虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Range

Range是一种计算机术语,在Excel中,Range集合代表某一单元格、某一行、某一列、某一选定区域(该区域可包含一个或若干连续单元格区域),或者某一三维区域。可用Range(arg)(其中arg为区域名称)来返回代表单个单元格或单元格区域的Range对象。另外有同名汽车。
  • The Art of C++ by Herbert Schildt ISBN:0072255129 McGraw-Hill/Osborne © 2004 The author of

    The Art of C++ by Herbert Schildt ISBN:0072255129 McGraw-Hill/Osborne © 2004 The author of this text applies C++ to a wide variety of high-powered, practical applications, each focusing on a different aspect of the language. Examples Range from a garbage collector subsystem and a thread control panel to AI-based searches and more.

    标签: McGraw-Hill 0072255129 The Herbert

    上传时间: 2015-07-18

    上传用户:lx9076

  • The Linux kernel is one of the most interesting yet least understood open-source projects. It is als

    The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Development. This authoritative, practical guide will help you better understand the Linux kernel through updated coverage of all the major subsystems, new features associated with Linux 2.6 kernel and insider information on not-yet-released developments. You ll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide Range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development.

    标签: interesting open-source understood projects

    上传时间: 2015-07-26

    上传用户:mpquest

  • THIS is really two books in one: a tutorial and a reference manual for JDBC, the application program

    THIS is really two books in one: a tutorial and a reference manual for JDBC, the application programming interface that makes it possible for programmers to access databases from Java. The goal is to be useful to a wide Range of readers, from database novices to database experts. Therefore, we have arRanged the book so that information needed only by experts is separated out from the basic material. We hope that driver developers as well as application programmers and MIS administrators will find what they need. Because different sections are aimed at different audiences, we expect that few people will read every page. We have sometimes duplicated explanations in an effort to make reading easier for those who do not read all sections. This book will be most helpful to those who have some knowledge of the Java programming language and SQL (Structured Query Language), but one doesn t need to be an expert in either to understand the basic concepts presented here.

    标签: application reference tutorial program

    上传时间: 2015-08-04

    上传用户:zhengzg

  • Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide Range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

    标签: Programming developers for important

    上传时间: 2015-09-03

    上传用户:gundan

  • function y_cum = cum2x (x,y, maxlag, nsamp, overlap, flag) %CUM2X Cross-covariance % y_cum = cum2x

    function y_cum = cum2x (x,y, maxlag, nsamp, overlap, flag) %CUM2X Cross-covariance % y_cum = cum2x (x,y,maxlag, samp_seg, overlap, flag) % x,y - data vectors/matrices with identical dimensions % if x,y are matrices, rather than vectors, columns are % assumed to correspond to independent realizations, % overlap is set to 0, and samp_seg to the row dimension. % maxlag - maximum lag to be computed [default = 0] % samp_seg - samples per segment [default = data_length] % overlap - percentage overlap of segments [default = 0] % overlap is clipped to the allowed Range of [0,99].

    标签: cum2x y_cum Cross-covariance function

    上传时间: 2015-09-08

    上传用户:xieguodong1234

  • The LM158 series consists of two independent, high gain, internally frequency compensated operatio

    The LM158 series consists of two independent, high gain, internally frequency compensated operational amplifiers which were designed specifically to operate from a single power supply over a wide Range of voltages. Operation from split power supplies is also possible and the low power supply current drain is independent of the magnitude of the power supply voltage.

    标签: compensated independent internally frequency

    上传时间: 2014-01-09

    上传用户:zwei41

  • 一个简单的SPI IP核

    一个简单的SPI IP核,SPI Core Specifications 可以从说明文档中找到! The simple Serial Peripheral Interface core is an enhanced version of the Serial Peripheral Interface found on Motorola s M68HC11 family of CPUs. The Serial Peripheral Interface is a serial, synchronous communication protocol that requires a minimum of 3 wires. FEATURES: · Compatible with Motorola’s SPI specifications · Enhanced M68HC11 Serial Peripheral Interface · 4 entries deep read FIFO · 4 entries deep write FIFO · Interrupt generation after 1, 2, 3, or 4 transferred bytes · 8 bit WISHBONE RevB.3 Classic interface · Operates from a wide Range of input clock frequencies · Static synchronous design · Fully synthesizable

    标签:

    上传时间: 2015-09-17

    上传用户:TRIFCT

  • Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement

    Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement formany computer vision applications. One of the key fac-ors in enhancing the robustness of dynamic scene analy-sis that of accurate and reliable means for shadow de-ection. Shadowdetectioniscriticalforcorrectobjectde-ection in image sequences. Many algorithms have beenproposed in the literature that deal with shadows. How-ever,acomparativeevaluationoftheexistingapproachesisstill lacking. In this paper, the full Range of problems un-derlyingtheshadowdetectionareidenti?edanddiscussed.Weclassifytheproposedsolutionstothisproblemusingaaxonomyoffourmainclasses, calleddeterministicmodeland non-model based and statistical parametric and non-parametric. Novelquantitative(detectionanddiscrimina-ionaccuracy)andqualitativemetrics(sceneandobjectin-dependence,?exibilitytoshadowsituationsandrobustnesso noise) are proposed to evaluate these classes of algo-rithms on a benchmark suite of indoor and outdoor videosequences.

    标签: Robustnesstochangesinillumination conditionsaswellas perspectives requirement

    上传时间: 2014-01-23

    上传用户:whenfly

  • This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combin

    This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy consumption and portability. This technology has applications in a wide Range of fixed and portable secured devices including access control systems, cash terminals, public transport, PCs, PDAs, Smart Card readers and motor vehicles. It can be used in almost any situation where rapid, reliable and accurate identification or authentication of an individual is required.

    标签: fingerprint FingerChip technology electronic

    上传时间: 2013-12-27

    上传用户:h886166

  • This paper presents an interactive technique that produces static hairstyles by generating individu

    This paper presents an interactive technique that produces static hairstyles by generating individual hair strands of the desired shape and color, subject to the presence of gravity and collisions. A variety of hairstyles can be generated by adjusting the wisp parameters, while the deformation is solved efficiently, accounting for the effects of gravity and collisions. Wisps are generated employing statistical approaches. As for hair deformation, we propose a method which is based on physical simulation concepts but is simplified to efficiently solve the static shape of hair. On top of the statistical wisp model and the deformation solver, a constraint-based styler is proposed to model artificial features that oppose the natural flow of hair under gravity and hair elasticity, such as a hairpin. Our technique spans a wider Range of human hairstyles than previously proposed methods, and the styles generated by this technique are fairly realistic.

    标签: interactive hairstyles generating technique

    上传时间: 2013-12-20

    上传用户:sssl