亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Well-documented

  • · Develop clear, readable, Well-documented and well-designed programs in the C Programming Language.

    · Develop clear, readable, Well-documented and well-designed programs in the C Programming Language. · Develop software in the Unix/Linux using tools such as gcc, gdb, and make. · Locate and interpreting “man pages” applicable to application-level system programming. · Use the POSIX/Unix API to system functions to manage process and sessions as well as use signals and pipes for inter-process communication. · Understanding how synchronization might become problematic in light of concurrency. · Understand how to communicate and cooperate with a project partner.

    標簽: Well-documented well-designed Programming Language

    上傳時間: 2015-08-16

    上傳用戶:yuchunhai1990

  • JaNet: Java Neural Network Toolkit resume: A well documented toolkit for designing and training, a

    JaNet: Java Neural Network Toolkit resume: A well documented toolkit for designing and training, and a java library for inclusion in third party programs. description: jaNet package is a java neural network toolkit, which you can use to design, test, train and optimize an ideal Neural Network for your private application. You can then include your saved network in your program using the jaNet.backprop package. The consequent documentation is only in french for the moment, but an english translation is planned. The java source code is released under GPL, and can be compiled with JDK, Symantec Cafe or MS Visual J

    標簽: documented designing training Network

    上傳時間: 2016-04-15

    上傳用戶:zhanditian

  • 智能電網安全性

    Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent Well-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid distributionequipment; and insecure storage of a private key in distribution automation equipment. For each of theseattacks, we examine the breach, the potential threat, and secure silicon methods that, as part of acomplete security strategy, can help thwart the attacks.

    標簽: 智能電網 安全性

    上傳時間: 2013-10-27

    上傳用戶:tecman

  • The Java Cookbook is a comprehensive collection of problems, solutions, and practical examples for

    The Java Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Java. Developers will find hundreds of tried-andtrue Java "recipes" covering all of the major APIs as well as some APIs that aren t as well documented in other Java books.

    標簽: comprehensive collection practical solutions

    上傳時間: 2014-01-16

    上傳用戶:ukuk

  • This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseud

    This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseudo-random irregular low density parity check matrix is based on Radford M. Neal’s programs collection, which can be found in [1]. While Neal’s collection is well documented, in my opinion, C source codes are still overwhelming, especially if you are not knowledgeable in C language. My software is written for MATLAB, which is more readable than C. You may also want to refer to another MATLAB based LDPC source codes in [2], which has different flavor of code-writing style (in fact Arun has error in his log-likelihood decoder).

    標簽: LDPC introduction simulation software

    上傳時間: 2014-01-14

    上傳用戶:大融融rr

  • This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseud

    This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseudo-random irregular low density parity check matrix is based on Radford M. Neal’s programs collection, which can be found in [1]. While Neal’s collection is well documented, in my opinion, C source codes are still overwhelming, especially if you are not knowledgeable in C language. My software is written for MATLAB, which is more readable than C. You may also want to refer to another MATLAB based LDPC source codes in [2], which has different flavor of code-writing style (in fact Arun has error in his log-likelihood decoder).

    標簽: LDPC introduction simulation software

    上傳時間: 2014-12-05

    上傳用戶:change0329

  • this is a java api,can help JAVAProgramers to study well.

    this is a java api,can help JAVAProgramers to study well.

    標簽: JAVAProgramers study this help

    上傳時間: 2015-05-12

    上傳用戶:2525775

  • Unzip this file into a writeable directory. You should end up with a "Geocode" project, as well as

    Unzip this file into a writeable directory. You should end up with a "Geocode" project, as well as Bitmaps and TestData directories. This sample geocodes single-match zip codes, entered by the user, or a batch-match of a table of zips (and other info) against a point shapefile. The point data shapefile consists of 41859 point features from 1996 GDT data, in decimal degrees. The table of zips that can be used in the batch match consists of 38 records, entitled "few_zips.dbf". More specifcs are found at the top of each form and are provided throughout the code.

    標簽: directory writeable Geocode project

    上傳時間: 2013-12-19

    上傳用戶:wangchong

  • BIOSIG is an open source software library for biomedical signal processing. Library works well with

    BIOSIG is an open source software library for biomedical signal processing. Library works well with Octave and Matlab. Special emphasis is put on EEG/MEG/ECoG, but also other types of biosignals like ECG, EMG, etc. are supported.

    標簽: biomedical processing software Library

    上傳時間: 2013-12-29

    上傳用戶:ruan2570406

  • This text introduces the spirit and theory of hacking as well as the science behind it all it also p

    This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 譯作:《黑客入侵的藝術》,也是從朋友的寶箱中搜來的,以前層大致瀏覽過,是難得一件的好資料。

    標簽: introduces the hacking science

    上傳時間: 2013-12-28

    上傳用戶:離殤

主站蜘蛛池模板: 湖北省| 湛江市| 高清| 安远县| 岳阳市| 揭阳市| 峡江县| 大丰市| 仪陇县| 寿阳县| 清苑县| 右玉县| 丹阳市| 大渡口区| 多伦县| 西城区| 达拉特旗| 德安县| 杭锦后旗| 临安市| 贵阳市| 永新县| 来安县| 睢宁县| 高平市| 洛隆县| 中牟县| 凤凰县| 石景山区| 环江| 安西县| 巴马| 黔江区| 沿河| 柳江县| 休宁县| 汶川县| 台东市| 阳城县| 新竹市| 阳山县|