3D shape reconstruction matlab code. It used shape from defocus technique with diffusion. You can reconstruct 3D shape with only two different depth images.
标签: shape reconstruction diffusion technique
上传时间: 2014-11-03
上传用户:851197153
it an important indruction to wimax , that explans main points that may be important to all wimax readers
标签: important wimax that indruction
上传时间: 2017-07-28
上传用户:qw12
Rotation tool, totates a single image contained in HANDLE.HANDLE can be a handle to figure, axes, or image object. This GUI is a pure imitation of ROTATEGUI from Birju Patel and uses some code from that function. However, it has extended functionalities and was re-writen using R13 syntax. Which means that it can be compiled with the V3.x compiler.
标签: HANDLE contained Rotation totates
上传时间: 2017-07-28
上传用户:han_zh
A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.
标签: certification certificates certificate starting
上传时间: 2017-07-31
上传用户:清风冷雨
While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
标签: preparation precaution publisher the
上传时间: 2013-12-09
上传用户:xc216
This general hash alogorithm implementation. This code has expamle for hash implementaio for 16bit to 64bit processor implementations
标签: This hash implementation implementaio
上传时间: 2014-02-07
上传用户:15736969615
This book is intended as a thorough introduction to both PCI and PCI-X. Is as a “companion” to the specifications. If you’re designing boards or systems using offthe-shelf PCI interface silicon, this book together with the silicon vendor’s data sheets should be sufficient for your needs. On the other hand, if your goal is to design PCI silicon, motherboards or backplanes, you will undoubtedly need to reference the specifications for additional detail.
标签: introduction companion intended thorough
上传时间: 2014-08-18
上传用户:hoperingcong
Its a project that i create. The program its like an helpdesk, that allows the user to introduce requests and manage them. The data is saved in .dat files and in .txt files. The main file, the u should run is: n2006131015_Main
标签: that introduce helpdesk project
上传时间: 2013-12-07
上传用户:1159797854
ds18b20 digitsl 1-wire thermometer with programmable resolution code for initialization write and read and convert temperature functions
标签: initialization programmable thermometer resolution
上传时间: 2017-08-29
上传用户:225588
Memory allocation in C Dynamic memory allocation and the structures that implement it in C are so universal that they re sometimes treated as a black box. In the real world of embedded systems, that may not be desirable or even possible.
标签: allocation structures implement Dynamic
上传时间: 2017-09-05
上传用户:阿四AIR