This project contains a C algorithm for calculating the results of a custom polynomial function. It
This project contains a C algorithm for calculating the results of a custom polynomial function. It is designed and opti...
Security+Algorithm技术资料下载专区,收录1,007份相关技术文档、开发源码、电路图纸等优质工程师资源,全部免费下载。
This project contains a C algorithm for calculating the results of a custom polynomial function. It is designed and opti...
A java code shows how to use dijkstra algorithm it includes a test program and document
VLSi KL partitioning Algorithm based programme for 100 nodes. It s dynamic progremme so by changing the MAX value we ca...
记录下了作者学习JSP、Servlet、XML、RMI、JAF、JAF、EJB、Security、JDBC、JTA/JTS、JCA、JMS、JNDI、Application Server的心得
本文针对P2P 网络中的安全问题,详细讨论了对等节点间信任关系的建立,特别是根据证据理论计算信任值的方法,介绍了JXTA 平台的安全机制及利用其实现安全通信的过程,并在JXTA 提供的C
this tar includes my code which employ the Lin-Kernighan algorithm to address the tsp problem. this tar also include som...
aPLib is a 32-bit compression library based on the compression algorithm used in aPACK (my executable packer). aPLib i...
AC Induction Motor Control Using the Constant V/f Principle and a Space-vector PWM Algorithm