代码搜索:methods
找到约 10,000 项符合「methods」的源代码
代码结果 10,000
www.eeworm.com/read/280752/10295502
m grule.m
%计算n阶Guass节点和对应权重
function [bp,wf]=grule(n)
% [bp,wf]=grule(n)
% This function computes Gauss base points and weight factors
% using the algorithm given by Davis and Rabinowitz in 'Methods
%
www.eeworm.com/read/355063/10297885
f lw.f
program lw
c...Solves the Riemann problem for the Euler equations using
c...the MacCormack or Richtmyer methods.
c...METHOD = 1 MacCormack
c...METHOD = 2 Richtmyer
c...TSTEP = 1
www.eeworm.com/read/161189/10439632
m pinit.m
function [T,x_0] = pinit(W,A,b)
%PINIT Utility init.-procedure for "preconditioned" iterative methods.
%
% T = pinit(W,A)
% [T,x_0] = pinit(W,A,b)
%
% Initialization for `preconditioning' of gen
www.eeworm.com/read/353439/10446465
java ex29(1).java
// generics/Ex29.java
// TIJ4 Chapter Generics, Exercise 29, page 694
/* Create a generic method that takes as an argument a Holder
www.eeworm.com/read/353439/10446545
java ex25(3).java
// generics/Ex25.java
// TIJ4 Chapter Generics, Exercise 25, page 677
/* Create two interfaces and a class that implements both. Create two
* generic methods, one whose argument parameter is bounde
www.eeworm.com/read/353439/10446756
java ex10.java
// polymorphism/Ex10.java
// TIJ4 Chapter Polymorphism, Exercise 10, page 290
/* Create a base class with two methods. In the first method, call the second
* method. Inherit a class and override th
www.eeworm.com/read/353439/10446855
java cookiemonster.java
// access/cookie2/CookieMonster.java
// TIJ4 Chapter Access, Exercise 4, page 227
// Show that protected methods have package access but are not public.
/* In directory Cookie2:
* //access/cooki
www.eeworm.com/read/353439/10447253
java games19.java
// interfaces/Games19.java
// TIJ4 Chapter Interfaces, Exercise 19, page 342
/* Create a framework using Factory Methods that performs both coin
* tossing and dice tossing.
*/
import java.util.*;
www.eeworm.com/read/352829/10504210
txt description_sourceforge.txt
This project automates Http-requests i.e. all browser activities can be logged/written to XML-formated files and redone by using simple methods.
This is very useful for automating http-server-request
www.eeworm.com/read/160565/10517820
m rltentrpthreshold2d.m
function [KL,KJ,KG]=rltentrpthreshold2D(im)
% RLTENTRPTHRESHOLD2D thresholds gray-scale image using Local Relative Entropy,
% Joint Relative Entropy and Globle Relative Entropy methods
% input is