Computes the hafnian of a nonnegative integer matrix. Notes: Copy hafnian.c to main.c, in the same directory as Rothberg s code (see above). You can download the .tar directory with the code weighted-match.tar here. Then "make" the codes (this codes are in C, not C++). The program is then run by the command "wmatch".
標簽: hafnian nonnegative the Computes
上傳時間: 2013-12-23
上傳用戶:lmeeworm
關于NETFLOW信息分析的軟件。 is a netflow analyzer. It uses MySQL database to store accounting information. Filters, used in the JFlowAnalyzer, allows very flexible classificate any kind of traffic and store it in the differend fields in database
標簽: information accounting analyzer database
上傳時間: 2014-01-27
上傳用戶:kr770906
the booth algorithm to implement the 32bits multiplication.
標簽: multiplication the algorithm implement
上傳時間: 2014-01-13
上傳用戶:asdkin
Apress.Peer.to.Peer.with.VB.Dot.NET.eBook-LiB.chm 一本關于用VB.NET如何開發P2P程序的書,英文原版,非常不錯
上傳時間: 2013-12-17
上傳用戶:zhaoq123
是一本好書,verilog HDL,a guide to digital design and synthesis
標簽: synthesis verilog digital design
上傳時間: 2015-07-14
上傳用戶:熊少鋒
softIce is a good tool for windows to debug . This is a book which introduce many commond and teach us how to us the commonds in softice
標簽: introduce softIce commond windows
上傳時間: 2014-01-07
上傳用戶:13517191407
C function to convert strings.一個實用的C處理函數。
標簽: function convert strings to
上傳時間: 2014-01-22
上傳用戶:極客
win32緩沖區溢出實戰。原文:Intro to Win32 Exploits。從漏洞發現到漏洞調試和漏洞利用。
上傳時間: 2015-07-14
上傳用戶:壞壞的華仔
b tree how to operate on b tr
上傳時間: 2014-01-20
上傳用戶:開懷常笑
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
標簽: Cryptographic Primitives generate Library
上傳時間: 2015-07-16
上傳用戶:wqxstar