点击切换搜索课件文库搜索结果(1298)
文档格式:PPT 文档大小:148.5KB 文档页数:9
Unit 14 Flexible trade Letter 1 Take up:从事 Undertake:承担,保证 The down payment for the production line can not be higher than 10%of the total value; Repayment:偿还的款项
文档格式:PDF 文档大小:14.06KB 文档页数:8
TAC Handout written by Maggie Johnson and revised by me. Three address code Three-address code(TAC) will be the intermediate representation used in our Decaf compiler. It is essentially a generic assembly language that falls in the lower-end of the mid-level IRs. Some variant of 2, 3 or 4 address code is fairly commonly used as an IR, since it maps well to most
文档格式:PPT 文档大小:954.5KB 文档页数:77
FLIP-FLOPS Flip-flops are digital devices that have the ability to store binary information after the excitation input has changed. They are considered to be the basic memory cell for the majority of electronic binary data storage applications. This section explores the flip-flop from a functional perspective
文档格式:PPT 文档大小:126KB 文档页数:9
Chapter 16 Objectives After you have read and studied this chapter, you should be able to Write recursive algorithms for mathematic functions and nonnumerical operations. Decide when to use recursion and when not to. Describe the recursive quicksort algorithm and explain how its performance is better than selection and bubble sort algorithms
文档格式:PPT 文档大小:190.5KB 文档页数:17
Chapter 14 Objectives After you have read and studied this chapter, you should be able to Write programs that are easily extensible and modifiable by applying polymorphism in program design. Define reusable classes based on inheritance and abstract classes and abstract methods. Define methods using the protected modifier. Parse strings using a StringTokenizer object. 2000 McGraw-Hill
文档格式:PPT 文档大小:119.5KB 文档页数:12
Chapter 12 Objectives After you have read and studied this chapter, you should be able to Describe four different object categories and use them effectively in designing classes. Define a package and place reusable classes in it. Write a method that calls the superclass's method explicitly by using the reserved word super
文档格式:PPT 文档大小:863KB 文档页数:45
Chapter 10 Objectives After you have read and studied this chapter, you should be able to Perform linear and binary search algorithms on small arrays. Determine whether a linear or binary search is more effective for a given situation. Perform selection and bubble sort algorithms. Describe the heapsort algorithm and show how its performance is superior to the other two algorithms. Apply basic sorting algorithms to sort an array of objects
文档格式:PDF 文档大小:135.7KB 文档页数:9
Nash equilibrium has undoubtedly proved to be the most influential idea in game theory. enabled fundamental breakthroughs in economics and the social sciences. Its development was a major intellectual achievement; what is perhaps more important, it Recent foundational research has emphasized the subtleties in the interpretation of Nash equilibrium. This lecture deals with the technical details of equilibrium analysis, but also with these interpretational issues. However, a more precise appraisal of the situation must
文档格式:PDF 文档大小:457.83KB 文档页数:28
认识黑客(Hacker) Hacker起源 Hack:(1) cut roughly or clumsily,chop(砍、辟) (2)horse may be hired (3) person paid to do hard and uninteresting work as a writer 引伸义:干了一件漂亮的事。 Hacker:也指恶作剧 Hacker differs from Cracker
文档格式:PDF 文档大小:19.31KB 文档页数:5
DESIGN METHODOLOGY: CHOICE OF PROCESS TYPE goaL-- Choose the process type appropriate to the plant to be designed
首页上页115116117118119120121122下页末页
热门关键字
搜索一下,找到相关课件或文库资源 1298 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有