虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

one-on-one

  • 游戏开发数据结构Data Structures for Game Programmers The Goodies Directory contains all sorts of stuff. For

    游戏开发数据结构Data Structures for Game Programmers The Goodies Directory contains all sorts of stuff. For example, there are the four 3rd-Party libraries used in the book, SDL, SDL_TTF, FreeType (which SDL_TTF uses), and STLPort, which is one implementation of the Standard Template Library. Also, there are four articles on trees and SDL in the articles directory. These supplement the material in the book.

    标签: Programmers Structures Directory contains

    上传时间: 2017-02-12

    上传用户:qoovoop

  • This book uses the Python language to teach pro - gramming concepts and problem -solving skills,

    This book uses the Python language to teach pro - gramming concepts and problem -solving skills, without assuming any previous program- ming experience. With easy-to-understand examples, pseudocode, flowcharts, and other tools, the student learns how to design the logic of programs and then implement those programs using Python. This book is ideal for an introductory programming course or a programming logic and design course using Python as the language. As with all the boolts in the Starting Out With series, the hallmark of this text is its clear, friendly, and easy -to-understand writing. In addition, it is rich in example programs that are concise and practical. The programs in this book include short examples that highlight specific programming topics, as well as more involved examples that focus on problem solving. Each chapter provides one or more case studies that provide step -by-step analysis of a specific problem and shows the student how to solve it.

    标签: language gramming concepts problem

    上传时间: 2014-01-12

    上传用户:独孤求源

  • A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

    A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.

    标签: cylindrical scattering expansion developed

    上传时间: 2017-03-30

    上传用户:lhc9102

  • In computer vision, sets of data acquired by sampling the same scene or object at different times, o

    In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements. Image registration is the process of transforming the different sets of data into one coordinate system. To be precise it involves finding transformations that relate spatial information conveyed in one image to that in another or in physical space. Image registration is performed on a series of at least two images, where one of these images is the reference image to which all the others will be registered. The other images are referred to as target images.

    标签: different computer acquired sampling

    上传时间: 2013-12-28

    上传用户:来茴

  • This book brings together indispensable knowledge for building efficient, high-value, Linux-based em

    This book brings together indispensable knowledge for building efficient, high-value, Linux-based embedded products: information that has never been assembled in one place before. Drawing on years of experience as an embedded Linux consultant and field application engineer, Christopher Hallinan offers solutions for the specific technical issues you re most likely to face, demonstrates how to build an effective embedded Linux environment, and shows how to use it as productively as possible.

    标签: indispensable Linux-based high-value efficient

    上传时间: 2014-01-24

    上传用户:ANRAN

  • SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY comm

    SCSI Multimedia Commands 鈥?3 (MMC-3) T10/1363-D 5.16 READ CAPACITY Command The READ CAPACITY command (Table 144) provides a means for the Initiator to request information regarding the capacity of the Logical Unit. This command shall not report the correct capacity of the recorded data for CD-R, CD-RW and DVD-R/-RW media that does not have a Lead-out in the last Session or last Border-out. For CD-ROM, the returned logical block address is modified to allow returning a possibly inexact value (but one with a known error bound) based on the Table of Contents data

    标签: CAPACITY READ Multimedia Commands

    上传时间: 2017-04-17

    上传用户:liuchee

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    标签: perceptual implementation algorithms fingerpr

    上传时间: 2013-12-08

    上传用户:星仔

  • I ll probably write up a short article next week outlining how the ActionScript works, so people can

    I ll probably write up a short article next week outlining how the ActionScript works, so people can modify it, and work with it more easily in Flex. You can download the component and source code here. There are some instructions in the FLA on how to use it. Note that this is not a compiled component, so it won t show up in the components panel. You will have to copy the component, and the source file into your project. If anyone really wants a compiled version, let me know and I can provide one. As always, I d love to hear how people use it, and would appreciate it if you would post back to the comments if you make any significant modifications so that other people can benefit from them.

    标签: ActionScript outlining probably article

    上传时间: 2017-04-20

    上传用户:c12228

  • Java has become a confusing world. Five years ago, there were few decisions to make once you start

    Java has become a confusing world. Five years ago, there were few decisions to make once you started programming in Java—you used AWT for graphical user interfaces, sockets for network programming, and hacked together everything else you needed. Since then, though, the APIs available for the Java language have grown, and grown. . . and grown. Now you can dabble in Swing, servlets, Enterprise JavaBeans (EJB), JavaMail, and more. Additionally, there are now packages of APIs, like the Java 2 Micro Edition (J2ME) and Java 2 Enterprise Edition (J2EE). While these packages seem to be nicely wrapped bundles of useful APIs, they don t help the average developer figure out how to piece together the APIs contained in these packages. Though it s simple to find documentation on the individual APIs, getting the "big picture" is difficult, at best. One of the most interesting, but difficult, aspects of Java today is building Java enterprise applications using the J2EE package.

    标签: confusing decisions become world

    上传时间: 2013-12-30

    上传用户:haoxiyizhong

  • C is a general-purpose programming language. It has been closely associated with the UNIX operating

    C is a general-purpose programming language. It has been closely associated with the UNIX operating system where it was developed, since both the system and most of the programs that run on it are written in C. The language, however, is not tied to any one operating system or machine and although it has been called a ``system programming language because it is useful for writing compilers and operating systems, it has been used equally well to write major programs in many different domains.

    标签: general-purpose programming associated operating

    上传时间: 2014-01-14

    上传用户:我干你啊