-
-
[
Matlab]
WiSNAP_1.01_04-15-05.zip
... wireless image sensornetworks. It allows researchers and developers of such networksto investigate, design, and evaluate algorithms and applicationsusing real target hardware. WiSNAP offers standardized andeasy-to-use Application Program Interfaces (APIs ...
-
-
-
-
[
Visual C++ (VC++)]
pa2_finished.zip
Spell-Checker This program is implements by using AVL Tree algorithms. Its mainly implement by five functions which include AVL_insert, AVL_remove, AVL_destroy, AVL_findNearest, and AVL_print. The algorithm for the function of AVL_insert and AVL_remove, ...
-
[
PDF]
Semantic_Session_Analysis_for_Web_Usage_Mining.rar
... used to identi. ing which active session a request should belong to. The corn-petitive method is applied to determine the end of the sessions. Compared with other algorithms, more successfu1 sessions are additionally detected by semantic outlier analysis.
-
[
Python]
kcf_crypt_test.zip
... document to show how to use DES to encrypt and decrypt. Here also includes source codes for performance evaluation of the algorithms. This experimental program explore all this issue and may be helpful for some one who using python for doing encryption ...
-
-
-