搜索结果
找到约 144 项符合
re-interp 的查询结果
数值算法/人工智能 The cart with an inverted pendulum, shown below, is "bumped" with an impulse force, F. Determine th
The cart with an inverted pendulum, shown below, is "bumped" with an impulse
force, F. Determine the dynamic equations of motion for the system, and lin
earize about the pendulum s angle, theta = Pi (in other words, assume that p
endulum does not move more than a few degrees away from the vertical, ...
Applet The code is fairly straightforward, except perhaps for the call to convertColumnIndexToModel. That c
The code is fairly straightforward, except perhaps for the call to convertColumnIndexToModel. That call is necessary because if the user moves the columns around, the view s index for the column doesn t match the model s index for the column. For example, the user might drag the Vegetarian column (w ...
数据结构 Many applications use connection/object pool. A program may require a IMAP connection pool and LDAP
Many applications use connection/object pool. A program may require a IMAP connection pool and LDAP connection pool. One could easily implement a IMAP connection pool, then take the existing code and implement a LDAP connection pool. The program grows, and now there is a need for a pool of threads. ...
加密解密 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an
加密算法
Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives:
- To generate an RSA key
cryptest g
- To encrypt and decrypt a string using RSA
cryptest r
- To calculate MD5, SHS, and RIPEMD-160 message digests:
cryptest m file
- To encrypt and decrypt a string using DES-E ...
软件工程 Programming the Microsoft Windows Driver Model Copyright © 1999 by Walter Oney General Informa
Programming the Microsoft Windows Driver Model
Copyright &copy 1999 by Walter Oney
General Information
The companion disc for Programming the Microsoft Windows Driver Model contains more than 20 sample drivers and test programs to illustrate the topics covered by the book. The file you re viewing co ...
电子书籍 PCI-to-PCI Bridge Architecture Specification Revision 1.1 This specification establishes the re
PCI-to-PCI Bridge Architecture Specification Revision 1.1
This specification establishes the requirements that a PCI-to-PCI bridge must meet to be compliant to this specification and the PCI Local Bus Specification. In addition, the requirements for optional extensions are specified. This specific ...
VC书籍 Visual Basic image processing. Mainly it occupies some filters to detect some prperties of image. Re
Visual Basic image processing. Mainly it occupies some filters to detect some prperties of image. Release.
matlab例程 This is the machine-generated representation of a Handle Graphics object and its children. Note that
This is the machine-generated representation of a Handle Graphics object and its children. Note that handle values may change when these objects
are re-created. This may cause problems with any callbacks written to
depend on the value of the handle at the time the object was saved.
其他书籍 Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its co
Securing Apache 2: Step-by-Step
When choosing a web server, Apache very often wins against its competitors because of stability, performance, that fact that it s open source, and many other advantages. But when deciding on which version of Apache to use, the choice is not always so simple. On the o ...
数学计算 The Bayesian Committee Machine (BCM) is an approximation method for large-scale Gaussian process re
The Bayesian Committee Machine (BCM) is an approximation method for
large-scale Gaussian process regression.
- The code is for Matlab
Version 1.0, November 2005