搜索结果
找到约 7 项符合
contribution 的查询结果
数学计算 Expert Choice represents a significant contribution to the decision making process 工t assists a deci
Expert Choice represents a significant contribution to the decision making process 工t assists a decision maker in solving complex problems involving many criteria and several courses of action . An Expert Choice solution to a problem reflects the expertise of the decision maker , not the computer . ...
软件工程 FAT32 Spec (SDA Contribution).
FAT32 Spec (SDA Contribution).
软件设计/软件工程 This contribution provides functions for finding an optimum parameter set using the evolutionary alg
This contribution provides functions for finding an optimum parameter set using the evolutionary algorithm of Differential Evolution. Simply speaking: If you have some complicated function of which you are unable to compute a derivative, and you want to find the parameter set minimizing the output o ...
其他 Pocket 1945 is a classic shooter inspired by the classic 1942 game. The game is written in C# target
Pocket 1945 is a classic shooter inspired by the classic 1942 game. The game is written in C# targeting the .NET Compact Framework. This article is my first submission to Code Project and is my contribution to ongoing .NET CF competition.
Java编程 JLayer is a library that decodes/plays/converts MPEG 1/2/2.5 Layer 1/2/3 (i.e. MP3) in real time fo
JLayer is a library that decodes/plays/converts MPEG 1/2/2.5 Layer 1/2/3
(i.e. MP3) in real time for the JAVA(tm) platform.
and anyone can add his contribution. JLayer is licensed under LGPL (see LICENSE.txt).
通讯/手机编程 UIT - Secteur de la normalisation des télécommunications ITU - Telecommunication Standardization Se
UIT - Secteur de la normalisation des télécommunications
ITU - Telecommunication Standardization Sector
UIT - Sector de Normalización de las Telecomunicaciones
Study Period 1997-2000
Commission d études Study Group Comisión de Estudio 16 Contribution tardive Delayed Contribution Contribución ...
加密解密 The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfi ...