虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

p-value

  • JAVA游戏编程

    JAVA游戏编程,j n l p文件类型

    标签: 游戏编程

    上传时间: 2014-08-15

    上传用户:gengxiaochao

  • This is the machine-generated representation of a Handle Graphics object and its children. Note that

    This is the machine-generated representation of a Handle Graphics object and its children. Note that handle values may change when these objects are re-created. This may cause problems with any callbacks written to depend on the value of the handle at the time the object was saved.

    标签: machine-generated representation Graphics children

    上传时间: 2013-12-18

    上传用户:miaochun888

  • 英文版,pdf格式。 详细说明: Title: STL Tutorial and Reference Guide: C++ Programming with the Standard Templa

    英文版,pdf格式。 详细说明: Title: STL Tutorial and Reference Guide: C++ Programming with the Standard Template Library (2nd Edition) URL: http://www.amazon.com/exec/obidos/tg/detail/-/0201379236/ ISBN: 0201379236 Author: David R. Musser / Gillmer J. Derge / Atul Saini / Gilmer J. Derge Publisher: Addison-Wesley Page: 560 Edition: 2nd edition (March 27, 2001) Catalog: C++ Format: PDF Size: 3.8M Supplier: December Summary: The Standard Template Library was created as the first library of genetic algorithms and data structures, with four ideas in mind: generic programming, abstractness without loss of efficiency, the Von Neumann computation model, and value semantics. This guide provides a tutorial, a description of each element of the library, and sample applications. The expanded second edition includes new code examples and demonstrations of the use of STL in real-world C++ software development it reflects changes made to STL for the final ANSI/ISO C++ language standard.

    标签: Programming Reference Standard Tutorial

    上传时间: 2015-09-02

    上传用户:Breathe0125

  • This text introduces the spirit and theory of hacking as well as the science behind it all it also p

    This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。

    标签: introduces the hacking science

    上传时间: 2013-12-28

    上传用户:离殇

  • * CONSTRAINTS * This module does not handle data which is considered out of range by the * appli

    * CONSTRAINTS * This module does not handle data which is considered out of range by the * application(i.e. fixed constants which represent error condition) * * Maximum weight value must be limited to 128 to prevent an overflow * condition during the calculation. * * The internal data type must be large enough to handle the calculations. * The maximum possible internal value * = Max Input Value * (weight - 1) + Max Input Value * If a maximum weight of 128 is used, the internal data type should be 2 * times the size of the input data type.

    标签: CONSTRAINTS considered module handle

    上传时间: 2015-09-07

    上传用户:qunquan

  • * DEFINITION * This is the header file for a library module used to calculate the median * of a

    * DEFINITION * This is the header file for a library module used to calculate the median * of a list of values. It finds the value that would be in the center if * the list were sorted. If the list contains an even number of values, the * lower of the two center values is reported. The values themselves are not * sorted or modified in any way. This algorithm can be used as a filtering * tool for rejecting noisy data.

    标签: DEFINITION calculate the library

    上传时间: 2015-09-07

    上传用户:refent

  • Hard-decision decoding scheme Codeword length (n) : 31 symbols. Message length (k) : 19 symbols.

    Hard-decision decoding scheme Codeword length (n) : 31 symbols. Message length (k) : 19 symbols. Error correction capability (t) : 6 symbols One symbol represents 5 bit. Uses GF(2^5) with primitive polynomial p(x) = X^5 X^2 + 1 Generator polynomial, g(x) = a^15 a^21*X + a^6*X^2 + a^15*X^3 + a^25*X^4 + a^17*X^5 + a^18*X^6 + a^30*X^7 + a^20*X^8 + a^23*X^9 + a^27*X^10 + a^24*X^11 + X^12. Note: a = alpha, primitive element in GF(2^5) and a^i is root of g(x) for i = 19, 20, ..., 30. Uses Verilog description with synthesizable RTL modelling. Consists of 5 main blocks: SC (Syndrome Computation), KES (Key Equation Solver), CSEE (Chien Search and Error Evaluator), Controller and FIFO Register.

    标签: symbols length Hard-decision Codeword

    上传时间: 2014-07-08

    上传用户:曹云鹏

  • rayleigh衰落信道的matlab源码

    rayleigh衰落信道的matlab源码,采用p阶自相关AR模型

    标签: rayleigh matlab 衰落信道 源码

    上传时间: 2015-09-12

    上传用户:003030

  • KPhoneIM is a simple point to point instant messaging application. You may chat with (exactly) one p

    KPhoneIM is a simple point to point instant messaging application. You may chat with (exactly) one partner directly. The tool needs no server. It may be called from KPhoneSI as external session. Indeed, I develloped the tool mainly to demonstrate KPhoneSI s concept of external sessions!

    标签: point application messaging KPhoneIM

    上传时间: 2015-09-13

    上传用户:lhw888

  • sd2003芯片资料及源码

    sd2003芯片资料及源码,C51下的,可以直接使用,不是厂方提供的测试程序, 相应子程序: extern void ini_SD2003(void) extern bit mend_scl_SD2003(void) extern bit start_bit_SD2003(void) extern void stop_bit_SD2003(void) extern void ack_SD2003(void) extern void no_ack_SD2003(void) extern void mast_ack_SD2003(void) extern void write_8bit_SD2003(UCHAR ch) extern UCHAR Read_8bit_SD2003(void) extern void write_8bit_SD2003_R(UCHAR ch) extern UCHAR Read_8bit_SD2003_R(void) extern bit Readblock_SD2003(UCHAR ucommand,UCHAR *p) extern bit Writeblock_SD2003(UCHAR ucommand,UCHAR *p)

    标签: 2003 sd 芯片资料 源码

    上传时间: 2015-09-14

    上传用户:zl5712176