学编译原理时写的一个语法分析程序 分类:C/C++技术交流 一.[目的要求] ① 对输入文法,由程序自动构造FIRST FOLLOW集 ② 对输入文法,由程序自动生成它的LL(1)分析表; ③ 对于给定的输入串,应能判断识别该串是否为给定文法的句型。 二.[题目分析] 该程序可分为如下几步: (1)读入文法 (2)判断正误 (3)若无误,判断是否为LL(1)文法 (4)若是,构造分析表; (5)由总控算法判断输入符号串是否为该文法的句型。
上传时间: 2016-12-05
上传用户:1101055045
Good morning, dear teachers. I am very glad to be here for your interview. my name is xx.I am 21 years old. I come from Dafang, a small town of Guizhou province. My undergraduate period will be accomplished in East China Jiaotong University. I major in electrical engineering and automation. I am interesting in computer, especially in program design. I am a hard study student, especially in the things which I interesting in. I am a person with great perseverance. During the days I preparing for the postgraduate examination, I insist on study for more than 10 hours every day. Just owing to this, I could pass the first examination finally. I am also a person with great ambition.
标签: interview teachers morning Good
上传时间: 2014-01-11
上传用户:钓鳌牧马
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com
软件简介:HI-TECH PICC 是一款高效的C编译器,支持Microchip PICmicro 10/12/14/16/17系列控制器。是一款强劲的标准C编译器,完全遵守ISO/ANSI C,支持所有的数据类型包括24 and 32 bit IEEE 标准浮点类型。智能优化产生高质量的代码。属于第三方开发工具。能和MPLAB整合,内嵌开发环境(HI-TIDE)。 Hi-tech PICC Compiler v8.注册码 Serial: HCPIC-88888 First Name: ONE Last Name: TWO Company Name:ONE TWO Registration: 任意填,但一定要填 Activation: NPCBACMJKLPCADKLOEDBFPIOCIBAEIDI
上传时间: 2016-12-16
上传用户:Andy123456
gcclib This gcc 1.40 suits for Linux kernel 0.11 - 0.95 Installtion hints ----------------- This suit contains include.taz, local.taz and this README file. You must download the bootimage and rootimage and install them first. The include.taz contains all the include files for using with gcc 1.40. The local.taz contains all the gcc tools & libs stored in two sepearted directories: /usr/local/lib /usr/local/bin You should copy the linux/ asm/ sys/ subdirectories into the include directory from the corresponding kernel source. Installation ------------ Goto the /usr directory. Untar the include.taz to the directory /usr/include. Untar the local.taz to the directory /usr/local. That s it! Example: -------- cd /usr tar zxvf include.taz tar zxvf local.taz
标签: Installtion gcclib kernel Linux
上传时间: 2014-03-12
上传用户:源码3
Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %
标签: back-propagation corresponding input-output algorithm
上传时间: 2016-12-27
上传用户:exxxds
% Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is possible to use regularization by % weight decay. Also pruned (ie. not fully connected) networks can % be trained. % % Given a set of corresponding input-output pairs and an initial % network, % [W1,W2,critvec,iteration,lambda]=marq(NetDef,W1,W2,PHI,Y,trparms) % trains the network with the Levenberg-Marquardt method. % % The activation functions can be either linear or tanh. The % network architecture is defined by the matrix NetDef which % has two rows. The first row specifies the hidden layer and the % second row specifies the output layer.
标签: Levenberg-Marquardt desired network neural
上传时间: 2016-12-27
上传用户:jcljkh
Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.
标签: recursive prediction algorithm Gauss-Ne
上传时间: 2016-12-27
上传用户:ljt101007
SQL 合计函数 使用 SQL 合计函数 你可以确定数据组的各种统计。你可以把这些函数用于查询和合计表达式,条件是在具备 SQL特性的 QueryDef对象中或在创建基于SQL查询的 Recordset对象时。 Avg 函数 Count 函数 First, Last 函数 Min, Max 函数 StDev, StDevP 函数 Sum 函数 Var 和 VarP 函数
上传时间: 2017-01-27
上传用户:1583060504
[smith.rar] - smith原图,希望能给学射频的一些帮助 [CommandPattern.rar] - ,Head First 设计模式原书用的是JAVA写的代码,网络上也有C#的,但没有见到用C++实现的。这是我用C++实现的命令模式的代码 [网吧管理系统客户端源程序.zip] - 这里是源码。 宛枫书社图书管理系统 V1.0 Beta 测试版 面向中小型书店、个体书店进行全面的人员、物流管理,旨在实现书店管理信息化。本系统采用会员制管理,将人员分为经理、仓库管理员、售书员、会员、游客等,分别拥有不同的权限,各司其职,以便提高工作效率。系统功能包括:供应商管理、进书管理、图书资
标签: smith
上传时间: 2013-12-12
上传用户:lo25643