虫虫首页|资源下载|资源专辑|精品软件
登录|注册

contribution

  • Expert Choice represents a significant contribution to the decision making process 工t assists a deci

    Expert Choice represents a significant contribution to the decision making process 工t assists a decision maker in solving complex problems involving many criteria and several courses of action . An Expert Choice solution to a problem reflects the expertise of the decision maker , not the computer . Behavioral scientists have spent many years studying the human mind and how it makes decisions . They have found that humans are influenced by their previous experiences and this causes them to have biases . Basic instincts , preferences and environmental factors also play key roles in how we analyze data and make decisions . There 15 way to remove these factors from human decision making , nor would we necessarily want to , but as the problems of our world become more and more complex , it 15 necessary for us to employ a framework to help make more logical and less biased decisions while still taking our feelings and intuition into consideration .

    标签: contribution significant represents decision

    上传时间: 2015-06-02

    上传用户:gmh1314

  • FAT32 Spec (SDA contribution).

    FAT32 Spec (SDA contribution).

    标签: contribution Spec FAT SDA

    上传时间: 2014-01-11

    上传用户:jichenxi0730

  • This contribution provides functions for finding an optimum parameter set using the evolutionary alg

    This contribution provides functions for finding an optimum parameter set using the evolutionary algorithm of Differential Evolution. Simply speaking: If you have some complicated function of which you are unable to compute a derivative, and you want to find the parameter set minimizing the output of the function, using this package is one possible way to go.

    标签: contribution evolutionary functions parameter

    上传时间: 2017-06-03

    上传用户:海陆空653

  • Pocket 1945 is a classic shooter inspired by the classic 1942 game. The game is written in C# target

    Pocket 1945 is a classic shooter inspired by the classic 1942 game. The game is written in C# targeting the .NET Compact Framework. This article is my first submission to Code Project and is my contribution to ongoing .NET CF competition.

    标签: classic game inspired shooter

    上传时间: 2014-02-10

    上传用户:康郎

  • JLayer is a library that decodes/plays/converts MPEG 1/2/2.5 Layer 1/2/3 (i.e. MP3) in real time fo

    JLayer is a library that decodes/plays/converts MPEG 1/2/2.5 Layer 1/2/3 (i.e. MP3) in real time for the JAVA(tm) platform. and anyone can add his contribution. JLayer is licensed under LGPL (see LICENSE.txt).

    标签: i.e. converts decodes library

    上传时间: 2016-08-26

    上传用户:zhenyushaw

  • UIT - Secteur de la normalisation des télécommunications ITU - Telecommunication Standardization Se

    UIT - Secteur de la normalisation des télécommunications ITU - Telecommunication Standardization Sector UIT - Sector de Normalización de las Telecomunicaciones Study Period 1997-2000 Commission d études Study Group Comisión de Estudio 16 contribution tardive Delayed contribution Contribución tardía D.xxx Geneva, 7-18 February 2000 Texte disponible seulement en Text available only in Texto disponible solamente en E Question(s): Q.15/SG16 SOURCE*: Nokia Inc. / Nokia Research Center 6000 Connection Drive Irving, Texas 75039 USA Tel : +12147976155 Fax : +19728944589 e-mail : marta.karczewicz@nokia.com TITLE: MVC Decoder Description

    标签: Telecommunication Standardization communications normalisation

    上传时间: 2013-12-23

    上传用户:541657925

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    标签: cryptographic applications attractive for

    上传时间: 2013-12-07

    上传用户:zhuimenghuadie