-
Please read this document before attempting to compile and run the libraries and applications! The projects
must be compiled in a particular order. Standard support questions are about compiler and/or linker errors
that are generated when users try to compile the projects in the wrong order. Other information of interest
is available here, so read the entire document fi rst.
Wild Magic Version 2.1 is what ships with the fi rst printing of the Game Physics book. Some of the
applications that are referenced in the book did not make it onto the CD–ROM for the book. Version 2.2
contains those applications, plus more
標簽:
applications
attempting
and
libraries
上傳時間:
2014-01-16
上傳用戶:Late_Li
-
The XC226x derivatives are high-performance members of the Infineon XC2000 Family
of full-feature single-chip CMOS microcontrollers. These devices extend the functionality
and performance of the C166 Family in terms of instructions (MAC unit), peripherals, and
speed. They combine high CPU performance (up to 80 million instructions per second)
with extended peripheral functionality and enhanced IO capabilities. Optimized
peripherals can be adapted flexibly to meet the application requirements. These
derivatives utilize clock generation via PLL and internal or external clock sources. Onchip
memory modules include program Flash, program RAM, and data RAM.
標簽:
high-performance
full-feature
derivatives
Infineon
上傳時間:
2016-12-12
上傳用戶:wab1981
-
本文擋主要探討一些web代碼安全里比較隱秘,容易被程序員忽視的問題.
主要內容:
二次攻擊[Second attack]
類型1:通過文件系統函數漏洞轉換
類型2:通過SQL注射漏洞轉換
類型3:通過正則表達式中轉變量
類型4:通過編碼/解碼中轉變量
數組變量的魅力
Code與系統
Code與http協議
漏洞挖掘
標簽:
web
代碼
比較
上傳時間:
2016-12-13
上傳用戶:佳期如夢
-
Batch version of the back-propagation algorithm.
% Given a set of corresponding input-output pairs and an initial network
% [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the
% network with backpropagation.
%
% The activation functions must be either linear or tanh. The network
% architecture is defined by the matrix NetDef consisting of two
% rows. The first row specifies the hidden layer while the second
% specifies the output layer.
%
標簽:
back-propagation
corresponding
input-output
algorithm
上傳時間:
2016-12-27
上傳用戶:exxxds
-
% Train a two layer neural network with the Levenberg-Marquardt
% method.
%
% If desired, it is possible to use regularization by
% weight decay. Also pruned (ie. not fully connected) networks can
% be trained.
%
% Given a set of corresponding input-output pairs and an initial
% network,
% [W1,W2,critvec,iteration,lambda]=marq(NetDef,W1,W2,PHI,Y,trparms)
% trains the network with the Levenberg-Marquardt method.
%
% The activation functions can be either linear or tanh. The
% network architecture is defined by the matrix NetDef which
% has two rows. The first row specifies the hidden layer and the
% second row specifies the output layer.
標簽:
Levenberg-Marquardt
desired
network
neural
上傳時間:
2016-12-27
上傳用戶:jcljkh
-
Train a two layer neural network with a recursive prediction error
% algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully
% connected) networks can be trained.
%
% The activation functions can either be linear or tanh. The network
% architecture is defined by the matrix NetDef , which has of two
% rows. The first row specifies the hidden layer while the second
% specifies the output layer.
標簽:
recursive
prediction
algorithm
Gauss-Ne
上傳時間:
2016-12-27
上傳用戶:ljt101007
-
POS is a Java® platform-based, mission-critical, ISO-8583 based financial transaction library/framework that can be customized and extended in order to implement financial interchanges.
標簽:
mission-critical
platform-based
transaction
financial
上傳時間:
2013-12-15
上傳用戶:libenshu01
-
Eclipse+Web開發從入門到精通
These files contain all of the code listings in
Java: The Complete Reference, J2SE 5 Edition
The source code is organized into files by chapter.
For example, the file Chap7.code contains the
programs shown in Chapter 7.
Within each chapter file, the listings are stored
in the same order as they appear in the book.
Simply edit the appropriate file to extract the
listing in which you are interested.
標簽:
Complete
Referenc
listings
Eclipse
上傳時間:
2017-01-20
上傳用戶:as275944189
-
the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to solve this problem, I read four books, Inquiries related information ( s burden
標簽:
withdrawals
the
inquiries
simulated
上傳時間:
2017-01-27
上傳用戶:我們的船長
-
)。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to solve this problem, I read four books, Inquiries related information
標簽:
withdrawals
the
inquiries
simulated
上傳時間:
2014-01-16
上傳用戶:lnnn30