代码搜索:Approach

找到约 1,300 项符合「Approach」的源代码

代码结果 1,300
www.eeworm.com/read/160929/10470177

m p10_9.m

% Program P10_9 % Design of L-th Band FIR Filter Using the % Windowed Fourier Series Approach % clf; K = 11; n = -K:K; % Generate the truncated impulse response of % the ideal lowpass filter b = si
www.eeworm.com/read/439530/7119141

txt linux kernel 2.4.x 2.6.x uselib() local privilege escalation exploit.txt

/* * pwned.c - linux 2.4 and 2.6 sys_uselib local root exploit. PRIVATE. * it's not the best one, the ldt approach is definitively better. * discovered may 2004. no longer private because lorian/cl
www.eeworm.com/read/464776/7155327

m fd_method.m

%% Price via Finite differences % Solve the Black Scholes PDE by a finite difference approach. We take the % Black Scholes PDE: % % $$ \frac{\partial V}{\partial t}+\frac{1}{2}\sigma^2s^2\frac{\pa
www.eeworm.com/read/458224/7301653

m optical_flow_orig.m

% Phase-based Opic Flow Algorithm, described in % Gautama, T. and Van Hulle, M.M. (2002). A Phase-based Approach to the % Estimation of the Optical Flow Field Using Spatial Filtering. % IEEE Trans. N
www.eeworm.com/read/458224/7301659

m optical_flow.m

% Phase-based Opic Flow Algorithm, described in % Gautama, T. and Van Hulle, M.M. (2002). A Phase-based Approach to the % Estimation of the Optical Flow Field Using Spatial Filtering. % IEEE Trans. N
www.eeworm.com/read/439446/7708684

m p10_9.m

% Program P10_9 % Design of L-th Band FIR Filter Using the % Windowed Fourier Series Approach % clf; K = 11; n = -K:K; % Generate the truncated impulse response of % the ideal lowpass filter b = si
www.eeworm.com/read/198947/7903100

m eigapp.m

%EIGAPP Eigen approach time domain equalizer design % [B, W, D, MSE, Dv] = EIGAPP(X, Y, N, Nb, Nw, Dmin, Dmax) returns % the target impulse response B, the time domain equalizer % W, and the delay D.
www.eeworm.com/read/157516/11697026

m mdl_demo2.m

% MDL_demo2.m % % demo version for comparison between the MDL model selection and the GLRT approach % in a one-dimensional detection problem using ML-PDA (cont. called by MDL_demo.m) disp('To comp
www.eeworm.com/read/253602/12210490

txt linux kernel 2.4.x or 2.6.x uselib() local privilege escalation exploit.txt

/* * pwned.c - linux 2.4 and 2.6 sys_uselib local root exploit. PRIVATE. * it's not the best one, the ldt approach is definitively better. * discovered may 2004. no longer private because lorian/cl
www.eeworm.com/read/116603/14963232

java interrupt.java

//: c14:Interrupt.java // From 'Thinking in Java, 2nd ed.' by Bruce Eckel // www.BruceEckel.com. See copyright notice in CopyRight.txt. // The alternative approach to using // stop() when a threa