虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

then

  • 是一本介绍java基础应用的好书 Java For Artists targets both the undergraduate computer science or information te

    是一本介绍java基础应用的好书 Java For Artists targets both the undergraduate computer science or information technology student and the practicing programmer. It is both an introductory-level textbook and trade book. As a textbook it employs learning objectives, skill-building exercises, suggested projects, and self-test questions to reinforce the learning experience. The projects offered range from the easy to the extremely challenging. It covers all the topics you’d expect to find in an introductory Java programming textbook and then some. As a trade book it goes purposefully deeper into topics cut short or avoided completely in most introductory textbooks. Its coverage of advanced GUI programming techniques, network programming and object-oriented theory will enable you to take your skills to a higher level.

    标签: undergraduate information computer Artists

    上传时间: 2016-09-28

    上传用户:qiaoyue

  • MATLAB的SVM算法实现

    MATLAB的SVM算法实现,Matlab Support Vector Machine Toolbox,This toolbox was designed as a teaching aid, which matlab is particularly good for since source code is relatively legible and simple to modify. However, it is still reasonably fast if used with the supplied optimiser. However, if you really want to speed things up you should consider compiling the matrix composition routine for H into a mex function. then again if you really want to speed things up you probably shouldn t be using matlab anyway... Get hold of a dedicated C program once you understand the algorithm.

    标签: MATLAB SVM 算法

    上传时间: 2013-12-20

    上传用户:jkhjkh1982

  • ARP test mode. According to the idea we design the arithmetic for the key part, first the system sen

    ARP test mode. According to the idea we design the arithmetic for the key part, first the system sends a message to the target machine, and then system wait for the response. Once system receives a message, it starts to analyze the message, according to the message s parameter system judges whether the message satisfies the conditions. Once the message satisfies all the conditions, the system thinks the machine is sniffing, and adds this machine into the list of sniffing machines. On this basis the detection has done well, and at the same time we insert the result into the log database for inquire and analyze later.

    标签: the arithmetic According design

    上传时间: 2016-10-06

    上传用户:chongcongying

  • Libnet is a generic networking API that provides access to several protocols. It is not designed as

    Libnet is a generic networking API that provides access to several protocols. It is not designed as a all in one solution to networking. Currently many features that are common in some network protocols are not available with Libnet, such as streaming via TCP/IP. We feel that Libnet should not provide specific features that are possible in other protocols. If we restrict Libnet to the minimal needed to communicate (datagram/packets) then this allows it to support more interfaces. 很好的学习linux网络变成的源码

    标签: networking protocols designed provides

    上传时间: 2016-10-18

    上传用户:changeboy

  • Recent advances in experimental methods have resulted in the generation of enormous volumes of data

    Recent advances in experimental methods have resulted in the generation of enormous volumes of data across the life sciences. Hence clustering and classification techniques that were once predominantly the domain of ecologists are now being used more widely. This book provides an overview of these important data analysis methods, from long-established statistical methods to more recent machine learning techniques. It aims to provide a framework that will enable the reader to recognise the assumptions and constraints that are implicit in all such techniques. Important generic issues are discussed first and then the major families of algorithms are described. Throughout the focus is on explanation and understanding and readers are directed to other resources that provide additional mathematical rigour when it is required. Examples taken from across the whole of biology, including bioinformatics, are provided throughout the book to illustrate the key concepts and each technique’s potential.

    标签: experimental generation advances enormous

    上传时间: 2016-10-23

    上传用户:wkchong

  • A few short years ago, the applications for video were somewhat confined—analog was used for broad

    A few short years ago, the applications for video were somewhat confined—analog was used for broadcast and cable television, VCRs, set-top boxes, televisions and camcorders. Since then, there has been a tremendous and rapid conversion to digital video, mostly based on the MPEG-2 video compression standard. Today, in addition to the legacy DV, MPEG-1 and MPEG-2 audio and video com- pression standards, there are three new high- performance video compression standards. These new video codecs offer much higher video compression for a given level of video quality.

    标签: applications for confined somewhat

    上传时间: 2016-10-29

    上传用户:bjgaofei

  • For solving the following problem: "There is No Free Lunch" Time Limit: 1 Second Memory Limit: 3

    For solving the following problem: "There is No Free Lunch" Time Limit: 1 Second Memory Limit: 32768 KB One day, CYJJ found an interesting piece of commercial from newspaper: the Cyber-restaurant was offering a kind of "Lunch Special" which was said that one could "buy one get two for free". That is, if you buy one of the dishes on their menu, denoted by di with price pi , you may get the two neighboring dishes di-1 and di+1 for free! If you pick up d1, then you may get d2 and the last one dn for free, and if you choose the last one dn, you may get dn-1 and d1 for free. However, after investigation CYJJ realized that there was no free lunch at all. The price pi of the i-th dish was actually calculated by adding up twice the cost ci of the dish and half of the costs of the two "free" dishes. Now given all the prices on the menu, you are asked to help CYJJ find the cost of each of the dishes.

    标签: Limit following solving problem

    上传时间: 2014-01-12

    上传用户:362279997

  • Write a multithreaded Java, Pthreads, or WIN32 program that outputs prime numbers. This program shou

    Write a multithreaded Java, Pthreads, or WIN32 program that outputs prime numbers. This program should work as follows: The user will run the program and will enter a number on the command line. The program will then create a separate thread that outputs all the prime numbers less than or equal to the number entered by the user.

    标签: program multithreaded Pthreads numbers

    上传时间: 2013-12-21

    上传用户:zhyiroy

  • The inverse of the gradient function. I ve provided versions that work on 1-d vectors, or 2-d or 3-d

    The inverse of the gradient function. I ve provided versions that work on 1-d vectors, or 2-d or 3-d arrays. In the 1-d case I offer 5 different methods, from cumtrapz, and an integrated cubic spline, plus several finite difference methods. In higher dimensions, only a finite difference/linear algebra solution is provided, but it is fully vectorized and fully sparse in its approach. In 2-d and 3-d, if the gradients are inconsistent, then a least squares solution is generated

    标签: gradient function provided versions

    上传时间: 2016-11-07

    上传用户:秦莞尔w

  • Initialize U=[uij] matrix, U(0) At k-step: calculate the centers vectors C(k)=[cj] with U(k) &nb

    Initialize U=[uij] matrix, U(0) At k-step: calculate the centers vectors C(k)=[cj] with U(k)                                 Update U(k) , U(k+1)                                                     If || U(k+1) - U(k)||<     then STOP otherwise return to step 2.

    标签: Initialize calculate centers vectors

    上传时间: 2013-12-29

    上传用户:CSUSheep