搜索结果

找到约 134 项符合 particular 的查询结果

Java编程 Auctions are among the oldest economic institutions in place. They have been used since antiquity to

Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular ...
https://www.eeworm.com/dl/633/430541.html
下载: 47
查看: 1030

软件设计/软件工程 have recently become very interested in the area of genetic algorithms and Ant Colony Optimization t

have recently become very interested in the area of genetic algorithms and Ant Colony Optimization techniques. I was determined to write a complete program demonstrating these two techniques. In particular I wanted to compare the efficiency of these two approaches in the area of finding solutions to ...
https://www.eeworm.com/dl/684/432611.html
下载: 119
查看: 1056

人工智能/神经网络 Traveling Salesperson Problem Our branch-and-strategy splits a branch and bound solution into two

Traveling Salesperson Problem Our branch-and-strategy splits a branch and bound solution into two groups: one group including a particular arc and the other excluding this arc. 1.Each splitting incurs a lower bound and we shall traverse the searching tree with the "lower" lower bound. 2.If a const ...
https://www.eeworm.com/dl/650/444394.html
下载: 111
查看: 1046

单片机开发 HIDTHIS SPECIFICATION IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER INCLUDING ANY WARRANTY OF M

HIDTHIS SPECIFICATION IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER INCLUDING ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE.
https://www.eeworm.com/dl/648/446157.html
下载: 94
查看: 1020

压缩解压 ) Compression using huffman code -with a number of bits k per code word -provide huffma

) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source symbol. The table is d ...
https://www.eeworm.com/dl/617/446746.html
下载: 109
查看: 1036

加密解密 This program is free software you can redistribute it and/or modify it under the terms of the GN

This program is free software you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it wil ...
https://www.eeworm.com/dl/519/449218.html
下载: 39
查看: 1853

加密解密 This program is free software you can redistribute it and/or modify it under the terms of the GN

This program is free software you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it wil ...
https://www.eeworm.com/dl/519/449221.html
下载: 26
查看: 1074

其他书籍 QuickSteps books are recipe books for computer users. They answer the question 揌ow do I...??by prov

QuickSteps books are recipe books for computer users. They answer the question 揌ow do I...??by providing a quick set of steps to accomplish the most common tasks with a particular program. The sets of steps are the central focus of the book. Sidebar QuickSteps provide information on how to do quick ...
https://www.eeworm.com/dl/542/454121.html
下载: 23
查看: 1038

通讯编程文档 This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the

This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the computer networking industry to receive data at a particular frequency and transmit them at another frequency. An asynchronous FIFO has two different clocks: one for read and one for write.
https://www.eeworm.com/dl/646/454681.html
下载: 108
查看: 1048

行业发展研究 During the past four years, most of our research activities have been focused on image but also vide

During the past four years, most of our research activities have been focused on image but also video and 3-D objects processing for security applications (watermarking and biometrics) and communications (talking heads, interfaces), with a special emphasis on facial images. More about our work can b ...
https://www.eeworm.com/dl/692/455778.html
下载: 139
查看: 1084