搜索结果
找到约 599 项符合
breadth-first 的查询结果
VC书籍 Why C++ is the emerging standard in software development. The steps to develop a C++ program. How
Why C++ is the emerging standard in software development.
The steps to develop a C++ program.
How to enter, compile, and link your first working C++ program.
其他 Topics Practices: Programming and Numerical Methods Practice 1: Introduction to C Practice 2
Topics Practices:
Programming and Numerical Methods
Practice 1: Introduction to C
Practice 2: Cycles and functions
First part cycles
Part Two: Roles
Practice 3 - Floating point arithmetic
Practice 4 - Search for roots of functions
Practice 5 - Numerical Integration
Practice 6 - Arrangement ...
加密解密 The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfi ...
VHDL/FPGA/Verilog This short paper will give you some VHDL code examples that will help you design synchronous circuit
This short paper will give you some VHDL code examples that will help you design synchronous circuits that work first time.The philosophy behind Ten-Commandment code is that synthesizers are not to be trusted too much. Most of the code you will see is close to the structural level some more overtly ...
JavaScript Implementation of Edmonds Karp algorithm that calculates maxFlow of graph. Input: For each test c
Implementation of Edmonds Karp algorithm that calculates maxFlow of graph.
Input:
For each test case, the first line contains the number of vertices (n) and the number of arcs (m). Then, there exist m lines, one for each arc (source vertex, ending vertex and arc weight, separated by a space). The n ...
加密解密 RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key a ...
通讯/手机编程 The target of the assignment is to familiarize the student with MIMO channel modeling. The work is
The target of the assignment is to familiarize the student with MIMO channel modeling.
The work is based on L. Schumacher’s MIMO channel model implementation, with
added capacity analysis. First the channel model implementation is introduced, and
thereafter analysis on MIMO channel with different p ...
Java编程 The Java Platform, Enterprise Edition 5 (Java EE 5) has two different but complementary technologie
The Java Platform, Enterprise Edition 5 (Java EE 5) has two different but complementary
technologies for producing dynamic web content in the presentation tier—namely Java
Servlet and JavaServer Pages (JSP).
Java Servlet, the first of these technologies to appear, was initially described as extensi ...
游戏 I originally wrote this program as an exercise for learning JAVE. Gomoku game is well-known in many
I originally wrote this program as an exercise for learning JAVE. Gomoku game is well-known in many countries and every country calls it differently. The winner is the first player to get an unbroken row of five stones horizontally, vertically, or diagonally.