点击切换搜索课件文库搜索结果(11725)
文档格式:PDF 文档大小:203.47KB 文档页数:32
Ch. 3 Estimation 1 The Nature of statistical Inference It is argued that it is important to develop a mathematical model purporting to provide a generalized description of the data generating process. A prob bility model in the form of the parametric family of the density functions p=f(:0),0E e and its various ramifications formulated in last chapter
文档格式:PPT 文档大小:569KB 文档页数:104
Main idea LL(1) Parsing uses an explicit stack rather than recursive calls to perform a parse An example: – a simple grammar for the strings of balanced parentheses: S→(S) S∣ε The following table shows the actions of a top￾down parser given this grammar and the string ( )
文档格式:PDF 文档大小:127.61KB 文档页数:11
Ch. 22 Unit root in Vector Time series 1 Multivariate Wiener Processes and multivari- ate FCLT Section 2.1 of Chapter 21 described univariate standard Brownian motion W(r) as a scalar continuous-time process(W: rE0, 1-R). The variable W(r) has a N(O, r)distribution across realization, and for any given realization, w(r) is continuous function of the date r with independent increments. If a set of k such independent processes, denoted
文档格式:PDF 文档大小:180.29KB 文档页数:16
The principal-agent problem The principal-agent problem describes a class of interactions between two parties to a contract, an agent and a principal. The legal origin of these terms suggests that the principal engages the agent to act on his(the principals) behalf. In economic applications, the agent is not necessarily an employe of the principal. In fact, which of two individuals is regarded as the agent and which as the principal depends on the nature of the incentive problem
文档格式:PDF 文档大小:145.78KB 文档页数:19
a weakness of hashing Problem: For any hash function h, a set of keys exists that can cause the average access time of a hash table to skyrocket An adversary can pick all keys from tkeU: h(k)=i for some slot i IDEA Choose the hash function at random independently of the keys
文档格式:PDF 文档大小:251.95KB 文档页数:29
Balanced search trees Balanced search tree a search-tree data structure for which a height of o(g n)is guaranteed when implementing a dynamic set of n items
文档格式:PPT 文档大小:427KB 文档页数:35
1. Intel 8255A是一个通用的可编程的并行接口芯片,内部有2个8位I/O口(A、B),两个4位I/O口(PC7~4、PC3~0). 2. 通过编程可设置3种工作方式,可适用于CPU与I/O设备之间的多种数据传送方式的要求
文档格式:PDF 文档大小:253.76KB 文档页数:30
Graphs(review) Definition. a directed graph(digraph G=(, E)is an ordered pair consisting of a set y of vertices(singular: vertex) a sete c× of edges. In an undirected graphG=(V, E), the edge set e consists of unordered pairs of vertices In either case, we have El=O(v2).Moreover if G is connected, then E2v-l, which
文档格式:PPT 文档大小:363.5KB 文档页数:10
一、平面极坐标 设一质点在Oxy平面内运动,某时刻它位于点A.矢径与x轴之间的夹角为θ.于是质点在点A的位置可由A(r,)来确定以(r,0)为坐标的参考系为平面极坐标系
文档格式:PPT 文档大小:384KB 文档页数:29
一、概率的定义 概率的公理化定义设E是随机试验,S是它的 样本空间,对于E的每一个事件A赋予一个实数P(A) 称之为事件A的概率,如果它满足下列三个条件:
首页上页159160161162163164165166下页末页
热门关键字
搜索一下,找到相关课件或文库资源 11725 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有