This document specifies a collection of compiler directives, library routines, and environment variables that can be used to specify shared-memory parallelism in C, C++ and Fortran programs. This functionality collectively defines the specification of the OpenMP Application Program Interface (OpenMP API). This specification provides a model for parallel programming that is portable across shared memory architectures from different vendors. Compilers from numerous vendors support the OpenMP API. More information about OpenMP can be found at the following web site:
标签: environment collection directives specifies
上传时间: 2013-12-25
上传用户:shinesyh
It a adaptive filtering book, which consist of Wiener filter, LMS, NLMS and RLS algorithms and lots of matlab implementation. It s so practical for adaptive filtering algorithms.
标签: algorithms filtering and adaptive
上传时间: 2014-01-14
上传用户:ghostparker
This book’s primary goal is to help you prepare to take and pass Microsoft’s exam number 70-290, Managing and Maintaining a Microsoft Windows Server 2003 Environment. Our secondary purpose in writing this book is to provide exam candidates with knowledge and skills that go beyond the minimum requirements for passing the exam, and help to prepare them to work in the real world of Microsoft computer networking.
标签: Microsoft primary prepare number
上传时间: 2014-03-11
上传用户:D&L37
In the planning stage of a GNSS-measurement campaign it is useful to compute several design para-meters in order to decide how, when and where to carry out the measurements. The MATLAB user interface VISUAL.M enables you to compute the design parameters for any system design.
标签: GNSS-measurement planning campaign para-met
上传时间: 2014-01-23
上传用户:tuilp1a
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.
标签: cryptographic applications attractive for
上传时间: 2013-12-07
上传用户:zhuimenghuadie
for entropy H = entropy(S) this command will evaluate the entropy of S, S should be row matrix H = entropy([X Y Z]) this command will find the joint entropy for the 3 variables H = entropy([X,Y],[Z,W]) this will find H(X,Y/Z,W).. you can use it for any combination of joint entropies Please validate this function before using it
标签: entropy evaluate command matrix
上传时间: 2017-09-10
上传用户:caozhizhi
These Fourier routines were originally based on the Fourier routines of the same names from the NETLIB bihar and fftpack fortran libraries developed by Paul N. Swarztrauber at the National Center for Atmospheric Research in Boulder, CO USA. They have been reimplemented in C and optimized in a few ways for OggSquish.
标签: routines Fourier the originally
上传时间: 2017-09-12
上传用户:小眼睛LSL
to become acquainted with a concept « cursor» language of SQL, by the types of cursors, to study the process of creation and application of cursors. To consider the examples of the use of cursors at creation of SQL of queries.
标签: acquainted language concept cursors
上传时间: 2013-12-24
上传用户:libenshu01
MATLAB Code : For MATLAB programmers, this code is to implement the tracking algorithm of a Radar, in the Matlab environment
标签: MATLAB programmers algorithm implement
上传时间: 2014-01-18
上传用户:希酱大魔王
as a message came into prominence with the publication in 1948 of an influential paper by Claude Shannon, "A Mathematical Theory of Communication." This paper provides the foundations of information theory and endows the word information not only with a technical meaning but also a measure. If the sending device is equally likely to send any one of a set of N messages, then the preferred measure of "the information produced when one message is chosen from the set" is the base two logarithm of N (This measure is called self-information). In this paper, Shannon cont
标签: influential publication prominence message
上传时间: 2014-01-21
上传用户:2404