代码搜索:Approach
找到约 1,300 项符合「Approach」的源代码
代码结果 1,300
www.eeworm.com/read/160929/10470177
m p10_9.m
% Program P10_9
% Design of L-th Band FIR Filter Using the
% Windowed Fourier Series Approach
%
clf;
K = 11;
n = -K:K;
% Generate the truncated impulse response of
% the ideal lowpass filter
b = si
www.eeworm.com/read/439530/7119141
txt linux kernel 2.4.x 2.6.x uselib() local privilege escalation exploit.txt
/*
* pwned.c - linux 2.4 and 2.6 sys_uselib local root exploit. PRIVATE.
* it's not the best one, the ldt approach is definitively better.
* discovered may 2004. no longer private because lorian/cl
www.eeworm.com/read/464776/7155327
m fd_method.m
%% Price via Finite differences
% Solve the Black Scholes PDE by a finite difference approach. We take the
% Black Scholes PDE:
%
% $$ \frac{\partial V}{\partial t}+\frac{1}{2}\sigma^2s^2\frac{\pa
www.eeworm.com/read/458224/7301653
m optical_flow_orig.m
% Phase-based Opic Flow Algorithm, described in
% Gautama, T. and Van Hulle, M.M. (2002). A Phase-based Approach to the
% Estimation of the Optical Flow Field Using Spatial Filtering.
% IEEE Trans. N
www.eeworm.com/read/458224/7301659
m optical_flow.m
% Phase-based Opic Flow Algorithm, described in
% Gautama, T. and Van Hulle, M.M. (2002). A Phase-based Approach to the
% Estimation of the Optical Flow Field Using Spatial Filtering.
% IEEE Trans. N
www.eeworm.com/read/439446/7708684
m p10_9.m
% Program P10_9
% Design of L-th Band FIR Filter Using the
% Windowed Fourier Series Approach
%
clf;
K = 11;
n = -K:K;
% Generate the truncated impulse response of
% the ideal lowpass filter
b = si
www.eeworm.com/read/198947/7903100
m eigapp.m
%EIGAPP Eigen approach time domain equalizer design
% [B, W, D, MSE, Dv] = EIGAPP(X, Y, N, Nb, Nw, Dmin, Dmax) returns
% the target impulse response B, the time domain equalizer
% W, and the delay D.
www.eeworm.com/read/157516/11697026
m mdl_demo2.m
% MDL_demo2.m
%
% demo version for comparison between the MDL model selection and the GLRT approach
% in a one-dimensional detection problem using ML-PDA (cont. called by MDL_demo.m)
disp('To comp
www.eeworm.com/read/253602/12210490
txt linux kernel 2.4.x or 2.6.x uselib() local privilege escalation exploit.txt
/*
* pwned.c - linux 2.4 and 2.6 sys_uselib local root exploit. PRIVATE.
* it's not the best one, the ldt approach is definitively better.
* discovered may 2004. no longer private because lorian/cl
www.eeworm.com/read/116603/14963232
java interrupt.java
//: c14:Interrupt.java
// From 'Thinking in Java, 2nd ed.' by Bruce Eckel
// www.BruceEckel.com. See copyright notice in CopyRight.txt.
// The alternative approach to using
// stop() when a threa