搜索结果
找到约 52 项符合
Consider 的查询结果
按分类筛选
matlab例程 This toolbox was designed as a teaching aid, which matlab is particularly good for since source cod
This toolbox was designed as a teaching aid, which matlab is
particularly good for since source code is relatively legible and
simple to modify. However, it is still reasonably fast if used
with the supplied optimiser. However, if you really want to speed
things up you should consider compiling the ...
其他书籍 The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some no
The combinatorial core of the OVSF code assignment problem
that arises in UMTS is to assign some nodes of a complete binary
tree of height h (the code tree) to n simultaneous connections, such that
no two assigned nodes (codes) are on the same root-to-leaf path. Each
connection requires a code on a ...
Java编程 isual Chat 1.91 Developer Edition - Customize the Visual Chat code regarding your own requirement
isual Chat 1.91 Developer Edition
- Customize the Visual Chat code regarding your own requirements
- Use customchatdev.html for developing / testing
- Create .jar and .cab-files containing client-specific .class-files and the images-folder (use zip and cabarc compressing tools)
- Adapt the customch ...
Internet/网络编程 Description: Microsoft?Windows?HTTP Services (WinHTTP) provides developers with a server-supported,
Description: Microsoft?Windows?HTTP Services (WinHTTP) provides developers with a server-supported, high-level interface to the HTTP/1.1 Internet protocol. WinHTTP is designed to be used primarily in server-based scenarios by server applications that communicate with HTTP servers. WinHTTP
is also de ...
其他 Instead of finding the longest common subsequence, let us try to determine the length of the LCS.
Instead of finding the longest common
subsequence, let us try to determine the
length of the LCS.
&#1048708 Then tracking back to find the LCS.
&#1048708 Consider a1a2…am and b1b2…bn.
&#1048708 Case 1: am=bn. The LCS must contain am,
we have to find the LCS of a1a2…am-1 and
b1b2…bn-1.
&#1048708 ...
文章/文档 We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f
We analyze, both analytically and numerically, the effectiveness
of cloaking an infinite cylinder from observations by electromagnetic
waves in three dimensions. We show that, as truncated approximations
of the ideal permittivity and permeability tensors tend towards
the singular ideal cloaking fiel ...
其他书籍 Behavioral models are used in games and computer graphics for realistic simulation of massive crowd
Behavioral models are used in games and computer graphics for
realistic simulation of massive crowds. In this paper, we present a
GPU based implementation of Reynolds [1987] algorithm for simulating
flocks of birds and propose an extension to consider environment
self occlusion. We performed several ...
SQL Server to become acquainted with a concept « cursor» language of SQL, by the types of cursors, to
to become acquainted with a concept « cursor» language of SQL, by the types of cursors, to study the process of creation and application of cursors. To consider the examples of the use of cursors at creation of SQL of queries.
其他 传感器网络中基于到达时间差有效的凸松弛方法的稳健定位
We consider the problem of target localization by a
network of passive sensors. When an unknown target emits an
acoustic or a radio signal, its position can be localized with multiple
sensors using the time difference of arrival (TDOA) information.
In this paper, we consider the maximu ...
论文 A Rate Adaptive Channel Estimation Approach
In this paper, we consider the channel estimation
problem in Millimeter wave (mmWave) wireless systems with
large antenna arrays. By exploiting the inherent sparse nature of
the mmWave channel, we develop a novel rate-adaptive channel
estimation (RACE) algorithm, which can adaptively adjust the
numb ...