该滑窗算法是一种遍历性的算法。
并提出对给定的凸而单调的型值点列判断这种保形插值存在性的算法。
An algorithm is presented which determines if there exists such a shape preserving interpolation for convex and increasing data points given.
并且,就实现基于模糊关系数据模型推理过程,给出了两个关键性的算法。
We build the knowledge database with this fuzzy relationship model and we present two important algorithms about the inference process of the fuzzy relationship model in this paper.
提出的基于可预测性的算法是自适应的,有助于增加事务满足其截止期限的可能性。
The presented algorithm based on predictability is adaptive, helpfully increasing the possibility of meeting the deadline of transactions.
我们给出两个判断类间关系一致性的算法并分析其性质,还探讨了基于公理的知识的一致性。
Two algorithms for checking relationships between categories are presented and their properties are analyzed. Knowledge consistency analysis based on musicology-specific axioms is also discussed.
在此基础上,本论文对现有的典型自定位算法进行了分类,着重阐述了各类中具有代表性的算法及其原理和特点。
On this basis, the paper self-positioning of existing typical algorithms are classified, focusing on the representative algorithm in all its principles and characteristics.
本文主要工作是设计符合实时性的算法,并对程序进行移植优化,在TMS320DM642开发板上实现疲劳检测系统。
The main task of this paper is to design algorithm meet the real-time requirements, transplant and optimize the code, realize fatigue detection system on the TMS320DM642 development platform.
一些社交软件使用非常复杂的算法,比如Gigg或FriendFeed上那些用于排列提交条目重要性的算法,但这一技术复杂性应该对用户隐藏。
Some social software use very complex algorithms, e.g. those used for ranking the importance of submitted items on Gigg or FriendFeed, but this technical complexity should be hidden from users.
现在的研究采用了复杂性分析中的样品熵算法。
The present study is to investigate the application of sample entropy (SampEn) measures.
SQL在某种意义上来说是一种在程序中只描述感兴趣的数据的声明性语言,而不是为获得数据的算法。
SQL is a declarative language in the sense that only the data of interest is described in the program, not the algorithm for obtaining the data.
除理论之外,这种专注表现在本身复杂性的理论,它根据它们运行的时间和空间需求来组织算法。
At the theoretical end, this focus manifests itself in complexity theory, which groups algorithms according to their time and space requirements for execution.
这种算法的正确性是很显然的。
使用加密算法的保密性由这样一个事实保证,即生成与哈希值匹配的明文在计算上是不可行的。
The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.
该公司根据她的数据在结合其他上百名妇女上传的数据,使其算法能够认识和提高他们预测排卵期的精确性。
The company combines her data with those uploaded by hundreds of other women so that its algorithms can learn and improve their accuracy in predicting ovulation.
我们的解决方案将采用一种算法(协议)来适应高可用性集群中应用程序(或节点)的第一次和第二次故障。
Our solution was to come up an algorithm (protocol) to accommodate a first and second failure of application (or nodes) within the highly available cluster.
这三个安全性提供者可能已经实现了您需要的算法。
These three security providers may have implemented the algorithms you need.
目前为止,示例采用的是过程性方法:这种算法无非是在整个文档上进行循环。
So far, the examples have taken a procedural approach: the algorithm is akin to a loop over the entire document.
安全性组件包含各种安全性算法和机制的IBM实现。
The security components contain IBM implementations of various security algorithms and mechanisms.
这保护了其独特的搜索算法和扫描项目的机密性,所以图书馆员不知道已经完成的工作或其已经有多少内容了。
It protects its proprietary search algorithms and keeps its scanning projects confidential, so librarians don't know what has been completed or how large the content base has become.
数据签名和哈希算法是用于提供数据完整性的机制。
Digital signatures and hash algorithms are mechanisms used to provide data integrity.
而在使用相同方法的其他算法中,采用有效的棋盘表现方法是一个介于复杂性,速度和空间需求之间的权衡。
In the same way as other algorithms, the use of efficient board representations is a tradeoff between complexity, speed, and space requirements.
证书的完整性是使用哈希算法校验的。
The integrity of the certificate is checked using the hash algorithm.
采用按比例增减的方法是最好的,但那会极大地增加算法的复杂性。
It would be best to reward on a sliding scale, but that would increase the complexity of the algorithm significantly.
MISTY算法是由三菱的工程师开发出来的,原始的MISTY算法保密性更强,但所需完成的计算任务则比KASUMI算法更为繁重。
The original MISTY algorithm was developed by researchers at Mitsubishi. The MISTY algorithm was more secure, but more computationally intensive, than the modified KASUMI variant.
这种数据的准确性取决于很多因素,例如采用的抽样算法的类型、抽样的数量和数据的歪斜情况。
The preciseness of this data depends upon a large number of factors such as the type of sampling algorithm used, the number of samples taken, and the skew of the data.
比如,第三方工具现在可以查看公共列表,并且可以建立新的算法对用户的权威性进行排名。
Third-party tools, for example, can now look at the public lists and maybe create new algorithms to rank a user's authority on Twitter.
变更为更复杂的算法,比方说从MD 5变更为SHA - 2,16对恢复秘密的完整性没什么作用。
Changing to a more complex algorithm, say from MD5 to SHA-2, 16 does little to restore password integrity.
一组经过变更的SDO还会维护一条其原始值的记录,从而支持某种类型的乐观性锁定算法。
A collection of SDOs that has been altered also maintains a record of its original values, enabling certain sorts of optimistic locking algorithms.
代码结构糟糕透了,程序员显然没有深入思考程序的正确性,算法,数据结构和可维护性。
The structure is appalling, and the programmers clearly didn't think deeply about correctness, algorithms, data structures, or maintainability.
代码结构糟糕透了,程序员显然没有深入思考程序的正确性,算法,数据结构和可维护性。
The structure is appalling, and the programmers clearly didn't think deeply about correctness, algorithms, data structures, or maintainability.
应用推荐