Distributed symmetric Key Management for Mobile Ad hoc Networks
标签: Distributed Management symmetric Networks
上传时间: 2013-12-21
上传用户:ynzfm
QR ALGORITHM To obtain the eigenvalues of a symmetric, tridiagonal n by n matrix
标签: eigenvalues tridiagonal ALGORITHM symmetric
上传时间: 2014-01-15
上传用户:凌云御清风
computes the eigenvalues of a symmetric tridiagonal * matrix T. The user may ask for all eigenvalues, all eigenvalues in the half-open interval (VL, VU], or the IL-th through IU-th eigenvalues.
标签: T. eigenvalues tridiagonal eigenvalue
上传时间: 2014-01-21
上传用户:CSUSheep
a software code for computing selected eigenvalues of large sparse symmetric matrices
标签: eigenvalues computing symmetric software
上传时间: 2016-02-25
上传用户:athjac
Simulated annealing (SA) for the symmetric Euclidean TSP
标签: Simulated Euclidean annealing symmetric
上传时间: 2014-11-27
上传用户:极客
The Molgedey and Schuster decorrelation algorithm, having square mixing matrix and no noise . Truncation is used for the time shifted matrix, and it is forced to be symmetric . The delay Tau is estimated . The number of independent components are calculated using Bayes Information Criterion (BIC), with PCA for dimension reduction.
标签: decorrelation and algorithm Molgedey
上传时间: 2013-12-13
上传用户:c12228
Computes estimates for the number of forests of a graph, input as a 0-1 incidence matrix. Notes: Compile in C++, "g++ -o span_forest span_forest.c". The program does not demand that the matrix is symmetric with 0 diagonal, but uses only the upper triangular part.
标签: estimates incidence Computes forests
上传时间: 2013-12-26
上传用户:com1com2
平均因子分解法,适用于正定矩阵First, let s recall the definition of the Cholesky decomposition: Given a symmetric positive definite square matrix X, the Cholesky decomposition of X is the factorization X=U U, where U is the square root matrix of X, and satisfies: (1) U U = X (2) U is upper triangular (that is, it has all zeros below the diagonal). It seems that the assumption of positive definiteness is necessary. Actually, it is "positive definite" which guarantees the existence of such kind of decomposition.
标签: 分解
上传时间: 2013-12-24
上传用户:啊飒飒大师的
zemax源码: This DLL models an anamorphic aspheric surface. This surface is essentially an even aspheric surface with different terms for the x and y directions. The sag is given by: Z = ((CX*x*x)+(CY*y*y)) / (1 + sqrt(1-((1+KX)*CX*CX*x*x)-((1+KY)*CY*CY*y*y))) + AR*( (1 - AP)*x*x + (1 + AP)*y*y )^2 + BR*( (1 - BP)*x*x + (1 + BP)*y*y )^3 + CR*( (1 - CP)*x*x + (1 + CP)*y*y )^4 + DR*( (1 - DP)*x*x + (1 + DP)*y*y )^5 Note the terms AR, BR, CR, and DR ... have units of length to the -3, -5, -7, and -9 power. The terms AP, BP, CP, and DP are dimensionless. The surface is rotationally symmetric only if AP = BP = CP = DP == 0 and CX = CY and KX = KY.
标签: surface This essentially anamorphic
上传时间: 2015-07-25
上传用户:lht618
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.
标签: Programming developers for important
上传时间: 2015-09-03
上传用户:gundan