虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

INForMATION

  • the text file QMLE contains the quasi maximum likelyhood estimating procedure and performing Infor

    the text file QMLE contains the quasi maximum likelyhood estimating procedure and performing INForMATION Matrix test for a univariate GARCH(1,1) model

    标签: estimating likelyhood performing the

    上传时间: 2014-11-22

    上传用户:zhenyushaw

  • This approach addresses two difficulties simultaneously: 1) the range limitation of mobile robot se

    This approach addresses two difficulties simultaneously: 1) the range limitation of mobile robot sensors and 2) the difficulty of detecting buildings in monocular aerial images. With the suggested method building outlines can be detected faster than the mobile robot can explore the area by itself, giving the robot an ability to “see” around corners. At the same time, the approach can compensate for the absence of elevation data in segmentation of aerial images. Our experiments demonstrate that ground-level semantic INForMATION (wall estimates) allows to focus the segmentation of the aerial image to find buildings and produce a ground-level semantic map that covers a larger area than can be built using the onboard sensors.

    标签: simultaneously difficulties limitation addresses

    上传时间: 2014-06-11

    上传用户:waitingfy

  • PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A componen

    PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant INForMATION to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficients: c_j=mean(b_j)/std(b_j), obtained by jackknifing. The cutoff level, below which c_j is considered to be too small, indicating that the variable j should be removed, is estimated using a matrix of random variables.The predictive power of PLS models built on the retained variables only is evaluated over all 1-a dimensions =(yielding RMSECVnew).

    标签: from eliminates PRINCIPLE algorithm

    上传时间: 2016-11-27

    上传用户:凌云御清风

  • There are several problems related to the properties of the triangular mesh representation that des

    There are several problems related to the properties of the triangular mesh representation that describes a surface of an object. Sometimes, the surface is represented just as a set of triangles without any other INForMATION and the STL file format, which is used for data exchanges, is a typicalexampl e of this situation.

    标签: representation properties triangular the

    上传时间: 2014-11-12

    上传用户:colinal

  • 浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf

    浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in INForMATION Secuirity ,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程序的方法,其中包括对称加密、非对称加密和数字签名算法的编程.

    标签: Arithmetric Discussion Cryptology NET

    上传时间: 2013-12-31

    上传用户:小宝爱考拉

  • MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统 =======================================================

    MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统 ======================================================================== AppWizard has created this 学生管理系统 application for you. This application not only demonstrates the basics of using the Microsoft Foundation classes but is also a starting point for writing your application. This file contains a summary of what you will find in each of the files that make up your 学生管理系统 application. 学生管理系统.dsp This file (the project file) contains INForMATION at the project level and is used to build a single project or subproject. Other users can share the project (.dsp) file, but they should export the makefiles locally.

    标签: FOUNDATION MICROSOFT LIBRARY CLASS

    上传时间: 2013-12-16

    上传用户:天涯

  • BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that th

    BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse: Get the most out of the built-in applications Take control of email with filters, searches, and more Rev up your mobile gaming--whether you re an arcade addict or poker pro Browse the web, chat over IM, and keep up with news and weblogs Work with office documents, spell check your messages, and send faxes Become more secure, lock down your BlackBerry and stash secure INForMATION somewhere safe Manage and monitor the BlackBerry Enterprise Server (BES) and Mobile Data System (MDS) Create web sites that look great on a BlackBerry Develop and deploy BlackBerry applications

    标签: BlackBerry computing enhance mobile

    上传时间: 2016-12-07

    上传用户:GavinNeko

  • The System Management BIOS Reference Specification addresses how motherboard and system vendors pres

    The System Management BIOS Reference Specification addresses how motherboard and system vendors present management INForMATION about their products in a standard format by extending the BIOS interface on Intel architecture systems. The INForMATION is intended to allow generic instrumentation to deliver this data to management applications that use CIM (the WBEM data model) or direct access and eliminates the need for error prone operations like probing system hardware for presence detection.

    标签: Specification motherboard Management Reference

    上传时间: 2013-12-10

    上传用户:凤临西北

  • Please read this document before attempting to compile and run the libraries and applications! The p

    Please read this document before attempting to compile and run the libraries and applications! The projects must be compiled in a particular order. Standard support questions are about compiler and/or linker errors that are generated when users try to compile the projects in the wrong order. Other INForMATION of interest is available here, so read the entire document fi rst. Wild Magic Version 2.1 is what ships with the fi rst printing of the Game Physics book. Some of the applications that are referenced in the book did not make it onto the CD–ROM for the book. Version 2.2 contains those applications, plus more

    标签: applications attempting and libraries

    上传时间: 2014-01-16

    上传用户:Late_Li

  • 加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encr

    加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encryption means that pegwit allows you to keep the INForMATION in files you send by email (or other means) confidential. Eavesdroppers will not be able to read the email. Authentication allows you to check that a file has not been tampered with (changed) since it was signed.

    标签: authentication encryption performing program

    上传时间: 2016-12-12

    上传用户:franktu