2005 Center for Biological & Computational Learning at MIT and MIT All rights reserved. Permission to copy and modify this data, software, and its documentation only for internal research use in your organization is hereby granted, provided that this notice is retained thereon and on all copies. This data and software should not be distributed to anyone outside of your organization without explicit written authorization by the author(s) and MIT.
標(biāo)簽: Computational Biological MIT Permissio
上傳時(shí)間: 2014-01-27
上傳用戶:gaome
rINTCON=0x5 //Non-vectored,IRQ enable,FIQ disable rINTMOD=0x0 //All=IRQ mode
標(biāo)簽: Non-vectored IRQ rINTCON disable
上傳時(shí)間: 2013-12-17
上傳用戶:thuyenvinh
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – Examine contents
標(biāo)簽: Intrusion Detection Host-based Network
上傳時(shí)間: 2014-01-11
上傳用戶:ikemada
A simple and straightforeward instant messaging program written in Java for all platforms developed with ease of use and efficiency in mind
標(biāo)簽: straightforeward developed messaging platforms
上傳時(shí)間: 2014-12-07
上傳用戶:rishian
This folder contains all the codes based on Matlab Language for the book <《Iterative Methods for Linear and Nonlinear Equations》, and there are totally 21 M files, which can solve most of linear and nonlinear equations problems.
標(biāo)簽: Iterative the for Language
上傳時(shí)間: 2013-12-23
上傳用戶:cazjing
list all dlls for proc
上傳時(shí)間: 2015-09-18
上傳用戶:13188549192
When I use opencv, I use this very useful paper to begin the study. This is all I searched from the internet informations.
標(biāo)簽: use the searched opencv
上傳時(shí)間: 2014-01-12
上傳用戶:lht618
* "Copyright (c) 2006 Robert B. Reese ("AUTHOR")" * All rights reserved. * (R. Reese, reese@ece.msstate.edu, Mississippi State University) * IN NO EVENT SHALL THE "AUTHOR" BE LIABLE TO ANY PARTY FOR * DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT * OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE "AUTHOR" * HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
標(biāo)簽: Reese B. R. Copyright
上傳時(shí)間: 2015-09-24
上傳用戶:mpquest
Embedded computer systems permeate all aspects of our daily lives. Alarm clocks, coffee makers, digital watches, cell phones, and automobiles are just a few of the devices that make use of embedded systems. The design and development of such systems is unique, because the design constraints are different for each system. Essential to the development of an embedded system is an understanding of the hardware and software used for development.
標(biāo)簽: Embedded computer permeate aspects
上傳時(shí)間: 2013-12-15
上傳用戶:erkuizhang
Distributed Median,Alice has an array A, and Bob has an array B. All elements in A and B are distinct. Alice and Bob are interested in finding the median element of their combined arrays.
標(biāo)簽: array B. Distributed has
上傳時(shí)間: 2013-12-25
上傳用戶:洛木卓
蟲蟲下載站版權(quán)所有 京ICP備2021023401號(hào)-1