Linux in a Nutshell, 5th Edition By Stephen Figgins, Robert Love, Arnold Robbins, Ellen Siever, Aaron Weber ... ... ... ... ... ... ... ..... Publisher: O Reilly Pub Date: July 2005 ISBN: 0-596-00930-5 Pages: 944 Over the last few years, Linux has grown both as an operating system and a tool for personal and business use. Simultaneously becoming more user friendly and more powerful as a back-end system, Linux has achieved new plateaus: the newer filesystems have solidified, new commands and tools have appeared and become standard, and the desktop--including new desktop environments--have proved to be viable, stable, and readily accessible to even those who don t consider themselves computer gurus.
標簽: Nutshell Edition Figgins Stephen
上傳時間: 2015-12-03
上傳用戶:frank1234
UC Library Extensions UnderC comes with a pocket implementation of the standard C++ libraries, which is a reasonably faithful subset. This documentation describes those UnderC functions and classes which are not part of the C++ standard. UC Library Builtin functions: Most of these are standard C functions, but there are a few unique to the UnderC system which give you runtime access to the compiler. You may evaluate expressions, execute commands, compile code, etc. * Expands the text in expr using the UnderC preprocessor, putting the result into buff. void uc_macro_subst(const char* expr, char* buff, int buffsize) * Executes a UC #-command, like #l or #help. uc_cmd() expects the name of the command, _without_ the hash, e.g. uc_cmd("l fred.cpp") or uc_cmd("help"). void uc_cmd(const char* cmd) * Evaluates any C++ expression or statement will return non-zero if unsuccessful.
標簽: implementation Extensions libraries standard
上傳時間: 2013-12-14
上傳用戶:leehom61
The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, "Authenticated Identity-Based Encryption", available on eprint.
標簽: Boneh-Franklin implementation identity-based encryption
上傳時間: 2013-12-20
上傳用戶:yan2267246
In this article, we present an overview of methods for sequential simulation from posterior distributions. These methods are of particular interest in Bayesian filtering for discrete time dynamic models that are typically nonlinear and non-Gaussian. A general importance sampling framework is developed that unifies many of the methods which have been proposed over the last few decades in several different scientific disciplines. Novel extensions to the existing methods are also proposed.We showin particular how to incorporate local linearisation methods similar to those which have previously been employed in the deterministic filtering literature these lead to very effective importance distributions. Furthermore we describe a method which uses Rao-Blackwellisation in order to take advantage of the analytic structure present in some important classes of state-space models. In a final section we develop algorithms for prediction, smoothing and evaluation of the likelihood in dynamic models.
標簽: sequential simulation posterior overview
上傳時間: 2015-12-31
上傳用戶:225588
Visual C++ Windows Shell Programming Welcome to Visual C++ Windows Shell Programming! With this book, you ll learn how to program the Windows Shell, customize its behavior and integrate your applications with it. You ll discover how to use and modify its features to best effect, and the way to call shell API functions whose documentation is scant. Programming the shell isn t difficult, but few books explain the subject in its entirety.
標簽: Programming Windows Visual Shell
上傳時間: 2014-11-27
上傳用戶:zhangjinzj
upsd_flash.c These functions are provided to help you develop your initial code. They are optimized for speed rather that size. As a result, you will see very few nested function calls. If speed is not critical, you can use function calls for common tasks (like dat polling after writing a byte to Flash) The penalty is the extra processor time to make the nested calls.
標簽: upsd_flash functions are provided
上傳時間: 2013-12-23
上傳用戶:Andy123456
Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write natural Java objects and some simple configuration files, and Hibernate automates all the interaction between your objects and the database. You don t even need to know the database is there, and you can change from one database to another simply by changing a few statements in a configuration file. If you ve needed to add a database backend to your application, don t put it off. It s much more fun than it used to be, and Hibernate: A Developer s Notebook shows you why.
標簽: Hibernate persistence Developer you
上傳時間: 2016-04-07
上傳用戶:123啊
Apache 2.0.63 is the current stable version of the 2.0 series, and is recommended over any previous 2.0 release. This release fixes a few potential security vulnerabilites.
標簽: recommended the previous current
上傳時間: 2016-04-14
上傳用戶:hullow
GloptiPoly 3: moments, optimization and semidefinite programming. Gloptipoly 3 is intended to solve, or at least approximate, the Generalized Problem of Moments (GPM), an infinite-dimensional optimization problem which can be viewed as an extension of the classical problem of moments [8]. From a theoretical viewpoint, the GPM has developments and impact in various areas of mathematics such as algebra, Fourier analysis, functional analysis, operator theory, probability and statistics, to cite a few. In addition, and despite a rather simple and short formulation, the GPM has a large number of important applications in various fields such as optimization, probability, finance, control, signal processing, chemistry, cristallography, tomography, etc. For an account of various methodologies as well as some of potential applications, the interested reader is referred to [1, 2] and the nice collection of papers [5].
標簽: optimization semidefinite programming GloptiPoly
上傳時間: 2016-06-05
上傳用戶:lgnf
linux下用C語言寫的聊天程序!/*BUG and NOTE: Not join protect to Shared Memory Segments,example Semaphore Arrays. Not check the parameters validity. When transmit may be error. If the client program no right exit,others cannot know,the service program shouldbe check the client program whether exist timing. The program when exit(), it do not delete the Shared Memory Segments,you maybe use atexit() but the program have some processes. When one process is exit(),others is continue. The service program s action is few. And so on. */
標簽: Semaphore Segments example protect
上傳時間: 2014-01-25
上傳用戶:xhz1993