虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Soft-input

  • AES Core Modules In this document I describe components designated to encoding and decoding using A

    AES Core Modules In this document I describe components designated to encoding and decoding using AES. aes enc — parametrizable component which can encrypt input data, using 128, 192 and 256 bit key, • aes dec — parametrizable component which can decrypt input data, using 128, 192 and 256 bit key, • key expansion — parametrizable component which can produce key expansion, using 128, 192 and 256 bit key,

    标签: components designated document describe

    上传时间: 2015-12-22

    上传用户:Late_Li

  • ICP fit points in data to the points in model. Fit with respect to minimize the sum of square errors

    ICP fit points in data to the points in model. Fit with respect to minimize the sum of square errors with the closest model points and data points. Ordinary usage: [R, T] = icp(model,data) INPUT: model - matrix with model points, data - matrix with data points, OUTPUT: R - rotation matrix and T - translation vector accordingly so newdata = R*data + T . newdata are transformed data points to fit model see help icp for more information

    标签: points the minimize respect

    上传时间: 2014-01-02

    上传用户:gyq

  • 算符优先文法分析的c语言实现代码 需要输入词法分析的txt结果文件- The operator first grammar analysis c language realization code n

    算符优先文法分析的c语言实现代码 需要输入词法分析的txt结果文件- The operator first grammar analysis c language realization code needs to input the lexical analysis the txt result document

    标签: realization analysis operator language

    上传时间: 2015-12-28

    上传用户:youlongjian0

  • 最大流

    最大流,The programs are designed to run under BSD UNIX. All programs read from the standard input and write to the standard output. Run "make" to compile the programs and generators. File "list" lists the programs produced my "make". Input files are in DIMACS format. See sample.input.

    标签:

    上传时间: 2015-12-30

    上传用户:zhenyushaw

  • Core Java 2 Volume I - Fundamentals, Seventh Edition Completely revised and up-to-date coverage o

    Core Java 2 Volume I - Fundamentals, Seventh Edition Completely revised and up-to-date coverage of Generic programming, restrictions and limitations, type bounds, wilcard types, and generic reflection Swing GUI development, including input validation and other enhancements Exception handling and debugging, including chained exceptions, stack frames, assertions, and logging Streams and files, the new I/O API, memory-mapped files, file locking, and character set encoders/decoders Regular expressions using the powerful java.util.regex package Inner classes, reflection, and dynamic proxies Application packaging and the Preferences API

    标签: Fundamentals Completely up-to-date coverage

    上传时间: 2016-01-02

    上传用户:标点符号

  • Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit condi

    Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit conditional dependencies between parts of the state to estimate. By doing so, RBPFs can improve the estimation quality while also reducing the overall computational load in comparison to original PFs. However, the computational complexity is still too high for many real-time applications. In this paper, we propose a modified RBPF that requires a single Kalman Filter (KF) iteration per input sample. Comparative experiments show that while good convergence can still be obtained, computational efficiency is always drastically increased, making this algorithm an option to consider for real-time implementations.

    标签: Particle Filters Rao-Blackwellised exploit

    上传时间: 2016-01-02

    上传用户:refent

  • 学会对文件的记录锁定

    学会对文件的记录锁定,及解锁。#include <stdio.h> #include <unistd.h> #include <fcntl.h> int main() { int fd int i struct { char name[20] uint ID int age } myrec fd =open("name", O_RDWR|O_CREAT, 0755) if (fd == -1) return -1 printf("Input your name:") scanf("%s", myrec.name) printf("Inpute your ID :") scanf("%d", &myrec.ID) printf("Input your age :") scanf("%d", &myrec.age) lseek(fd, 0,SEEK_END) lockf(fd, 1, 0) write(fd, (void *)&myrec, sizeof(myrec)) lockf(fd, 0 ,0) return 0 } 执行命令cc lock.c –o lock.out Chmod +x lock.out ./lock.out

    标签: 记录

    上传时间: 2016-01-04

    上传用户:亚亚娟娟123

  • This directory contains code implementing the K-means algorithm. Source code may be found in KMEANS

    This directory contains code implementing the K-means algorithm. Source code may be found in KMEANS.CPP. Sample data isfound in KM2.DAT. The KMEANS program accepts input consisting of vectors and calculates the given number of cluster centers using the K-means algorithm. Output is directed to the screen.

    标签: code implementing directory algorithm

    上传时间: 2014-01-15

    上传用户:woshini123456

  • This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest i

    This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest in the topic, so this article will pick up where the first left off. The main focus of these articles will be to build up little by little the knowledge needed to write device drivers. In this article, we will be building on the same example source code used in part one. In this article, we will expand on that code to include Read functionality, Handle Input/Ouput Controls also known as IOCTLs, and learn a bit more about IRPs.

    标签: the interest tutorial Drivers

    上传时间: 2016-01-28

    上传用户:lmeeworm

  • This code implements the shortest path algorithm via the simple scheme and fibonacci heap data struc

    This code implements the shortest path algorithm via the simple scheme and fibonacci heap data structure. It has 3 kinds of testing data input method : random input by computer, reading from the file, reading from the key board.

    标签: implements algorithm fibonacci the

    上传时间: 2013-12-23

    上传用户:ynzfm