亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

FIRST-ever

  • Tricks of the Windows Game Programmin Gurus, 2E takes the reader through Win32 programming, covering

    Tricks of the Windows Game Programmin Gurus, 2E takes the reader through Win32 programming, covering all the major components of DirectX including DirectDraw, DirectSound, DirectInput (including Force Feedback), and DirectMusic. Andre teaches the reader 2D graphics and rasterization techniques. Finally, Andre provides the most intense coverage of game algorithms, multithreaded programming, artificial intelligence (including fuzzy logic, neural nets, and genetic algorithms), and physics modeling you have ever seen in a game book.

    標簽: programming Programmin the covering

    上傳時間: 2014-01-02

    上傳用戶:wangchong

  • Recent advances in experimental methods have resulted in the generation of enormous volumes of data

    Recent advances in experimental methods have resulted in the generation of enormous volumes of data across the life sciences. Hence clustering and classification techniques that were once predominantly the domain of ecologists are now being used more widely. This book provides an overview of these important data analysis methods, from long-established statistical methods to more recent machine learning techniques. It aims to provide a framework that will enable the reader to recognise the assumptions and constraints that are implicit in all such techniques. Important generic issues are discussed first and then the major families of algorithms are described. Throughout the focus is on explanation and understanding and readers are directed to other resources that provide additional mathematical rigour when it is required. Examples taken from across the whole of biology, including bioinformatics, are provided throughout the book to illustrate the key concepts and each technique’s potential.

    標簽: experimental generation advances enormous

    上傳時間: 2016-10-23

    上傳用戶:wkchong

  • 譚浩強C課件

    譚浩強C課件,tanhaoqiang C,first part

    標簽: 譚浩強

    上傳時間: 2014-02-10

    上傳用戶:l254587896

  • If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis

    If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高級程序設計 里面自代源碼

    標簽: restriction Explorer Internet security

    上傳時間: 2016-11-18

    上傳用戶:源弋弋

  • This demo shows the BER performance of linear, decision feedback (DFE), and maximum likelihood seque

    This demo shows the BER performance of linear, decision feedback (DFE), and maximum likelihood sequence estimation (MLSE) equalizers when operating in a static channel with a deep null. The MLSE equalizer is invoked first with perfect channel knowledge, then with an imperfect, although straightforward, channel estimation algorithm. The BER results are determined through Monte Carlo simulation. The demo shows how to use these equalizers seamlessly across multiple blocks of data, where equalizer state must be maintained between data blocks.

    標簽: performance likelihood decision feedback

    上傳時間: 2013-11-25

    上傳用戶:1079836864

  • dwr.xml說明文檔。配置文件init部分聲明那些用于建立遠程bean和在方法調用中轉換bean的類.這部分是可選擇性配置的,多數情況下可以不必使用它,如果你想定義一個新的creator或者conv

    dwr.xml說明文檔。配置文件init部分聲明那些用于建立遠程bean和在方法調用中轉換bean的類.這部分是可選擇性配置的,多數情況下可以不必使用它,如果你想定義一個新的creator或者converter那么就必須在部分中聲明,but do double check on the ones that are currently available first.

    標簽: bean creator conv init

    上傳時間: 2014-02-14

    上傳用戶:偷心的海盜

  • 大學時的編譯大作業

    大學時的編譯大作業,是對LL(1)語法的分析過程,會產生first集,follow集和預測分析表!

    標簽: 大學 編譯

    上傳時間: 2014-01-03

    上傳用戶:VRMMO

  • 學編譯原理時寫的一個語法分析程序 分類:C/C++技術交流 一.[目的要求] ① 對輸入文法

    學編譯原理時寫的一個語法分析程序 分類:C/C++技術交流 一.[目的要求] ① 對輸入文法,由程序自動構造FIRST FOLLOW集 ② 對輸入文法,由程序自動生成它的LL(1)分析表; ③ 對于給定的輸入串,應能判斷識別該串是否為給定文法的句型。 二.[題目分析] 該程序可分為如下幾步: (1)讀入文法 (2)判斷正誤 (3)若無誤,判斷是否為LL(1)文法 (4)若是,構造分析表; (5)由總控算法判斷輸入符號串是否為該文法的句型。

    標簽: 編譯原理 交流 程序

    上傳時間: 2016-12-05

    上傳用戶:1101055045

  • Good morning, dear teachers. I am very glad to be here for your interview. my name is xx.I am 21 yea

    Good morning, dear teachers. I am very glad to be here for your interview. my name is xx.I am 21 years old. I come from Dafang, a small town of Guizhou province. My undergraduate period will be accomplished in East China Jiaotong University. I major in electrical engineering and automation. I am interesting in computer, especially in program design. I am a hard study student, especially in the things which I interesting in. I am a person with great perseverance. During the days I preparing for the postgraduate examination, I insist on study for more than 10 hours every day. Just owing to this, I could pass the first examination finally. I am also a person with great ambition.

    標簽: interview teachers morning Good

    上傳時間: 2014-01-11

    上傳用戶:釣鰲牧馬

  • The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

    The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.

    標簽: cryptography literature has Secrecy

    上傳時間: 2016-12-08

    上傳用戶:fxf126@126.com

主站蜘蛛池模板: 富顺县| 佳木斯市| 星子县| 大洼县| 炎陵县| 成安县| 乳山市| 福清市| 谢通门县| 冀州市| 青浦区| 凤山市| 双峰县| 砀山县| 沧源| 海原县| 松溪县| 瑞安市| 交口县| 密山市| 秀山| 突泉县| 蛟河市| 渭源县| 怀宁县| 安塞县| 普定县| 高碑店市| 孟连| 永泰县| 镇康县| 南涧| 徐州市| 新平| 如皋市| 鹤山市| 桂平市| 宁海县| 大荔县| 台安县| 威宁|