虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Ordered

  • 用Visual Basic Ordered Dither Core Algorithm

    用Visual Basic Ordered Dither Core Algorithm,希望对于大家有用。

    标签: Algorithm Ordered Visual Dither

    上传时间: 2016-04-23

    上传用户:gaome

  • A robot, that could update and show your Ordered news or node of web page.

    A robot, that could update and show your Ordered news or node of web page.

    标签: Ordered update robot could

    上传时间: 2014-01-08

    上传用户:zhliu007

  • Longest Ordered Subsequence,acm必备习题

    Longest Ordered Subsequence,acm必备习题

    标签: Subsequence Longest Ordered acm

    上传时间: 2014-10-27

    上传用户:1159797854

  • Problem B:Longest Ordered Subsequence A numeric sequence of ai is Ordered if a1 < a2 < ... &l

    Problem B:Longest Ordered Subsequence A numeric sequence of ai is Ordered if a1 < a2 < ... < aN. Let the subsequence of the given numeric sequence (a1, a2, ..., aN) be any sequence (ai1, ai2, ..., aiK), where 1 <= i1 < i2 < ... < iK <= N. For example, sequence (1, 7, 3, 5, 9, 4, 8) has Ordered subsequences, e. g., (1, 7), (3, 4, 8) and many others. All longest Ordered subsequences are of length 4, e. g., (1, 3, 5, 8).

    标签: Subsequence sequence Problem Longest

    上传时间: 2016-12-08

    上传用户:busterman

  • Listas ordenadas [Ordered list]

    Listas ordenadas [Ordered list]

    标签: ordenadas Ordered Listas list

    上传时间: 2014-01-09

    上传用户:waitingfy

  • A certification path is an Ordered list of certificates starting with a certificate issued by the re

    A certification path is an Ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.

    标签: certification certificates certificate starting

    上传时间: 2017-07-31

    上传用户:清风冷雨

  • Each arc of a binary-state network has good/bad states. The system reliability, the probability tha

    Each arc of a binary-state network has good/bad states. The system reliability, the probability that source s communicates with sink t, can be computed in terms of minimal paths (MPs). An MP is an Ordered sequence of arcs from s to t that has no cycle. Note that a minimal path is different from the so-called minimum path. The latter is a path with minimum cost.

    标签: binary-state reliability probability network

    上传时间: 2015-12-04

    上传用户:xcy122677

  • Many of the designations used by manufacturers and sellers to distinguish their products are claime

    Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison Wesley Longman Inc., was aware of a trademark claim, the designations have been printed in initial caps or all caps. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers discounts on this book when Ordered in quantity for special sales. For more information, please contact:

    标签: manufacturers designations distinguish products

    上传时间: 2017-01-23

    上传用户:woshiayin

  • The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesi

    The BNL toolbox is a set of Matlab functions for defining and estimating the parameters of a Bayesian network for discrete variables in which the conditional probability tables are specified by logistic regression models. Logistic regression can be used to incorporate restrictions on the conditional probabilities and to account for the effect of covariates. Nominal variables are modeled with multinomial logistic regression, whereas the category probabilities of Ordered variables are modeled through a cumulative or adjacent-categories response function. Variables can be observed, partially observed, or hidden.

    标签: estimating parameters functions defining

    上传时间: 2014-12-05

    上传用户:天诚24

  • The primary goal of MySQL and Java Developer’s Guide is to provide a comprehensive approach to writ

    The primary goal of MySQL and Java Developer’s Guide is to provide a comprehensive approach to writing code from a Java application to a MySQL database using the industry standard: JDBC. As you will see later in this Introduction, the chapter titles indicate what area of database connectivity and manipulation they cover. The chapters are Ordered to reflect the JDBC specification, but we aren’t here to simply describe the specification.

    标签: comprehensive Developer approach primary

    上传时间: 2014-01-13

    上传用户:lnnn30