搜索结果
找到约 462 项符合
algorithms 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (66)
- 技术资料 (41)
- 人工智能/神经网络 (40)
- matlab例程 (31)
- 书籍 (21)
- 软件设计/软件工程 (18)
- 数值算法/人工智能 (17)
- 加密解密 (16)
- 数据结构 (15)
- 书籍源码 (13)
- 其他 (13)
- 软件工程 (13)
- 电子书籍 (13)
- 数学计算 (12)
- Java编程 (10)
- VC书籍 (10)
- 通讯编程文档 (9)
- 文章/文档 (9)
- 压缩解压 (8)
- Linux/Unix编程 (8)
- 微处理器开发 (6)
- 行业发展研究 (6)
- Java书籍 (5)
- DSP编程 (4)
- 编译器/解释器 (4)
- 文件格式 (4)
- 系统设计方案 (4)
- 通讯/手机编程 (3)
- 技术书籍 (3)
- 教程资料 (3)
- 单片机开发 (3)
- 其他行业 (3)
- 操作系统开发 (2)
- Matlab (2)
- 可编程逻辑 (2)
- 嵌入式/单片机编程 (2)
- VHDL/FPGA/Verilog (2)
- Delphi控件源码 (2)
- 手册 (1)
- C语言 (1)
- C/C++语言编程 (1)
- Linux/uClinux/Unix编程 (1)
- 数据库系统 (1)
- DSP工具/软件 (1)
- 传感与控制 (1)
- 嵌入式综合 (1)
- 工控技术 (1)
- 源码/资料 (1)
- Internet/网络编程 (1)
- 编辑器/阅读器 (1)
- 网络 (1)
- 技术管理 (1)
- 其他数据库 (1)
- FlashMX/Flex源码 (1)
- VxWorks (1)
- 生物技术 (1)
- 3G开发 (1)
Java编程 m5 code is used to bring data mining algorithms implementation
m5 code is used to bring data mining algorithms implementation
通讯编程文档 contains documents related to adaptive beamforming algorithms for Wideband Code Division multiple
contains documents related to adaptive beamforming algorithms for Wideband Code Division multiple access and a research article on circular patch antenna for C band altimeter system
数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...
通讯编程文档 A necessary book containing many FFT algorithms, both serial and parallel.
A necessary book containing many FFT algorithms, both serial and parallel.
matlab例程 Non Convex Algorithms for Group Sparse Optimization by Angshul Majumdar @matlab central
Non Convex Algorithms for Group Sparse Optimization by Angshul Majumdar @matlab central
通讯编程文档 This also a nice paper about Synchronization and Channel Estimation in OFDM Algorithms for Efficient
This also a nice paper about Synchronization and Channel Estimation in OFDM Algorithms for Efficient Implementation of WLAN Systems
Java编程 Java examples for dinamic programming, divide and conquer, greedy algorithms and backtracking.
Java examples for dinamic programming, divide and conquer, greedy algorithms and backtracking.
加密解密 Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom
Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom make alg (key + permutation of elements)
数据结构 implement a number of pattern-matching algorithms and to carry out an analysis of their operation
implement a number of pattern-matching algorithms and to carry out an analysis of their operation
数据结构 There are many algorithms that can be applied to graphs. Many of these are actually used in the real
There are many algorithms that can be applied to graphs. Many of these are actually used in the real world,
such as Dijkstra’s algorithm to find shortest paths. We will discuss a few here.