里面提供高級渲染算法

    Ion Team Lord Of The Rings Demo 模擬指環(huán)王的3D游戲 VS.NET編譯 里面提供高級渲染算法

    標簽: Rings Demo Team Lord

    上傳時間: 2014-09-09

    上傳用戶:zq70996813

  • The DES sound code with C

    The DES sound code with C

    標簽: sound code with The

    上傳時間: 2013-11-29

    上傳用戶:曹云鵬

  • RSA code with C in the POS

    RSA code with C in the POS

    標簽: code with RSA POS

    上傳時間: 2013-12-28

    上傳用戶:標點符號

主站蜘蛛池模板: 城固县| 安平县| 海门市| 无棣县| 福鼎市| 东光县| 奇台县| 灵石县| 赤水市| 利辛县| 云梦县| 澜沧| 库伦旗| 图木舒克市| 来凤县| 无锡市| 陆河县| 光山县| 荃湾区| 沂南县| 科技| 鲁山县| 斗六市| 阿城市| 凤凰县| 长岭县| 鄂托克前旗| 永平县| 丰宁| 正阳县| 湖州市| 澎湖县| 偃师市| 外汇| 台湾省| 凤阳县| 泰和县| 原平市| 鹤山市| 惠来县| 晋州市|