dwr.xml说明文档。配置文件init部分声明那些用于建立远程bean和在方法调用中转换bean的类.这部分是可选择性配置的,多数情况下可以不必使用它,如果你想定义一个新的creator或者converter那么就必须在部分中声明,but do double check on the ones that are currently available first.
上传时间: 2014-02-14
上传用户:偷心的海盗
大学时的编译大作业,是对LL(1)语法的分析过程,会产生first集,follow集和预测分析表!
上传时间: 2014-01-03
上传用户:VRMMO
学编译原理时写的一个语法分析程序 分类:C/C++技术交流 一.[目的要求] ① 对输入文法,由程序自动构造FIRST FOLLOW集 ② 对输入文法,由程序自动生成它的LL(1)分析表; ③ 对于给定的输入串,应能判断识别该串是否为给定文法的句型。 二.[题目分析] 该程序可分为如下几步: (1)读入文法 (2)判断正误 (3)若无误,判断是否为LL(1)文法 (4)若是,构造分析表; (5)由总控算法判断输入符号串是否为该文法的句型。
上传时间: 2016-12-05
上传用户:1101055045
Good morning, dear teachers. I am very glad to be here for your interview. my name is xx.I am 21 years old. I come from Dafang, a small town of Guizhou province. My undergraduate period will be accomplished in East China Jiaotong University. I major in electrical engineering and automation. I am interesting in computer, especially in program design. I am a hard study student, especially in the things which I interesting in. I am a person with great perseverance. During the days I preparing for the postgraduate examination, I insist on study for more than 10 hours every day. Just owing to this, I could pass the first examination finally. I am also a person with great ambition.
标签: interview teachers morning Good
上传时间: 2014-01-11
上传用户:钓鳌牧马
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com
软件简介:HI-TECH PICC 是一款高效的C编译器,支持Microchip PICmicro 10/12/14/16/17系列控制器。是一款强劲的标准C编译器,完全遵守ISO/ANSI C,支持所有的数据类型包括24 and 32 bit IEEE 标准浮点类型。智能优化产生高质量的代码。属于第三方开发工具。能和MPLAB整合,内嵌开发环境(HI-TIDE)。 Hi-tech PICC Compiler v8.注册码 Serial: HCPIC-88888 First Name: ONE Last Name: TWO Company Name:ONE TWO Registration: 任意填,但一定要填 Activation: NPCBACMJKLPCADKLOEDBFPIOCIBAEIDI
上传时间: 2016-12-16
上传用户:Andy123456
gcclib This gcc 1.40 suits for Linux kernel 0.11 - 0.95 Installtion hints ----------------- This suit contains include.taz, local.taz and this README file. You must download the bootimage and rootimage and install them first. The include.taz contains all the include files for using with gcc 1.40. The local.taz contains all the gcc tools & libs stored in two sepearted directories: /usr/local/lib /usr/local/bin You should copy the linux/ asm/ sys/ subdirectories into the include directory from the corresponding kernel source. Installation ------------ Goto the /usr directory. Untar the include.taz to the directory /usr/include. Untar the local.taz to the directory /usr/local. That s it! Example: -------- cd /usr tar zxvf include.taz tar zxvf local.taz
标签: Installtion gcclib kernel Linux
上传时间: 2014-03-12
上传用户:源码3
Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %
标签: back-propagation corresponding input-output algorithm
上传时间: 2016-12-27
上传用户:exxxds
% Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is possible to use regularization by % weight decay. Also pruned (ie. not fully connected) networks can % be trained. % % Given a set of corresponding input-output pairs and an initial % network, % [W1,W2,critvec,iteration,lambda]=marq(NetDef,W1,W2,PHI,Y,trparms) % trains the network with the Levenberg-Marquardt method. % % The activation functions can be either linear or tanh. The % network architecture is defined by the matrix NetDef which % has two rows. The first row specifies the hidden layer and the % second row specifies the output layer.
标签: Levenberg-Marquardt desired network neural
上传时间: 2016-12-27
上传用户:jcljkh
Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.
标签: recursive prediction algorithm Gauss-Ne
上传时间: 2016-12-27
上传用户:ljt101007