This a program to implement the so-called "dancing link" which is introduced in Knuth s paper. This is really a super acrobatic and I am sure that not many programmers can understand the algorithms.
标签: This introduced implement so-called
上传时间: 2013-12-11
上传用户:784533221
This package implements a Kalman filter as described in the paper "A Statistical Algorithm for Estimating Speed from Single Loop Volume and Occupancy Measurements" by D. J. Dailey.
标签: Statistical implements Algorithm described
上传时间: 2013-12-12
上传用户:cc1915
Tiny C Compiler - C Scripting Everywhere - The Smallest ANSI C compiler Installation on a i386 Linux host (for Windows read win32/readme.txt) ./configure make make test make install By default, tcc is installed in /usr/local/bin. ./configure --help shows configuration options.
标签: Installation Everywhere Scripting Compiler
上传时间: 2013-12-19
上传用户:zhangzhenyu
Affix - Bluetooth Protocol Stack for Linux has been developed at Nokia Research Center in Helsinki, Finland.
标签: Bluetooth developed Protocol Helsinki
上传时间: 2013-12-20
上传用户:coeus
Affix - Bluetooth Protocol Stack for Linux has been developed at Nokia Research Center in Helsinki, Finland.
标签: Bluetooth developed Protocol Helsinki
上传时间: 2015-06-07
上传用户:sqq
Support Vector Machines is a powerful methodology for solving problems in nonlinear classification and regression. It is a matlab version.
标签: classification methodology nonlinear Machines
上传时间: 2015-06-08
上传用户:bruce
KoLmafia is a cross-platform desktop tool, written in Java (J2SE 1.4 compliant), which interfaces with the online adventure game
标签: cross-platform interfaces compliant KoLmafia
上传时间: 2015-06-10
上传用户:coeus
A New Architecture for fast Arithmetic Coding in H.264 Advanced Video Coder.pdf 很不错的一个优化算法
标签: Architecture Arithmetic Advanced Coding
上传时间: 2015-06-11
上传用户:liglechongchong
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.
标签: 802.11 introduction Beginning Security
上传时间: 2013-12-04
上传用户:CHINA526
51串行令牌格式 a51编译 Read data from serial port and write into buffer DPTR pointed in XRAM if a data frame is received and calculate the check sum if a information frame is received return control byte only
标签: data pointed buffer serial
上传时间: 2015-06-14
上传用户:极客