代码搜索:Reduction

找到约 701 项符合「Reduction」的源代码

代码结果 701
www.eeworm.com/read/224546/14585486

m cant_2el_guyan.m

echo off % cant_2el_guyan.m two element cantilever beam finite element % program using guyan reduction to eliminate rotations, both Matlab % and hand-calculation results are listed at each step
www.eeworm.com/read/208659/15239437

m cant_2el_guyan.m

echo off % cant_2el_guyan.m two element cantilever beam finite element % program using guyan reduction to eliminate rotations, both Matlab % and hand-calculation results are listed at each step
www.eeworm.com/read/468610/1485265

changes

The following changes have been made to this directory since R3 (for a full description, see doc/Server/r4.tbl.ms): o Windows restructured (memory reduction, devPrivates and speedups) o G
www.eeworm.com/read/240162/4588366

c 20031214-1.c

/* PR optimization/10312 */ /* Originator: Peter van Hoof */ /* Verify that the strength reduction pass doesn't find illegitimate givs. */ struct { double
www.eeworm.com/read/233448/4682311

c 20031214-1.c

/* PR optimization/10312 */ /* Originator: Peter van Hoof */ /* Verify that the strength reduction pass doesn't find illegitimate givs. */ struct { double
www.eeworm.com/read/406309/2278964

changes

The following changes have been made to this directory since R3 (for a full description, see doc/Server/r4.tbl.ms): o Windows restructured (memory reduction, devPrivates and speedups) o G
www.eeworm.com/read/366702/2878591

c 20031214-1.c

/* PR optimization/10312 */ /* Originator: Peter van Hoof */ /* Verify that the strength reduction pass doesn't find illegitimate givs. */ struct { double
www.eeworm.com/read/475201/6793916

m mimo2t.m

% Program "mimo2t.m" % Implementation of Node Reduction Algorithm. % Calculates impedances of node-equivalent % T-shaped two-port network. % Input Parameters: % - Number of internal and exte
www.eeworm.com/read/266102/11240317

m mimo2t.m

% Program "mimo2t.m" % Implementation of Node Reduction Algorithm. % Calculates impedances of node-equivalent % T-shaped two-port network. % Input Parameters: % - Number of internal and exte
www.eeworm.com/read/102625/15764609

c barrett.c

/* Author: Pate Williams (c) 1997 Barrett modular reduction. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 14.3.3 Section pages 603 - 604. */ #include