Index NAME 总览 (SYNOPSIS) 警告 (WARNING) 描述 (DESCRIPTION) 选项 (OPTIONS) 总体选项 (Overall Option) 语言选项 (LANGUAGE OPTIONS) 预处理器选项 (Preprocessor Option) 汇编器选项 (ASSEMBLER OPTION) 连接器选项 (LINKER OPTION) 目录选项 (DIRECTORY OPTION) 警告选项 (WARNING OPTION) 调试选项 (DEBUGGING OPTION) 优化选项 (OPTIMIZATION OPTION) 目标机选项 (TARGET OPTION) 机器相关选项 (Machine DEPENDENT OPTION) 代码生成选项 (CODE GENERATION OPTION) PRAGMAS 文件 (FILE) 另见 (SEE ALSO) BUGS 版权 (COPYING) 作者 (AUTHORS) [中文版维护人] [中文版最新更新] 《中国Linux论坛man手册页翻译计划》 NAME gcc,g++-GNU 工程的 C和 C++编译器(egcs-1.1.2
标签: DESCRIPTION SYNOPSIS OPTIONS Overall
上传时间: 2014-01-03
上传用户:evil
Text mining tries to solve the crisis of information overload by combining techniques from data mining, Machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.
标签: information techniques combining overload
上传时间: 2014-01-02
上传用户:Late_Li
A user-space device driver can do many of the things that kernel drivers can t, such as perform a long-running computation, block while waiting for an event, or read files from the file system. Unlike kernel drivers, a user-space device driver can use other device drivers--that is, access the network, talk to a serial port, get interactive input from the user, pop up GUI windows, or read from disks. User-space drivers implemented using FUSD can be much easier to debug it is impossible for them to crash the Machine, are easily traceable using tools such as gdb, and can be killed and restarted without rebooting even if they become corrupted. FUSD drivers don t have to be in C--Perl, Python, or any other language that knows how to read from and write to a file descriptor can work with FUSD. User-space drivers can be swapped out, whereas kernel drivers lock physical memory.
标签: user-space can drivers perform
上传时间: 2014-01-01
上传用户:saharawalker
In order to install DotNetNuke and a supporting database you will need either Windows 2003 Server or Windows XP (development only). This book covers a basic install of DotNetNuke using a SQL Server database as the Data Provider. You will need to have access to either SQL Server 2000 or MSDE (develop- ment only) on the same Machine or a remote Machine. To participate in the development chapters, you will need Visual Studio .NET 2003.
标签: DotNetNuke supporting database install
上传时间: 2013-11-25
上传用户:onewq
数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述,它出自 IBM 的研究工作,并在 1997 年被美国政府正式采纳。它很可能是使用最广泛的秘钥系统,特别是在保护金融数据的安全中,最初开发的 DES 是嵌入硬 件中的。通常,自动取款机(Automated Teller Machine,ATM)都使用 DES。 此源码可完成简单的DES加密解密
标签: Encryption Algorithm Data 数据加密
上传时间: 2017-06-25
上传用户:ainimao
The FPGA can realize a more optimized Digital controller in DC/DC Converters when compare to DSPs. In this paper, based on the FPGA platform, The theoretical analysis, characteristics, simulation and design consideration are given. The methods to implement the digital DC/DC Converters have been researched. The function module, state Machine of digital DC/DC controller and high resolution DPWM with Sigma- Delta dither has been introduced. They are verified by experiments on a 20 W, 300 KHz non-isolated synchronous buck converters.
标签: Converters controller optimized Digital
上传时间: 2013-12-31
上传用户:tzl1975
介绍回归问题中高斯过程的应用,C. E. Rasmussen & C. K. I. Williams, Gaussian Processes for Machine Learning,
上传时间: 2017-07-25
上传用户:skfreeman
FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seapage". The average Machine broadcasts a lot of information about itself on open networks. This tool captures and organizes this information. This code is extremely low quality, hacked together in order to demonstrate the problem at the BlackHat Federal 2007 conference. Higher quality code should be available around May 2007 on our website at http://www.erratasec.com.
标签: tool demonstrate broadcast analysis
上传时间: 2013-11-30
上传用户:1101055045
You may read code because you have to-to fix it, inspect it, or improve it. You may read code the way an engineer examines a Machine--to discover what makes it tick. Or you may read code because you are scavenging--looking for material to reuse. Code-reading requires its own set of skills, and the ability to determine which technique you use when is crucial. In this indispensable book, Diomidis Spinellis uses more than 600 real-world examples to show you how to identify good (and bad) code: how to read it, what to look for, and how to use this knowledge to improve your own code. Fact: If you make a habit of reading good code, you will write better code yourself.
上传时间: 2017-08-13
上传用户:jyycc
Pattern Analysis is the process of fi nding general relations in a set of data, and forms the core of many disciplines, from neural networks to so-called syn- tactical pattern recognition, from statistical pattern recognition to Machine learning and data mining. Applications of pattern analysis range from bioin- formatics to document retrieval.
标签: the relations Analysis Pattern
上传时间: 2017-09-07
上传用户:SimonQQ