dwr.xml說明文檔。配置文件init部分聲明那些用于建立遠(yuǎn)程bean和在方法調(diào)用中轉(zhuǎn)換bean的類.這部分是可選擇性配置的,多數(shù)情況下可以不必使用它,如果你想定義一個(gè)新的creator或者converter那么就必須在部分中聲明,but do double check on the ones that are currently available first.
標(biāo)簽: bean creator conv init
上傳時(shí)間: 2014-02-14
上傳用戶:偷心的海盜
大學(xué)時(shí)的編譯大作業(yè),是對(duì)LL(1)語法的分析過程,會(huì)產(chǎn)生first集,follow集和預(yù)測(cè)分析表!
上傳時(shí)間: 2014-01-03
上傳用戶:VRMMO
學(xué)編譯原理時(shí)寫的一個(gè)語法分析程序 分類:C/C++技術(shù)交流 一.[目的要求] ① 對(duì)輸入文法,由程序自動(dòng)構(gòu)造FIRST FOLLOW集 ② 對(duì)輸入文法,由程序自動(dòng)生成它的LL(1)分析表; ③ 對(duì)于給定的輸入串,應(yīng)能判斷識(shí)別該串是否為給定文法的句型。 二.[題目分析] 該程序可分為如下幾步: (1)讀入文法 (2)判斷正誤 (3)若無誤,判斷是否為L(zhǎng)L(1)文法 (4)若是,構(gòu)造分析表; (5)由總控算法判斷輸入符號(hào)串是否為該文法的句型。
上傳時(shí)間: 2016-12-05
上傳用戶:1101055045
Good morning, dear teachers. I am very glad to be here for your interview. my name is xx.I am 21 years old. I come from Dafang, a small town of Guizhou province. My undergraduate period will be accomplished in East China Jiaotong University. I major in electrical engineering and automation. I am interesting in computer, especially in program design. I am a hard study student, especially in the things which I interesting in. I am a person with great perseverance. During the days I preparing for the postgraduate examination, I insist on study for more than 10 hours every day. Just owing to this, I could pass the first examination finally. I am also a person with great ambition.
標(biāo)簽: interview teachers morning Good
上傳時(shí)間: 2014-01-11
上傳用戶:釣鰲牧馬
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
標(biāo)簽: cryptography literature has Secrecy
上傳時(shí)間: 2016-12-08
上傳用戶:fxf126@126.com
軟件簡(jiǎn)介:HI-TECH PICC 是一款高效的C編譯器,支持Microchip PICmicro 10/12/14/16/17系列控制器。是一款強(qiáng)勁的標(biāo)準(zhǔn)C編譯器,完全遵守ISO/ANSI C,支持所有的數(shù)據(jù)類型包括24 and 32 bit IEEE 標(biāo)準(zhǔn)浮點(diǎn)類型。智能優(yōu)化產(chǎn)生高質(zhì)量的代碼。屬于第三方開發(fā)工具。能和MPLAB整合,內(nèi)嵌開發(fā)環(huán)境(HI-TIDE)。 Hi-tech PICC Compiler v8.注冊(cè)碼 Serial: HCPIC-88888 First Name: ONE Last Name: TWO Company Name:ONE TWO Registration: 任意填,但一定要填 Activation: NPCBACMJKLPCADKLOEDBFPIOCIBAEIDI
標(biāo)簽: HI-TECH PICC 軟件 C編譯器
上傳時(shí)間: 2016-12-16
上傳用戶:Andy123456
gcclib This gcc 1.40 suits for Linux kernel 0.11 - 0.95 Installtion hints ----------------- This suit contains include.taz, local.taz and this README file. You must download the bootimage and rootimage and install them first. The include.taz contains all the include files for using with gcc 1.40. The local.taz contains all the gcc tools & libs stored in two sepearted directories: /usr/local/lib /usr/local/bin You should copy the linux/ asm/ sys/ subdirectories into the include directory from the corresponding kernel source. Installation ------------ Goto the /usr directory. Untar the include.taz to the directory /usr/include. Untar the local.taz to the directory /usr/local. That s it! Example: -------- cd /usr tar zxvf include.taz tar zxvf local.taz
標(biāo)簽: Installtion gcclib kernel Linux
上傳時(shí)間: 2014-03-12
上傳用戶:源碼3
Batch version of the back-propagation algorithm. % Given a set of corresponding input-output pairs and an initial network % [W1,W2,critvec,iter]=batbp(NetDef,W1,W2,PHI,Y,trparms) trains the % network with backpropagation. % % The activation functions must be either linear or tanh. The network % architecture is defined by the matrix NetDef consisting of two % rows. The first row specifies the hidden layer while the second % specifies the output layer. %
標(biāo)簽: back-propagation corresponding input-output algorithm
上傳時(shí)間: 2016-12-27
上傳用戶:exxxds
% Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is possible to use regularization by % weight decay. Also pruned (ie. not fully connected) networks can % be trained. % % Given a set of corresponding input-output pairs and an initial % network, % [W1,W2,critvec,iteration,lambda]=marq(NetDef,W1,W2,PHI,Y,trparms) % trains the network with the Levenberg-Marquardt method. % % The activation functions can be either linear or tanh. The % network architecture is defined by the matrix NetDef which % has two rows. The first row specifies the hidden layer and the % second row specifies the output layer.
標(biāo)簽: Levenberg-Marquardt desired network neural
上傳時(shí)間: 2016-12-27
上傳用戶:jcljkh
Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.
標(biāo)簽: recursive prediction algorithm Gauss-Ne
上傳時(shí)間: 2016-12-27
上傳用戶:ljt101007
蟲蟲下載站版權(quán)所有 京ICP備2021023401號(hào)-1