搜索资源列表
AttacksClassificationinAdaptivIntrusion
- Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employ
shudao
- 基于opengl系统的位图对象处理,带可缩放的标尺-Opengl bitmap-based object handling system with scalable benchmark
sha
- SHA加解密算法,SHA是安全散列算法,c语言实现的Benchmark-SHA encryption and decryption algorithm
blowfish
- Blowfish是一个64位分组及可变密钥长度的分组密码算法,c语言编写的benchmark-Blowfish is a 64-bit block and a variable length key block cipher algorithm, c language of the benchmark
libev-3.9.tar
- 一个高效的基于事件驱动循环的网络IO编程框架。该版本是目前最新的版本,在性能和健壮性已经超越libevent。-A full-featured and high-performance (see benchmark) event loop that is loosely modelled after libevent, but without its limitations and bugs. It is used, among others, in the GNU Virtual Privat
bmq031
- Window and WinCE benchmark software for benchmark window CE embedded devices
idct
- idct蝶形算法,矩阵乘,有测试基准,程序正确-idct butterfly algorithm, matrix multiplication, a benchmark, the program correctly
drystone
- 这是 Whetstone 标准测试程序源码。-This is Whetstone benchmark source code.
classbaseattrbutetimeclassification
- In this paper, we present two novel class-based weighting methods for the Euclidean nearest neighbor algorithm and compare them with global weighting methods considering empirical results on a widely accepted time series classification benchm
dry.tar
- Dhrystone benchmark source code
classbaseattributetimeclassification
- In this paper, we present two novel class-based weighting methods for the Euclidean nearest neighbor algorithm and compare them with global weighting methods considering empirical results on a widely accepted time series classification benchm
flashas3youhua
- 来自Adobe官方的Flash动画优化指南教程,包括以下的内容: • 如何节省内存 • 如何最大程度减小 CPU 使用量 • 如何提高 Actionscr ipt 3.0 性能 • 加快呈现速度 • 优化网络交互 • 使用音频和视频 • 优化 SQL 数据库性能 • 基准测试和部署应用程序-Adobe Flash animations from the
LoadflowOfGauss
- It is an Gauss_saidel method programed in Matlab. The effectiveness is tested by one benchmark function.
btcard32
- 门锁系统是通过服务器的时钟来转换得到宾客流水号的,因为时间不停的往后推移,所以换算得到的识别号将会越来越大。具体算法:以2000-01-01 00:00:00为基准,此时识别号的值为0,时间过1秒则识别号的值加1。也就是说,识别号的值是当前时间与基准时间所相差的秒的总数。-Lock system is to convert the clock through the server serial number by guests, as time goes on constantly in the
ackleyfcnTest.m
- Implements the traditional benchmark formulation used in optimization literature
ex1_3
- Particle swarm optimization has been used to solve many optimization problems since it was proposed by Kennedy and Eberhart in 1995 [4]. After that, they published one book [9] and several papers on this topic [5][7][13][15], one of which did a s
ex1_4
- Particle swarm optimization has been used to solve many optimization problems since it was proposed by Kennedy and Eberhart in 1995 [4]. After that, they published one book [9] and several papers on this topic [5][7][13][15], one of which did a s
ex3_1
- Particle swarm optimization has been used to solve many optimization problems since it was proposed by Kennedy and Eberhart in 1995 [4]. After that, they published one book [9] and several papers on this topic [5][7][13][15], one of which did a s
RLSexample
- Particle swarm optimization has been used to solve many optimization problems since it was proposed by Kennedy and Eberhart in 1995 [4]. After that, they published one book [9] and several papers on this topic [5][7][13][15], one of which did a s
circ
- c program to levelise a combinational vlsi circuits in test pattern generation. it will work for iscas 85 benchmark circuits