SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems of linear equations on high performance machines. The library is written in C and is callable from either C or Fortran. The library routines will perform an LU decomposition with partial pivoting and triangular system solves through forward and back substitution. The LU factorization routines can handle non-square matrices but the triangular solves are performed only for square matrices. The matrix columns may be preordered (before factorization) either through library or user supplied routines. This preordering for sparsity is completely separate from the factorization. Working precision iterative refinement subroutines are provided for improved backward stability. Routines are also provided to equilibrate the system, estimate the condition number, calculate the relative backward error, and estimate error bounds for the refined solutions.
标签: nonsymmetric solution SuperLU general
上传时间: 2017-02-20
上传用户:lepoke
This taglib contains tags used to create struts input forms, as well as other tags generally useful in the creation of HTML-based user interfaces. Many of the tags in this tag library will throw a JspException at runtime when they are utilized incorrectly (such as when you specify an invalid combination of tag attributes). JSP allows you to declare an "error page" in the <%@ page %> directive. If you wish to process the actual exception that caused the problem, it is passed to the error page as a request attribute under key org.apache.struts.action.EXCEPTION.
标签: tags generally contains taglib
上传时间: 2017-02-21
上传用户:dianxin61
Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardware. The original firmware from the manufacturer is extended with new functions and programs which may be selected by the user
标签: firmware-extension modification identical devices
上传时间: 2014-12-08
上传用户:qw12
Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html part 2 of 3: user mode LIB
标签: EKernel Murphy murphy RTOS
上传时间: 2013-12-23
上传用户:小鹏
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop
标签: programming language Java technology
上传时间: 2014-01-03
上传用户:huangld
介绍分布式人工智能的不错的入门书籍,主要利用分布式人工智能技术来构建multi-agent系统……
上传时间: 2014-11-26
上传用户:tianyi223
Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While original Windows Mobile ring vibration constant vibrating during all ring, this driver help to apply any user vibrating pattern.
标签: customization vibration incoming Windows
上传时间: 2017-03-07
上传用户:498732662
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2017-03-08
上传用户:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2014-01-10
上传用户:yyq123456789
合同与报价系统 PB8开发,sysbase sql anywhere7 默认密码:user:admin password:admin ODBC设置为 Database=HxFirm UserId=tt ServerName=order LogId=tt
上传时间: 2017-03-17
上传用户:龙飞艇