2005 Center for Biological & Computational Learning at MIT and MIT All rights reserved. Permission to copy and modify this data, software, and its documentation only for internal research use in your organization is hereby granted, provided that this notice is retained thereon and on all copies. This data and software should not be distributed to anyone outside of your organization without explicit written authorization by the author(s) and MIT.
标签: Computational Biological MIT Permissio
上传时间: 2014-01-27
上传用户:gaome
rINTCON=0x5 //Non-vectored,IRQ enable,FIQ disable rINTMOD=0x0 //All=IRQ mode
标签: Non-vectored IRQ rINTCON disable
上传时间: 2013-12-17
上传用户:thuyenvinh
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – Examine contents
标签: Intrusion Detection Host-based Network
上传时间: 2014-01-11
上传用户:ikemada
A simple and straightforeward instant messaging program written in Java for all platforms developed with ease of use and efficiency in mind
标签: straightforeward developed messaging platforms
上传时间: 2014-12-07
上传用户:rishian
This folder contains all the codes based on Matlab Language for the book <《Iterative Methods for Linear and Nonlinear Equations》, and there are totally 21 M files, which can solve most of linear and nonlinear equations problems.
标签: Iterative the for Language
上传时间: 2013-12-23
上传用户:cazjing
list all dlls for proc
上传时间: 2015-09-18
上传用户:13188549192
When I use opencv, I use this very useful paper to begin the study. This is all I searched from the internet informations.
上传时间: 2014-01-12
上传用户:lht618
The purpose of this chapter is to present a survey of recent publications concerning medical image registration techniques. These publications will be classified according to a model based on nine salient criteria, the main dichotomy of which is extrinsic versus intrinsic methods
标签: publications concerning purpose chapter
上传时间: 2015-09-19
上传用户:叶山豪
* "Copyright (c) 2006 Robert B. Reese ("AUTHOR")" * All rights reserved. * (R. Reese, reese@ece.msstate.edu, Mississippi State University) * IN NO EVENT SHALL THE "AUTHOR" BE LIABLE TO ANY PARTY FOR * DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT * OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE "AUTHOR" * HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
上传时间: 2015-09-24
上传用户:mpquest
Embedded computer systems permeate all aspects of our daily lives. Alarm clocks, coffee makers, digital watches, cell phones, and automobiles are just a few of the devices that make use of embedded systems. The design and development of such systems is unique, because the design constraints are different for each system. Essential to the development of an embedded system is an understanding of the hardware and software used for development.
标签: Embedded computer permeate aspects
上传时间: 2013-12-15
上传用户:erkuizhang