Computes the hafnian of a nonnegative integer matrix. Notes: Copy hafnian.c to main.c, in the same directory as Rothberg s code (see above). You can download the .tar directory with the code weighted-match.tar here. Then "make" the codes (this codes are in C, not C++). The program is then run by the command "wmatch".
标签: hafnian nonnegative the Computes
上传时间: 2013-12-23
上传用户:lmeeworm
关于NETFLOW信息分析的软件。 is a netflow analyzer. It uses MySQL database to store accounting information. Filters, used in the JFlowAnalyzer, allows very flexible classificate any kind of traffic and store it in the differend fields in database
标签: information accounting analyzer database
上传时间: 2014-01-27
上传用户:kr770906
the booth algorithm to implement the 32bits multiplication.
标签: multiplication the algorithm implement
上传时间: 2014-01-13
上传用户:asdkin
Apress.Peer.to.Peer.with.VB.Dot.NET.eBook-LiB.chm 一本关于用VB.NET如何开发P2P程序的书,英文原版,非常不错
上传时间: 2013-12-17
上传用户:zhaoq123
是一本好书,verilog HDL,a guide to digital design and synthesis
标签: synthesis verilog digital design
上传时间: 2015-07-14
上传用户:熊少锋
softIce is a good tool for windows to debug . This is a book which introduce many commond and teach us how to us the commonds in softice
标签: introduce softIce commond windows
上传时间: 2014-01-07
上传用户:13517191407
C function to convert strings.一个实用的C处理函数。
标签: function convert strings to
上传时间: 2014-01-22
上传用户:极客
win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。
上传时间: 2015-07-14
上传用户:坏坏的华仔
b tree how to operate on b tr
上传时间: 2014-01-20
上传用户:开怀常笑
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar