搜索结果
找到约 657 项符合
depth-first 的查询结果
数学计算 program which uses hashing techniques for storing and retrieving the data. Input to the program:
program which uses hashing techniques for storing and retrieving the data.
Input to the program: Some random numbers. Input will be from a file.
Output: First the program reads all the input and store it properly using some hash techniques.
Once your program reads the complete input,it waits for ...
JavaScript This project developed in java leads us to realize a flight reservation system in order to emulate d
This project developed in java leads us to realize a flight reservation system in order to emulate databases containing the structures for the flight and for the booking. These bases extend the List interface and implements additional search鈥檚 methods.
Two interfaces provide an access to this syst ...
数值算法/人工智能 Maya Calendar During his last sabbatical, professor M. A. Ya made a surprising discovery about the
Maya Calendar
During his last sabbatical, professor M. A. Ya made a surprising discovery about the old Maya calendar. From an old knotted message, professor discovered that the Maya civilization used a 365 day long year, called Haab, which had 19 months. Each of the first 18 months was 20 days long ...
其他嵌入式/单片机内容 The Fat Fs module is a middleware that written in ANSI C. There is no platform dependence, so long a
The Fat Fs module is a middleware that written in ANSI C. There is no platform dependence, so long as the compiler is in compliance with ANSI C. However it handles the system portable FAT structures. You must take the endian into consideration. It must be changed for your platform first or the compi ...
Java编程 ImageJ Conebeam Filtered Back Projection Plug-in. To use this plug-in, a stack of projection images
ImageJ Conebeam Filtered Back Projection Plug-in. To use this plug-in, a stack of projection images need to be opened first.
Java编程 Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/
Generate Possion Dis.
step1:Generate a random number between [0,1]
step2:Let u=F(x)=1-[(1/e)x]
step3:Slove x=1/F(u)
step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn
step5:If the first packet was generated at time [0], than the
second packet will be generated at time ...
USB编程 USBHostSlave is a USB 1.1 host and Device IP core. – Supports full speed (12Mbps) and low speed (1.
USBHostSlave is a USB 1.1 host and Device IP core.
– Supports full speed (12Mbps) and low speed (1.5Mbps) operation.
– USB Device has four endpoints, each with their own independent FIFO.
– Supports the four types of USB data transfer control, bulk, interrupt, and isochronous
transfers.
– Host ...
系统设计方案 The most straightforward approximation is the standard Gaussian approximation, where the MAI is appr
The most straightforward approximation is the standard Gaussian approximation, where the MAI is approximated by a Gaussian random variable. This approximation is simple, however it is not accurate in general. In situations where the number of users is not large, the Gaussian approximation is not app ...
Linux/Unix编程 Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interes
Novell.Press.Linux.Kernel.Development
linux内核开发的经典书籍之一
The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information fro ...
数值算法/人工智能 Exceptional C++ shows by example how to go about solid software engineering. Along with a lot of oth
Exceptional C++ shows by example how to go about solid software engineering. Along with a lot of other material, this book includes expanded versions of the first 30 issues of the popular Internet C++ feature Guru of the Week (or, in its short form, GotW), a series of self-contained C++ engineering ...