搜索资源列表
ALGO2-3
- Algo2-3.c C program for implementing Algorithm 2.3 Algorithm translated to C by: Dr. Norman Fahrer IBM and Macintosh verification by: Daniel Mathews NUMERICAL METHODS: C Programs, (c) John H. Mathews 1995 To accompany the text: NUM
OReilly.C.Sharp.3.0.Design.Patterns
- C# Design Patterns Design patterns were introduced in Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides’s seminal work Design Patterns: Elements of Reusable Object- Oriented Software (Addison-Wesley). The book specifies and descri
111
- 3D 游戏界的大牛人 John Carmack 终于放出了 Q3 的源代码,。希望对有志于 3D game 的朋友带来更多帮助 代码结构很清晰.3D 游戏界的大牛人 John Carmack 终于放出了 Q3 的源代码,。希望对有志于 3D game 的朋友带来更多帮助 代码结构很清晰.
BCD_conversion_routines
- Binary-to-BCD. Written by John Payson. Enter with 16-bit binary number in NumH:NumL. Exits with BCD equivalent in TenK:Thou:Hund:Tens:Ones. org $0010 Start of user files for 16c84- Binary-to-BCD. Written by John Payson.
John.Wiley.and.Sons.The.Art.of.Software.Testing.Se
- Provides a practical rather than theoretical discussion of the purpose and nature of software testing. Emphasizes methodologies for the design of effective test cases. Comprehensively covers psychological and economic principles, managerial aspects o
hartigansSLC_OpenCV
- hartigans Sequential Leader Clustering Algorithm in terms of OpenCV (ver.1.1) Sequential Leader algorithm: Hartigan, J. A. (1975), Clustering Algorithms. John Wiley and Sons, Inc., New York, NY. 1. Select maximum cluster "radius" 2
SynchronousCommunications-JohnPCostas01037570
- Original Synchronous Commnunications by John P Costas
petalinuxautoconfig
- bsp Copies the PetaLinux auto-config file from an EDK project into the PetaLinux kernel tree # # AUTHOR: # John Williams-bsp Copies the PetaLinux auto-config file from an EDK project into the PetaLinux kernel tree # # AUTHOR: #
john.lions-lions.commentary.on.unix.6th.edition.wi
- 一个详细讲述unix操作系统设计的好书,适合作为参考手册-A detailed account of unix operating system designed for books, suitable as a reference manual
Life-1
- "Conway game", which redirects to here, can also refer to games as defined by surreal numbers, which John Conway also developed. Gosper s Glider Gun creating "gliders". The Game of Life, also known simply as Life, is a cellular automaton devis
knnsearch
- 寻找测试样本的最近邻,可以有效的用于用于模式识别,信号处理-This is a small but efficient tool to perform K-nearest neighbor search, which has wide Science and Engineering applications, such as pattern recognition, data mining and signal processing. The code was initially
john-1.7.3.1-all-5-gijohn-1.2.tar
- This a md5 password "decrypter". This program make a fast algorythm for this task.-This is a md5 password "decrypter". This program make a fast algorythm for this task.
read-edid-2.0.0.tar
- read-edid is a pair of tools (originally by John Fremlin) for reading the EDID from a monitor
Digital.Design-Principles.and.Practices.pdf
- Digital Design: Principles and Practices John Wakerly
13
- 如果字符串具有相同的后缀,那么就把这么字符串的相同后缀和在一起,这样就能节约一点空间了。比如说有两个字符串分别为“Programming”和“Something”,这样它们有相同的后缀ing,这时候就能省去三个字母了。请写一个程序,计算John这样做能够省去多少个字母?-If the string have the same suffix, then put such a string with the same suffix, and so can save a little space. F
14
- 请帮助John设计好线路,使得John能从任一个牧场都通过石子路到达另外一个牧场,且线路的费用最低。-Please help John design good lines, so John can have any one pasture through the gravel road to reach another farm, and the least expensive route.
ssm-1.0.1
- state space model - john aston
lecture08_Viterbi
- CS 552/652 Speech Recognition with Hidden Markov Models Summer 2009 Oregon Health & Science University School of Science & Engineering Division of Biomedical Computer Science Center for Spoken Language Understanding John-Paul H
batista0078vq1os3
- batista verssus john cena in smack down and WERAW
java8_24
- 从文本中去除所有指定字符串。例如: 调用java java8_24 john filename 从指定的文件中去掉字串john-Removed from the text all the specified string. For example: call java java8_24 john filename removed from the specified file string john