虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

WELL-documented

  • · Develop clear, readable, WELL-documented and well-designed programs in the C Programming Language.

    · Develop clear, readable, WELL-documented and well-designed programs in the C Programming Language. · Develop software in the Unix/Linux using tools such as gcc, gdb, and make. · Locate and interpreting “man pages” applicable to application-level system programming. · Use the POSIX/Unix API to system functions to manage process and sessions as well as use signals and pipes for inter-process communication. · Understanding how synchronization might become problematic in light of concurrency. · Understand how to communicate and cooperate with a project partner.

    标签: WELL-documented well-designed Programming Language

    上传时间: 2015-08-16

    上传用户:yuchunhai1990

  • JaNet: Java Neural Network Toolkit resume: A well documented toolkit for designing and training, a

    JaNet: Java Neural Network Toolkit resume: A well documented toolkit for designing and training, and a java library for inclusion in third party programs. description: jaNet package is a java neural network toolkit, which you can use to design, test, train and optimize an ideal Neural Network for your private application. You can then include your saved network in your program using the jaNet.backprop package. The consequent documentation is only in french for the moment, but an english translation is planned. The java source code is released under GPL, and can be compiled with JDK, Symantec Cafe or MS Visual J

    标签: documented designing training Network

    上传时间: 2016-04-15

    上传用户:zhanditian

  • 智能电网安全性

    Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent WELL-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid distributionequipment; and insecure storage of a private key in distribution automation equipment. For each of theseattacks, we examine the breach, the potential threat, and secure silicon methods that, as part of acomplete security strategy, can help thwart the attacks.

    标签: 智能电网 安全性

    上传时间: 2013-10-27

    上传用户:tecman

  • The Java Cookbook is a comprehensive collection of problems, solutions, and practical examples for

    The Java Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Java. Developers will find hundreds of tried-andtrue Java "recipes" covering all of the major APIs as well as some APIs that aren t as well documented in other Java books.

    标签: comprehensive collection practical solutions

    上传时间: 2014-01-16

    上传用户:ukuk

  • This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseud

    This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseudo-random irregular low density parity check matrix is based on Radford M. Neal’s programs collection, which can be found in [1]. While Neal’s collection is well documented, in my opinion, C source codes are still overwhelming, especially if you are not knowledgeable in C language. My software is written for MATLAB, which is more readable than C. You may also want to refer to another MATLAB based LDPC source codes in [2], which has different flavor of code-writing style (in fact Arun has error in his log-likelihood decoder).

    标签: LDPC introduction simulation software

    上传时间: 2014-01-14

    上传用户:大融融rr

  • This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseud

    This LDPC software is intended as an introduction to LDPC codes computer based simulation. The pseudo-random irregular low density parity check matrix is based on Radford M. Neal’s programs collection, which can be found in [1]. While Neal’s collection is well documented, in my opinion, C source codes are still overwhelming, especially if you are not knowledgeable in C language. My software is written for MATLAB, which is more readable than C. You may also want to refer to another MATLAB based LDPC source codes in [2], which has different flavor of code-writing style (in fact Arun has error in his log-likelihood decoder).

    标签: LDPC introduction simulation software

    上传时间: 2014-12-05

    上传用户:change0329

  • this is a java api,can help JAVAProgramers to study well.

    this is a java api,can help JAVAProgramers to study well.

    标签: JAVAProgramers study this help

    上传时间: 2015-05-12

    上传用户:2525775

  • Unzip this file into a writeable directory. You should end up with a "Geocode" project, as well as

    Unzip this file into a writeable directory. You should end up with a "Geocode" project, as well as Bitmaps and TestData directories. This sample geocodes single-match zip codes, entered by the user, or a batch-match of a table of zips (and other info) against a point shapefile. The point data shapefile consists of 41859 point features from 1996 GDT data, in decimal degrees. The table of zips that can be used in the batch match consists of 38 records, entitled "few_zips.dbf". More specifcs are found at the top of each form and are provided throughout the code.

    标签: directory writeable Geocode project

    上传时间: 2013-12-19

    上传用户:wangchong

  • BIOSIG is an open source software library for biomedical signal processing. Library works well with

    BIOSIG is an open source software library for biomedical signal processing. Library works well with Octave and Matlab. Special emphasis is put on EEG/MEG/ECoG, but also other types of biosignals like ECG, EMG, etc. are supported.

    标签: biomedical processing software Library

    上传时间: 2013-12-29

    上传用户:ruan2570406

  • This text introduces the spirit and theory of hacking as well as the science behind it all it also p

    This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。

    标签: introduces the hacking science

    上传时间: 2013-12-28

    上传用户:离殇