搜索结果
找到约 30 项符合
underlying 的查询结果
按分类筛选
其他书籍 PHP Cookbook has a wealth of solutions for problems that you ll face regularly. With topics that ran
PHP Cookbook has a wealth of solutions for problems that you ll face regularly. With topics that range from beginner questions to advanced web programming techniques, this guide contains practical examples -- or "recipes" -- for anyone who uses this scripting language to generate dynamic web content ...
系统设计方案 We address the problem of predicting a word from previous words in a sample of text. In particular,
We address the problem of predicting a word from previous words in a sample of text. In particular,
we discuss n-gram models based on classes of words. We also discuss several statistical algorithms
for assigning words to classes based on the frequency of their co-occurrence with other words. We
fin ...
Java编程 Reads/writes text as a character stream, buffering characters so as to provide for the efficient rea
Reads/writes text as a character stream, buffering characters so as to provide for the efficient reading/writing of characters, arrays, and lines.
The buffer size may be specified, or the default size may be used. The default is large enough for most purposes.
In general, each read request made of ...
编译器/解释器 c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths ...
其他书籍 The book consists of three sections. The first, foundations, provides a tutorial overview of the pri
The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are construct ...
行业发展研究 Abstract - A fl exible multiscale and directional representation for images is proposed. The s
Abstract - A &#64258 exible multiscale and directional representation for images is
proposed. The scheme combines directional &#64257 lter banks with the
Laplacian pyramid to provides a sparse representation for two-
dimensional piecewise smooth signals resembling images. The
underlying expansion is ...
嵌入式/单片机编程 The software and hardware development fields evolved along separate paths through the end of the 20t
The software and hardware development fields evolved along separate paths through the end of the 20th century. We seem to have come full circle, however. The previously rigid hardware on which our programs run is softening in many ways. Embedded systems are largely responsible for this softening. Th ...
数值算法/人工智能 The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of poss ...
VC书籍 If you are a C++ programmer who desires a fuller understanding of what is going on "under the hood,"
If you are a C++ programmer who desires a fuller understanding of what is going on "under the hood," then Inside the C++ Object Model is for you!
Inside the C++ Object Model focuses on the underlying mechanisms that support object-oriented programming within C++: constructor semantics, temporary ge ...
驱动程序 PCI9052DemoDDK.rar
本驱动程序对于开发PCI的底层协议驱动很有研究价值,能生成用户需要的sys文件-the driver for the development of the underlying agreement PCI great research value-driven, users can generate the necessary documents sys