Asymptotic growth of functions are important for complexity analysis. This short documentation discuss the characteristics of the AGF.
资源简介:Asymptotic growth of functions are important for complexity analysis. This short documentation discuss the characteristics of the AGF.
上传时间: 2017-06-04
上传用户:cylnpy
资源简介:The first two functions are useful for creating a blank image of the specified parameters. A possible use is in functions that require a pointer to a result. The clone function performs an exact copy of the IplImage* parameter
上传时间: 2013-12-21
上传用户:teddysha
资源简介:The toolbox solves a variety of approximate modeling problems for linear static models. The model can be parameterized in kernel, image, or input/output form and the approximation criterion, called misfit, is a weighted norm between the giv...
上传时间: 2013-12-20
上传用户:15071087253
资源简介:Altera® provides various tools for development of hardware and software for embedded systems. This handbook complements the primary documentation for these tools by describing how to most effectively use the tools. It recommends design...
上传时间: 2017-06-15
上传用户:haoxiyizhong
资源简介:Introduction A shared library is a collection of functions that are available for use by one or more applications running on a system. On Windows operating systems, the library is compiled into a dynamic link library (.dll) file. At run-ti...
上传时间: 2014-01-26
上传用户:2467478207
资源简介:UDDI for weblgoci In the main function, there is a list of functions calls that are commented. Each of those function calls tests a functionality of the UDDI api. To run a test, simply uncomment one of the function calls, and then compile t...
上传时间: 2017-04-24
上传用户:love_stanford
资源简介:来自澳大利亚Qeensland大学的计算机视觉Matlab工具箱。 This Toolbox provides a number of functions that are useful in computer vision, machine vision and related areas. It is a somewhat eclectic collection reflecting the author s personal i...
上传时间: 2015-09-30
上传用户:qb1993225
资源简介:Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algori...
上传时间: 2014-11-09
上传用户:1109003457
资源简介:Set of functions that can be used for interpolation of scattered data of any dimensionality.
上传时间: 2013-12-09
上传用户:maizezhen
资源简介:Lamb problem: The analytical solution of vertical point source. This is very important for synthetic modeling
上传时间: 2013-12-25
上传用户:hongmo