虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

lines

  • This file contains documentation all APIs from Palm, Inc. for Palm OS by ACCESS. It includes the API

    This file contains documentation all APIs from Palm, Inc. for Palm OS by ACCESS. It includes the API function definitions for the following product lines: Centro Treo Tungsten Zire LifeDrive The goal of this document is to provide developers with a detailed reference of all functions, parameters, and constant definitions. For more information on developing applications, refer to the document "Palm Developer Guide, Palm OS Platform" available as part of the SDK download and also separately at the PDN website.

    标签: Palm documentation contains includes

    上传时间: 2013-12-12

    上传用户:tedo811

  • All people curious about how Linux works and why it is so efficient will find answers here. After re

    All people curious about how Linux works and why it is so efficient will find answers here. After reading the book, you will find your way through the many thousands of lines of code, distinguishing between crucial data structures and secondary ones—in short, becoming a true Linux hacker.

    标签: efficient curious answers people

    上传时间: 2013-12-29

    上传用户:lifangyuan12

  • The ADC0803 family is a series of three CMOS 8-bit successive approximation A/D converters using a

    The ADC0803 family is a series of three CMOS 8-bit successive approximation A/D converters using a resistive ladder and capacitive array together with an auto-zero comparator. These converters are designed to operate with microprocessor-controlled buses using a minimum of external circuitry. The 3-State output data lines can be connected directly to the data bus.

    标签: approximation converters successive family

    上传时间: 2016-11-20

    上传用户:libenshu01

  • neural network utility is a Neural Networks library for the C++ Programmer. It is entirely object o

    neural network utility is a Neural Networks library for the C++ Programmer. It is entirely object oriented and focuses on reducing tedious and confusing problems of programming neural networks. By this I mean that network layers are easily defined. An entire multi-layer network can be created in a few lines, and trained with two functions. Layers can be connected to one another easily and painlessly.

    标签: Programmer Networks entirely network

    上传时间: 2013-12-24

    上传用户:liuchee

  • Reads/writes text as a character stream, buffering characters so as to provide for the efficient rea

    Reads/writes text as a character stream, buffering characters so as to provide for the efficient reading/writing of characters, arrays, and lines. The buffer size may be specified, or the default size may be used. The default is large enough for most purposes. In general, each read request made of a Reader causes a corresponding read request to be made of the underlying character or byte stream. It is therefore advisable to wrap a BufferedReader around any Reader whose read() operations may be costly, such as FileReaders and InputStreamReaders.

    标签: characters character buffering efficient

    上传时间: 2017-02-20

    上传用户:cjl42111

  • c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin

    c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.

    标签: fault-tolerant algorithms redundant underlyin

    上传时间: 2013-12-18

    上传用户:jkhjkh1982

  • The software is written in assembler, as it is very short and it need the speed in the main loop. T

    The software is written in assembler, as it is very short and it need the speed in the main loop. This is the heart of the synth. To be precise, it s in the 7 lines of assembler that makes up the main loop. The rest of the code is the wavetables and the communication code.

    标签: assembler the software written

    上传时间: 2017-05-17

    上传用户:yxgi5

  • This example program is the source code for the FT232BM Test Application from our Utilities page.

    This example program is the source code for the FT232BM Test Application from our Utilities page. It can be used to test the handshaking lines on FT232BM based RS232/RS485/RS422 designs. This program can also be used for programming the external EEPROM over USB in a manufacturing environment. The test features require the test cable shown on ST_232_245.pdf to be connected. Our D2XX direct drivers should be installed for this application. The code can be modified to fit your requirements. To download the application source code , click here. To download the test cable specification, click here.

    标签: Application Utilities the example

    上传时间: 2013-12-09

    上传用户:aa17807091

  • Basicaly,a chatterbot is a computer program that when you provide it with some inputs in Natural Lan

    Basicaly,a chatterbot is a computer program that when you provide it with some inputs in Natural Language (English, French ...) responds with something meaningful in that same language. Which means that the strength of a chatterbot could be directly measured by the quality of the output selected by the Bot in response to the user. By the previous description,we could deduce that a very basic chatterbot can be written in a few lines of code in a given specific programming language. Lets make our first chatterbot (notice that all the codes that will be used in this tutorial will be written in C++. Also, it is assumed that the reader is familiar wih the STL library)

    标签: chatterbot Basicaly computer Natural

    上传时间: 2017-07-30

    上传用户:小宝爱考拉

  • In numerical analysis, the secant method is a root-finding algorithm that uses a succession of roots

    In numerical analysis, the secant method is a root-finding algorithm that uses a succession of roots of secant lines to better approximate a root of a function f.

    标签: root-finding succession numerical algorithm

    上传时间: 2013-12-23

    上传用户:xuanchangri