This book has been written to support a practically oriented course in programming language translation for senior undergraduates in Computer Science. More specifically, it is aimed at students who are probably quite competent in the art of imperative programming (for example, in C++, Pascal, or Modula-2), but whose mathematics may be a little weak students who require only a solid introduction to the subject, so as to provide them with insight into areas of language design and implementation, rather than a deluge of theory which they will probably never use again students who will enjoy fairly extensive case studies of translators for the sorts of languages with which they are most familiar students who need to be made aware of compiler writing tools, and to come to appreciate and know how to use them. It will hopefully also appeal to a certain class of hobbyist who wishes to know more about how translators work.
标签: practically programming oriented language
上传时间: 2013-12-10
上传用户:我干你啊
This library implements the KLT Tracking algorithm [2004] for Feature Tracking in Video useful in computer vision tasks like object recognition, image indexing, tracking and structure from motion. This implementation uses programmable Graphics Hardware to achieve considerable speedup in the running time of the GPU-based implementation.
标签: Tracking implements algorithm Feature
上传时间: 2013-12-10
上传用户:trepb001
I would like to thank my advisor, Dr. A. Lynn Abbott, for helping me throughout my research, Gary Fleming and the rest of the people at NASA Langley who provided all the flight information and image sequences, and my parents who supported me in my decision to enter graduate study. Also, thanks to Phichet Trisirisipal and Xiaojin Gong for helping when I had computer vision questions, and Nathan Herald for his help creating an illustration.
标签: A. throughout research advisor
上传时间: 2017-06-18
上传用户:maizezhen
This library implements the KLT Tracking algorithm [2004] for Feature Tracking in Video useful in computer vision tasks like object recognition, image indexing, tracking and structure from motion. This implementation uses programmable Graphics Hardware to achieve considerable speedup in the running time of the GPU-based implementation.
标签: Tracking implements algorithm Feature
上传时间: 2013-12-19
上传用户:WMC_geophy
This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the computer networking industry to receive data at a particular frequency and transmit them at another frequency. An asynchronous FIFO has two different clocks: one for read and one for write.
标签: Asynchronous asynchronous the discuss
上传时间: 2013-12-09
上传用户:Thuan
The all mighty mouse: you can have more memory, you can have blue-ray discs but you are still using the mouse (and the keyboard) to control your computer. The mouse pointer lets you select objects on the screen and operate on them. What and how you operate with the mouse is pretty simple: there s an arrow on the screen that moves when you move the mouse - screen edges are the border - the area where you mouse lives. When you click it, it does something.
上传时间: 2017-07-04
上传用户:秦莞尔w
MD5的全称是Message-digest Algorithm 5(信息-摘要算法),在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald.L.Rivest开发出来,经MD2、MD3和MD4发展而来。
标签: Message-digest Algorithm MD5 算法
上传时间: 2017-07-12
上传用户:youmo81
ARM System Developer s Guide: Designing and Optimizing System Software (The Morgan Kaufmann Series in Computer Architecture and Design)
标签: System Optimizing Developer Designing
上传时间: 2014-01-12
上传用户:gundan
Client/Server application. This application was written using RMI Java. It resolve "access to critical section " example problem. To use this program you should change in *.bat / *.sh files the java path according in your computer
标签: application resolve written Client
上传时间: 2013-12-03
上传用户:hxy200501
Most e-book publishers do not warn their customers about the possible implications of the digital rights management tied to their products. Generally they claim that digital rights management is meant to prevent copying of the e-book. However in many cases it is also possible that digital rights management will result in the complete denial of access by the purchaser to the e-book.[citation needed] With some formats of DRM, the e-book is tied to a specific computer or device
标签: implications publishers customers the
上传时间: 2013-12-11
上传用户:xg262122