资源列表
em_covariances
- Using SAS/IML : This code uses the EM algorithm to estimate the maximum likelihood (ML) covariance matrix and mean vector in the presence of missing data. This implementation of the EM algorithm or any similar ML approach assumes that the data are
seminarpapers
- semiars The World Wide Web, which has started as a document repository, is rapidly transforming to a full fledged virtual environment that facilitates services, interaction, and com- munication. Under this light, the Semantic Web and Web 2.
123456789
- 中国中小企业互联网应用状况调杳报告: 近几年,中国互联网应用市场一直保持着快速发展,在国民经济中的地位不断提升。一 方面,个人的互联网应用市场不断发展,截至2010年末中国网民规模已达4.57亿;另一方 面,企业的互联网应用市场也逐渐步入成熟,继企业内部信息化之后,互联网成为企业发展 的又一强劲推力,互联网已经被广泛应用于企业的营销销售、客户服务、办事办公等方面。-The Chinese small and medium-sized enterprise Internet app
DEPENDABLE-AND-SECURE-COMPUTING
- this files are ieee updated doc
route
- 所谓路由就是指通过相互连接的网络把信息从源地点移动到目标地点的活动。一般来说,在路由过程中,信息至少会经过一个或多个中间节点。-about route about route about route
Physically-Based-Fluid-Simulation
- 基于物理的流体模拟近年来成为计算机动画领域的一个研究热点.回顾了该领域中基于物理的流体模拟的发展情况,总结了该研究方向所采用的各类方法,并结合各种现象的特点分门别类地详细展开其方法总体上可 以分为欧拉法和拉格朗日法,涉及的现象包括烟雾、火焰、爆炸、波浪、气泡以及自由运动界面等.最后展望了未来发 展的3个重点:细节策略、加速策略和控制策略,以使整个模拟能够更好地满足人们对真实感、实时性以及灵活性的 需求.-This paper presents a survey on the deve
rebengyanjiu
- 热泵性能的研究 发展方向 前沿动态 存在问题 解决方法 -Heat pump research books
jisuanjiqikanhexinpaiming
- 计算机核心期刊及投稿经验,给需要发表论文得同学一个参考-computer core issue
biyelunwen.doc
- 随着信息技术的飞速发展和日趋激烈的商业竞争,学校已不再满足于独立、零散的学籍管理系统化应用,学校需要的是协同工作、综合、集成化的解决方案。而网络是解决由于物理距离造成的信息交流不畅、协商沟通不便的办公瓶颈问题的最佳方式。学校网上学籍管理通过对各学生自动化要素的闭环整合,实现了工作流、信息流、知识流和学生学籍管理系统的整合管理,提供了一个科学、开放、先进的信息化学生管理平台,实现学生管理学生学籍管理,并进行远程学生办公或在家办公。学校网上学生学籍管理将人从繁琐、无序、低序、低端的工作中解放出来从事
Autonomous-Robots-and-Agents
- This special issue titled “Autonomous Robots and Agents” in the book series of “Studies in Computational Intelligence” contains the extended version of the papers selected from those presented at the 3rd International Conference on Autonomous R
Geometric-Tools-for-Computer-Graphics
- The dynamic nature of computer graphics makes it a particularly interesting area of study. Research and implementation of rendering methods respond to changes in the underlying hardware. For example, in the field of interactive rendering, the e
Ch2
- The use of fingerprints for identification has been employed in law enforcement for about a century. A much broader application of fingerprints is for personal authentication, for instance to access a computer, a network, a bank-machine, a ca