虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

leave-one-out

  • 给出一个非负小数

    给出一个非负小数,找出分子不超过M,分母不超过N的最简分数或整数, 使其最接近给出的小数。如果这个分数不唯一,输出‘TOO MANY’。 输入文件格式(closest.in) 第一行,M,N(1<=M,N<=10^9) 第二行,即小数R,(0<R 输出文件格式(closest.out) 仅一行,若解唯一输出 分子 / 分母(整数K写成K/1),否则输出TOO MANY 样例输入: 360 120 3.1415926536 样例输出: 355/113

    标签:

    上传时间: 2017-01-08

    上传用户:iswlkje

  • 支持向量机matlab程序 (1) Main_SVC_C.m --- C_SVC二类分类算法 (2) Main_SVC_Nu.m --- Nu_SVC二类分类算法 (3) Main_SVM_On

    支持向量机matlab程序 (1) Main_SVC_C.m --- C_SVC二类分类算法 (2) Main_SVC_Nu.m --- Nu_SVC二类分类算法 (3) Main_SVM_One_Class.m --- One-Class支持向量机 (4) Main_SVR_Epsilon.m --- Epsilon_SVR回归算法 (5) Main_SVR_Nu.m --- Nu_SVR回归算法

    标签: Main_SVC_Nu Main_SVM_On Main_SVC_C matlab

    上传时间: 2014-11-27

    上传用户:zhuoying119

  • 本程序通过tc2.0和tc3.0编译运行

    本程序通过tc2.0和tc3.0编译运行,请在主目录(tc.exe所在的目录)下添加文件out.xia

    标签: tc 2.0 3.0 程序

    上传时间: 2013-12-25

    上传用户:CHENKAI

  • Distributed applications, devices, and services appear in many different arrangements in an enterpr

    Distributed applications, devices, and services appear in many different arrangements in an enterprise. At your company, you probably access data from your intranet services, from computers distributed throughout the company network, and from services across the firewall out on the Web. For example, you might access a calendar-sharing application or a financial application to fill out expense sheets. Someone must maintain all these applications. Not only the applications, but also the hardware that supports them must be maintained. Resource management encompasses both applications and hardware. In fact, both application and hardware management can be supported through the development of Java Management Extensions (JMX) resource management software. This book will show how you can use JMX to manage and monitor all your resources across an enterprise—both software and hardware.

    标签: applications arrangements Distributed different

    上传时间: 2014-01-05

    上传用户:330402686

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: , in zip file under C:

    The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: \, in zip file under C:\WINNT , C:\WINNT\system32 , these three catalogues ,. The worm will falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically, the worm will open the selfish calculations constantly too.

    标签: worm duplicate catalogue WINNT

    上传时间: 2017-01-13

    上传用户:aig85

  • The worm will produce Arod.exe and " get to C: WINDOWS catalogue . After starting the machine again

    The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept a mail while inserting , and falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically.

    标签: catalogue starting produce WINDOWS

    上传时间: 2013-12-18

    上传用户:wang5829

  • OReilly.Java.Rmithis book provides strategies for working with serialization, threading, the RMI r

    OReilly.Java.Rmithis book provides strategies for working with serialization, threading, the RMI registry, sockets and socket factories, activation, dynamic class downloading, HTTP tunneling, distributed garbage collection, JNDI, and CORBA. In short, a treasure trove of valuable RMI knowledge packed into one book.

    标签: serialization strategies threading provides

    上传时间: 2014-01-15

    上传用户:731140412

  • CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data o

    CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.

    标签: CAN configuring and transmit

    上传时间: 2013-12-11

    上传用户:weiwolkt

  • 创建两个生产者进程和两个消费者进程

    创建两个生产者进程和两个消费者进程,生产者进程a需要生成10000个整数,每次都将自己的进程号(用getpid()函数获得)和生成的整数放入共享内存中(共享内存大小为64Byte)。生产者b每次从26个英文字母中选一个,并将自己的进程号和选中的字母放入共享内存中,直到26个字母全部都选中。消费者进程c负责从共享内存中读取数据生产者进程a的数据并且将这些数据写入文件a.out。消费者进程d从共享内存读取进程b的数据后写入b.out中。

    标签: 进程

    上传时间: 2014-01-24

    上传用户:王者A