搜索结果

找到约 150 项符合 Off-diagonal 的查询结果

电子书籍 Features &#8226 Compatible with MCS-51&reg Products &#8226 8K Bytes of In-System Programmable (ISP

Features &#8226 Compatible with MCS-51&reg Products &#8226 8K Bytes of In-System Programmable (ISP) Flash Memory – Endurance: 1000 Write/Erase Cycles &#8226 4.0V to 5.5V Operating Range &#8226 Fully Static Operation: 0 Hz to 33 MHz &#8226 Three-level Program Memory Lock &#8226 256 x 8-bit Internal ...
https://www.eeworm.com/dl/cadence/ebook/168871.html
下载: 174
查看: 1067

数据结构 Computes estimates for the number of forests of a graph, input as a 0-1 incidence matrix. Notes: Com

Computes estimates for the number of forests of a graph, input as a 0-1 incidence matrix. Notes: Compile in C++, "g++ -o span_forest span_forest.c". The program does not demand that the matrix is symmetric with 0 diagonal, but uses only the upper triangular part.
https://www.eeworm.com/dl/654/174575.html
下载: 113
查看: 1062

数学计算 平均因子分解法

平均因子分解法,适用于正定矩阵First, let s recall the definition of the Cholesky decomposition: Given a symmetric positive definite square matrix X, the Cholesky decomposition of X is the factorization X=U U, where U is the square root matrix of X, and satisfies: (1) U U = X (2) U is upper triangul ...
https://www.eeworm.com/dl/641/175667.html
下载: 96
查看: 1043

嵌入式/单片机编程 A six people s rushing replies an implement, use some s switches in toggle switch K0 ~ K5 is that ON

A six people s rushing replies an implement, use some s switches in toggle switch K0 ~ K5 is that ON accomplishes when rushing to reply button , nobody rush to answer, 6 numerical code circulation takes turns at demonstrating 1 ~ 6 (horse races) , who rushes to reply the numerical code stops having ...
https://www.eeworm.com/dl/647/189138.html
下载: 195
查看: 1034

VC书籍 Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely

Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques ...
https://www.eeworm.com/dl/686/211667.html
下载: 43
查看: 1026

其他书籍 This practical, roll-up-your-sleeves guide distills years of ingenious XML hacking into a complete s

This practical, roll-up-your-sleeves guide distills years of ingenious XML hacking into a complete set of tips, tricks, and tools for web developers, system administrators, and programmers who want to leverage the untapped power of XML. If you want more than the average XML user--to explore and expe ...
https://www.eeworm.com/dl/542/216214.html
下载: 130
查看: 1029

技术管理 Writing Your First ASP Application ( Quick Start ) (Page 1 of 8 ) There are many tutorials out th

Writing Your First ASP Application ( Quick Start ) (Page 1 of 8 ) There are many tutorials out there that show you how to program in ASP. Some of them are good, and some are bad. Some of them are downright terrible. In any case, you ve read a bit about ASP and now you are ready to build your first ...
https://www.eeworm.com/dl/642/217992.html
下载: 101
查看: 1090

单片机开发 熟悉遥控接码解码的方法 //数码管显示解码结果:高四位为用户码

熟悉遥控接码解码的方法 //数码管显示解码结果:高四位为用户码,低2位为按键码 //硬件要求:拨码开关S10的第2位置ON,其他置OFF // 拨码开关S5、S6全部置ON // 其他拨码开关全部置OFF // 可读出任何6121或6122(CD6121/CD6122/SC6121/SC6122)及其兼容芯 ...
https://www.eeworm.com/dl/648/219041.html
下载: 130
查看: 1064

数学计算 The functionality is to be designated the corresponding year reign France Thus the year, which was t

The functionality is to be designated the corresponding year reign France Thus the year, which was the year of the zodiac. But can be designated a specific date date of the lunar calendar. Author Note : I used to do this as a commercial product development PDA calendar procedures in recent transplan ...
https://www.eeworm.com/dl/641/223342.html
下载: 47
查看: 1051

加密解密 The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption sche

The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mech ...
https://www.eeworm.com/dl/519/238196.html
下载: 140
查看: 1090