搜索结果
找到约 657 项符合
depth-first 的查询结果
系统设计方案 LL(1)文法使用的是确定的自顶向下的分析技术。LL(1)的含义是:第一个L表明自顶向下分析是从左向右扫描输入串
LL(1)文法使用的是确定的自顶向下的分析技术。LL(1)的含义是:第一个L表明自顶向下分析是从左向右扫描输入串,第2个L表明分析过程中将使用最左推导,1表明只需向右看一个符号便可决定如何推导,即选择哪个产生式(规则)进行推导。
LL(1)文法的判别需要依次计算FIRST集、FOLLOW集和SELLECT集,然后判断是否为LL(1)文法,最后再 ...
数据结构 #if !defined(AFX_GAQUEEN_H__C26AE0A3_F9B4_426F_A324_B460CC7946CB__INCLUDED_) #define AFX_GAQUEEN_H_
#if !defined(AFX_GAQUEEN_H__C26AE0A3_F9B4_426F_A324_B460CC7946CB__INCLUDED_)
#define AFX_GAQUEEN_H__C26AE0A3_F9B4_426F_A324_B460CC7946CB__INCLUDED_
#if _MSC_VER > 1000
#pragma once
#endif // _MSC_VER > 1000
class CGAQueen
{
public:
CGAQueen(int nPopulation,int nIteration,float Mutation,int mChB ...
其他书籍 We address the problem of blind carrier frequency-offset (CFO) estimation in quadrature amplitude mo
We address the problem of blind carrier frequency-offset (CFO) estimation in quadrature amplitude modulation,
phase-shift keying, and pulse amplitude modulation
communications systems.We study the performance of a standard
CFO estimate, which consists of first raising the received signal to
the Mth ...
其他书籍 《为Windows Vista编写安全的代码》
《为Windows Vista编写安全的代码》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. ...
软件工程 This book provides a comprehensive introduction to the modern study of computer algorithms. It prese
This book provides a comprehensive introduction to the modern study of computer algorithms. It presents many algorithms and covers them in considerable depth, yet makes their design and analysis accessible to all levels of readers. We have tried to keep explanations elementary without sacrificing de ...
其他 ICA介绍课件。There has been a wide discussion about the application of Independence Component Analysis (I
ICA介绍课件。There has been a wide discussion about the application of Independence Component Analysis (ICA) in Signal Processing, Neural Computation and Finance, first introduced as a novel tool to separate blind sources in a mixed signal. The Basic idea of ICA is to reconstruct from observation se ...
汇编语言 This directory contains the memtest 8051 firmware for the Anchor Chips EZ-USB chip. The purpose
This directory contains the memtest 8051 firmware
for the Anchor Chips EZ-USB chip.
The purpose of this software is to test the different
memory segments in the Ez-Usb chip.
This example will output the string "good" on the 7 segment
LED if the mem test passes, or it will output the first addres ...
Java书籍 To date tests are still the best solution mankind has found to deliver working software. This book
To date tests are still the best solution mankind has found to deliver working software.
This book is the sum of four years of research and practice in the testing
field. The practice comes from my IT consulting background, first at Octo Technology
and then at Pivolis the research comes from my invo ...
驱动编程 This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest i
This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest in the topic, so this article will pick up where the first left off. The main focus of these articles will be to build up little by little the knowledge needed to write device drivers. In this article, ...
并行计算 How the K-mean Cluster work Step 1. Begin with a decision the value of k = number of clusters S
How the K-mean Cluster work
Step 1. Begin with a decision the value of k = number of clusters
Step 2. Put any initial partition that classifies the data into k clusters. You may assign the training samples randomly, or systematically as the following:
Take the first k training sample as single-e ...