您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. 你好,Haskell!

  2. 若干语言特性(是什么让Haskell如此独特?):Lambda,Curry,Algebraic Data Type,Type Class,Purity, Lazy Evaluation; 对并行与并发的支持 若干例子以及性能问题 Haskell在工业界的应用
  3. 所属分类:其它

    • 发布日期:2011-04-27
    • 文件大小:2097152
    • 提供者:soloist
  1. Algebraic Numbers and Algebraic Functions by E.Artin

  2. A large number of mathematical books begin as lecture notes; but, since mathematicians are busy, and since the labor required to bring lecture notes up to the level of perfection which authors and the public demand of formally published books is ver
  3. 所属分类:专业指导

    • 发布日期:2011-05-10
    • 文件大小:8388608
    • 提供者:fanbird2008
  1. Elements of Algebraic Geometry by E.Artin

  2. These notes are based entirely on lectures given by Professor Artin during the spring semester-l955 at New York University. This part of the notes does not depend in any way on part I",but does assume a certain amount of familiarity witq the basic c
  3. 所属分类:专业指导

    • 发布日期:2011-05-10
    • 文件大小:3145728
    • 提供者:fanbird2008
  1. Guide to Elliptic Curve Cryptography by D. Hankerson, A. Menezes

  2. The study of elliptic curves by algebraists, algebraic geometers and number theorists dates back to the middle of the nineteenth century. There now exists an extensive literature that describes the beautiful and elegant properties of these marvelous
  3. 所属分类:专业指导

    • 发布日期:2011-05-10
    • 文件大小:4194304
    • 提供者:fanbird2008
  1. Fast sparse matrix multiplication

  2. 最快的稀疏矩阵乘法运算,英文版 Let A and B two n £ n matrices over a ring R (e.g., the reals or the integers) each containing at most m non-zero elements. We present a new algorithm that multiplies A and B using O(m0:7n1:2 + n2+o(1)) algebraic operations (i.e., mu
  3. 所属分类:C/C++

    • 发布日期:2011-06-29
    • 文件大小:188416
    • 提供者:kotomifi
  1. Lothaire M. Algebraic combinatorics on words

  2. 有关组合字理论的代数方法之集大成. 组合字是组合数学中新近兴起的一个分支,虽然目前其应用前景并不清晰,更像是数学家的游戏,但是按其现在的发展,日后可能会在组合理论和计算机科学中有一定的发展。目前,国内没有这方面的研究者。
  3. 所属分类:专业指导

    • 发布日期:2011-07-03
    • 文件大小:4194304
    • 提供者:sunnymath
  1. Fundamentals Of Cryptology

  2. The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulner
  3. 所属分类:其它

    • 发布日期:2011-07-21
    • 文件大小:2097152
    • 提供者:kevin___lee
  1. G.729标准文档及参考代码

  2. G.729标准文档及参考代码 This Recommendation contains the descr iption of an algorithm for the coding of speech signals at 8 kbit/s using Conjugate-Structure Algebraic-Code-Excited Linear-Prediction (CS-ACELP). This coder is designed to operate with a digital
  3. 所属分类:其它

    • 发布日期:2011-07-21
    • 文件大小:14680064
    • 提供者:spark_huo
  1. 国际电信联盟ITU-g729源码

  2. Fixed-point descr iption of Recommendation G.729 with ANNEX B Coding of Speech at 8 kbit/s using Conjugate-Structure Algebraic-Code-Excited Linear-Prediction (CS-ACELP) with Voice Activity Decision(VAD), Discontinuous Transmission(DTX), and Comfort
  3. 所属分类:电信

    • 发布日期:2011-08-18
    • 文件大小:115712
    • 提供者:ilubuntu
  1. 密码学算法协议c实现.pdf

  2. 加密散列函数 (消息摘要算法,MD算法)      加密散列函数   消息认证码   Keyed-hash message authentication code   EMAC (NESSIE selection MAC)   HMAC (NESSIE selection MAC; ISO/IEC 9797-1,FIPS and IETF RFC)   TTMAC 也称 Two-Track-MAC (NESSIE selection MAC; K.U.Leuven (Belgium) & de
  3. 所属分类:其它

  1. The Genetic Algorithm as a Discovery Engine: Strange Circuits and New Principles

  2. This paper examines the idea of a genetic or evolutionary algorithm being an inspirational or discovery engine. This is illustrated in the particular context of designing electronic circuits. We argue that by connecting pieces of logic together and
  3. 所属分类:其它

    • 发布日期:2011-11-14
    • 文件大小:277504
    • 提供者:luhuajcdd
  1. Basic Topology - M.A.Armstrong (English).pdf

  2. This is a topology book for undergraduates, and in writing I had two aims in mind. Firstly, to make sure the students sees a variety of different techniques and applications involving point set, geometric, and algebraic topology without delving too
  3. 所属分类:专业指导

    • 发布日期:2011-12-02
    • 文件大小:30408704
    • 提供者:fanbird2008
  1. Error Correction coding——mathematical methods and algorithms

  2. Error Correction Coding - Mathematical Methods and Algorithms (Source Files Contained).pdf Error Correction Coding Mathematical Methods and Algorithms Todd K. Moon Utah State University @ E ! C I E N C E A JOHN WILEY & SONS, INC., PUBLICATION Prefac
  3. 所属分类:C/C++

    • 发布日期:2012-03-10
    • 文件大小:48234496
    • 提供者:pengzhong52
  1. Queueing Theory

  2. Queueing Theory A Linear Algebraic Approach
  3. 所属分类:专业指导

    • 发布日期:2012-04-27
    • 文件大小:8388608
    • 提供者:lactoferrin
  1. uppaay协议验证

  2. We present a formal analysis of all different variations of accelerated heartbeat protocols presented in [M.G. Gouda and T.M. McGuire, Accelerated Heartbeat Protocols, Proc. of ICDCS’98]. We formalize the specification of the protocols both in a pro
  3. 所属分类:系统安全

    • 发布日期:2012-06-26
    • 文件大小:317440
    • 提供者:meixihan
  1. Open G.729 Initiative

  2. Open G.729 Initiative Technical Documentation VoiceAge G.729 is an 8 Kbps coder that encodes/decodes speech signals using the Conjugate-Structure Algebraic-Code-Excited-Linear-Prediction (CS-ACELP) algorithm. VoiceAge G.729 is a reduced complexity v
  3. 所属分类:C++

    • 发布日期:2012-08-11
    • 文件大小:362496
    • 提供者:zhihu008
  1. Gams-23.9.2-Cracker

  2. The General Algebraic Modeling System (GAMS) is a high-level modeling system for mathematical programming and optimization. It consists of a language compiler and a stable of integrated high-performance solvers. GAMS is tailored for complex, large s
  3. 所属分类:其它

    • 发布日期:2012-09-21
    • 文件大小:1048576
    • 提供者:zhyiwww
  1. 程序验证经典《Principles of Model Checking》

  2. Our growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twen
  3. 所属分类:其它

    • 发布日期:2012-10-22
    • 文件大小:5242880
    • 提供者:hfshgfh
  1. 程序验证经典《Principles of Model Checking》

  2. Our growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twen
  3. 所属分类:其它

    • 发布日期:2012-10-22
    • 文件大小:5242880
    • 提供者:seabamboo
  1. Mathematics of Public Key Cryptography

  2. Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subjec
  3. 所属分类:专业指导

    • 发布日期:2012-11-23
    • 文件大小:4194304
    • 提供者:fetag
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 16 »