例如 Shor的算法能在多项式时间内找到一个N位函数的周期。
Shor's algorithm, for example, is able to find the period of a function of N bits in polynomial time.
给出了用位函数方法推导介质覆盖导电球上缝隙天线辐射场严格解的过程。
A novel method based on potential function theory is given in this paper to formulate the analytic solution of slot antenna on electrical sphere coated with dielectric layer.
本文给出求解有限导电媒质平面上方垂直磁偶极源赫兹位函数的解析方法。
In this paper, an analytical approach is described for the evaluation of the Hertz potential of a vertical magnetic dipole over the finitely conducting medium plane.
但在计算矢量位函数和标量位函数的微分过程中,TPM模型将产生奇异点。
When the vector potential function and the differential of the scalar potential function are computed, singular points would occur on TPM.
通过引入静电场的标量位函数,将电场强度的矢量泊松方程转化为位势的椭圆型偏微分方程的诺依曼边值问题。
And the problem is converted to the typical Neumann boundary value problem for the elliptic equations by inducing the scalar potential function.
如SQL标准中所述,此函数返回输入字符串的八位字节长度或字节长度。
This function, as mentioned in SQL standard, returns the length of the input string in octets or bytes.
最近几年以来,有数百位用户一直在维护库中的每一个函数。
They've had hundreds of users for several years looking at every function in the library.
模仿位和布尔数据类型以及函数并非一定是一个挑战性的过程。
Emulating bit and Boolean data types and functions does not have to be a challenging process.
记住,到此函数的第一个参数是传递自ppe的64位地址。
Remember, the first parameter to the function is the 64-bit address that was passed in from the PPE.
如果寄存器8的首选槽中的位均设为假,则跳到函数的尾部。
If the bits in the preferred slot of register 8 are all set to false, you skip to the end of the function.
escape函数用%后跟被编码字符的两位16进制码代替了几乎所有非字母数字的ASCII字符。
The escape function replaces almost any non-alphanumeric ASCII character with % followed by the two-digit hexadecimal code of the encoded character.
例如,Not函数会把一位的值取反。
这个函数接受两个64位输入值,名为val1和val2。
The function receives two 64-bit input values, called val1 and val2.
为了验证该函数确实按照所设计的方式工作,我们需要再次将每个整型数字转换成二进制数字,对每一个位执行EXLUSIVE OR运算,然后将结果还原成integer。
To verify that the function indeed works as designed, we, again, need to convert each integer to BINARY, perform EXLUSIVE or for each bit, and then convert the result back to integer.
这串代码的第一部分提供了一个线索:这是一个用64位编码的PHP函数。
The first part of the string offers a clue: It’s using a PHP function to decode the string of text, which is encoded as base64. If we pass this through a decoder, the string looks a lot more malicious
然而,对于64位整数来说,并没有标准的函数集。
However, there is no standard set of functions for 64-bit. But Linux provides the following macros on both big and little endian systems.
此函数从请求中提取一个32位整数,并使用它中的算术运算来计算一个动态缓冲区的大小。
This function takes a 32-bit integer from the request, and USES it in an arithmetic operation that calculates the size of a dynamic buffer.
PINE 并没有包括系统头文件,而是对相关函数提供了自己的声明,所有这些都是使用32 位偏移量来定义的。
PINE, rather than including the system headers, provided its own declaration of the related functions, all defined in terms of 32-bit offsets.
举例来说,如果您将一个32位的值传递给一个期望16位值的函数,而且所传递的参数值也在正确范围之内,那么这个函数就永远不会注意到多出来的字节。
For instance, if you pass a 32-bit value to a function expecting a 16-bit value, and the value is in range, the function may never notice the extra bytes.
spu_mfcdma32()函数允许从PPE的(理论上)64位地址空间中的32 位子集中使用DMA 方式获取数据,这对于我们的目的来说已经足够了。
The spu_mfcdma32() function allows DMA from a 32-bit subset of the PPE's theoretical 64-bit address space which is plenty for our purposes.
spu_mfcdma64()函数则使用另外一个参数来指定有效地址的高32位部分。
The spu_mfcdma64() function takes an additional argument specifying the top 32 bits of an effective address.
当gperf找到某种配置,并且该配置将每个keysig分配到生成的查找表中惟一位置时,将生成一个完美hash函数。
A perfect hash function is produced when gperf finds a configuration that assigns each keysig to a unique location within the generated lookup table.
“salt”由一些随机数据位组成,用于和密码同时输入hash函数,而从以下两个主要方面缓解风险
A "salt" consists of random bits used as an input to the hash function in conjunction with the password, and mitigates the risk in two major ways
作为DataBlade模块的一部分,这两种数据类型还附带了用于验证数据类型的字符串操纵函数和位操作函数。
As part of a new DataBlade module, these data types come with string manipulation functions to validate the data types and bitwise operation functions.
即使目标处理器(PPE)拥有64位的本地地址空间,spu_mfcdma32函数也会使用一个32位的值。
The spu_mfcdma32 function takes a 32-bit value even though the target processor (the PPE) has a native 64-bit address space.
尽管寄存器可以存储多个值(在本例中,4个32位值),但当参数传递给函数时,每个参数值都会在其自己的寄存器内被传递。
Although registers can hold multiple values (in this case, four 32-bit values), when passing parameters to a function, each parameter value is passed in its own register.
例如,在清单4中的CommentBlock函数,假设评论人可能是最需要的可选参数,所以将其放置在参数列表的第一位。
The CommentBlock function in Listing 4, for example, assumes that the comment introducer is the optional argument that is most likely to be needed, and so places it first in the parameter list.
一位明星工程师会专注三种基本类型的重用:第一,内部基础架构的重用,相应代码是他自己或同事编写的;第二,使用第三方的函数库,比如jdk。
A rockstar engineer will focus on three essential kinds of reuse. First of all, the reuse of internal infrastructure, the code that he and his peers have written.
本文给出多层媒质中水平和垂直电、磁偶极子的谱域标量位和矢量位格林函数的一般表达式,并验证了其正确性。
The spectral domain Green's functions of scalar and vector potentials for vertical and horizontal electric as well as magnetic dipoles in multi-layered medium are presented and verified.
应当知道,任何一位受过职业道德训练的软件工程师都不会同意写一个“摧毁巴格达DestroyBaghdad”这样的函数。
It should be noted that no ethically-trained software engineer would ever consent to write a DestroyBaghdad procedure.
应用推荐