搜索结果
找到约 1,697 项符合
itu-t 的查询结果
多国语言处理 ICTCLAS的JNI调用接口文件: Title:ICTCLAS Caller * <p>Description:do chinese word segmentation.do
ICTCLAS的JNI调用接口文件:
Title:ICTCLAS Caller
* <p>Description:do chinese word segmentation.don t change the pakage and CLASS name, orelse you can t use it.
* 请不要改变包名、类名以及native的方法名,否则调用将失效。
* 由于ICTCLAS本身存在很多鲁棒性问题,调用segSentence时,string参数请保证不要过 ...
其他书籍 This book is about using Python to get jobs done on Windows.This intended to be a practical book foc
This book is about using Python to get jobs done on Windows.This intended to be a practical book focused on tasks. It doesn t aim to teach Python programming, although we do provide a brief tutorial. Instead, it aims to cover:How Python works on Windows The key integration technologies supported by ...
其他行业 RapidForm add-in template for Visual C++. Using this template project, a user can create RapidForm t
RapidForm add-in template for Visual C++. Using this template project, a user can create RapidForm template conveniently
VHDL/FPGA/Verilog VHDL 关于2DFFT设计程序 u scinode1 ∼ scinode9.vhd: Every SCI node RTL vhdl code. The details can be
VHDL 关于2DFFT设计程序
u scinode1 &#8764 scinode9.vhd: Every SCI node RTL vhdl code. The details can be
seen in the following section.
u 2dfft.vhd: The top module includes these scinodes and form a 3x3 SCI Torus
network, and it support these sub-modules scinode1&#8764 scinode9 reset and clk
and glob ...
其他 检测windows下rootkit对文件的隐藏。some usermode overwrites first few bytes of ZwQueryDirectoryFile and that t
检测windows下rootkit对文件的隐藏。some usermode overwrites first few bytes
of ZwQueryDirectoryFile and that trick will fail then :( So, you will
probably need a small database of the correct indexes for all Windows
versions
matlab例程 C-C法重构相空间文件夹说明1.CC_Method_main.m - 程序主文件 2、LorenzData.dll - 产生Lorenz离散数据 3、normalize_1.m - 信号归一化
C-C法重构相空间文件夹说明1.CC_Method_main.m - 程序主文件
2、LorenzData.dll - 产生Lorenz离散数据
3、normalize_1.m - 信号归一化
4、ccFunction.dll - 计算S(m,N,r,t)
Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco
I. Introduction
This code exploits a previously undisclosed vulnerability in the bit string
decoding code in the Microsoft ASN.1 library. This vulnerability is not related
to the bit string vulnerability described in eEye advisory AD20040210-2. Both
vulnerabilities were fixed in the MS04-007 patch. ...
数据结构 Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to w
Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It ...
数据结构 解决时钟问题
解决时钟问题,acm竞赛题
A weird clock marked from 0 to 59 has only a minute hand. It won t move until a special coin is thrown into its box. There are different kinds of coins as your options. However once you make your choice, you cannot use any other kind. There are infinite number of coins of eac ...
书籍源码 这是sun公司的程序员考试书籍(英文版的pdf) 还有模拟考试安装盘
这是sun公司的程序员考试书籍(英文版的pdf)
还有模拟考试安装盘,和视频!我将稍后发布!
READ THIS AGREEMENT CAREFULLY. IF YOU AGREE TO ALL THE TERMS AND CONDITIONS SET FORTH BELOW AND ARE WILLING TO BE LEGALLY BOUND BY THEM, PRESS THE I AGREE BUTTON TO CONTINUE WITH THE SETUP. IF YOU DO NOT AGREE TO S ...