搜索结果
找到约 86 项符合
AL-Ahmad 的查询结果
多国语言处理 n algorithm for domain independent linear text segmentation This the Windows version of the C99 al
n algorithm for domain independent linear text segmentation
This the Windows version of the C99 algorithm that was presented in my
NAACL00 paper.
[Directories]
bin contains executables, JAR file and test files
classes compiled code as individual class files
doc NAACL 00 paper describing the alg ...
matlab例程 Quartz is a full-featured, open source job scheduling system that can be integrated with, or used al
Quartz is a full-featured, open source job scheduling system that can be integrated with, or used along side virtually any J2EE or J2SE application - from the smallest stand-alone application to the largest e-commerce system. Quartz can be used to create simple or complex schedules for executing ten ...
单片机开发 There are three ways of specifying an immediate dump Immediate dumps can be specified using the AL
There are three ways of specifying an immediate dump
Immediate dumps can be specified using the ALTER SESSION command
ALTER SESSION SET EVENTS
immediate trace name dump level level
Immediate dumps can be specified in ORADEBUG
ORADEBUG DUMP dump level
汇编语言 汇编头文件
汇编头文件,包包含5个函数,分别有
1.显示 AL 中的数字 DispAL
2.显示一个整形数 DispInt
3.显示一个字符串 DispStr
4.换行 DispReturn
5.内存拷贝 MemCpy
通讯编程文档 La designaci贸n Modbus Modicon corresponde a una marca registrada por Gould Inc. Como en tantos otro
La designaci贸n Modbus Modicon corresponde a una marca registrada por Gould Inc.
Como en tantos otros casos, la designaci贸n no corresponde propiamente al est谩ndar de
red, incluyendo todos los aspectos desde el nivel f铆sico hasta el de aplicaci贸n, sino a un
protocolo de enlace [nivel OSI 2]. Pued ...
文章/文档 This is brief doccumentation done on the clock syncronasation in distributed systems.ths includes al
This is brief doccumentation done on the clock syncronasation in distributed systems.ths includes algorithem for physical and logical clocks and mutual exclusion.
文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
Delphi控件源码 Permits to negotiate of simple form (without code) some of the most utilized combinations of keys i
Permits to negotiate of simple form (without code) some of the most utilized
combinations of keys in the forms. It suffices with freeing the component on
the form and to activate the properties desired segun the behavior that want.
* ENTER to change of field.
* ESC to close the form
* to ...
其他嵌入式/单片机内容 This Zip file Contains Firmware for TRF7960 RF ID Evaluation Kit Developed by TI.it also contains al
This Zip file Contains Firmware for TRF7960 RF ID Evaluation Kit Developed by TI.it also contains all the necessary Documents and also my own source code.
系统设计方案 Design of a protoype of an FPGA-based RFID reader supporting the ISO/IEC 18000-6C UHF RFID protocol.
Design of a protoype of an FPGA-based RFID reader supporting the ISO/IEC 18000-6C UHF RFID protocol. Designed by Suh et al. used mainly for testing anticollision algorithms