Welcome![Sign In][Sign Up]
Location:
Search - memory search

Search list

[AI-NN-PRAIbashuma

Description: 我们解决八数码问题,广度优先搜索可能会导致内存不够用,采用启发式搜索,启发函数为f(x)=g(x)+h(x) g(x)为该结点不同于目标结点的个数,h(x)为该结点的深度,选择那f(x)结点最小的那个结点进行扩展, 引入了一个"扩展数组[4]"(因为扩展的结点最多只有4个),该数组保存着某个结点的0点向各个方向的扩展的结点对象,然后对该扩展数组进行分析,利用启发函数在进行递归扩展... -us solve eight digital, BFS may lead to insufficient memory, using heuristic search, heuristic function f (x) = g (x) h (x) g (x) for the target node is different from the number of nodes, h (x) for the nodes of depth, the choice between f (x) nodes that the smallest node expansion. the introduction of an "expanded array [4]" (because the expansion of the nodes at most four), The array maintains a node of 0:00 a.m. to expand in all directions in the target node, and then expanded array analysis, use heuristic function during recursive expansion ...
Platform: | Size: 5120 | Author: 丁如敏 | Hits:

[AI-NN-PRAIbashumaJava1

Description: 我们解决八数码问题,广度优先搜索可能会导致内存不够用,采用启发式搜索,启发函数为f(x)=g(x)+h(x) g(x)为该结点不同于目标结点的个数,h(x)为该结点的深度,选择那f(x)结点最小的那个结点进行扩展, 引入了一个"扩展数组[4]"(因为扩展的结点最多只有4个),该数组保存着某个结点的0点向各个方向的扩展的结点对象,然后对该扩展数组进行分析,利用启发函数在进行递归扩展... -us solve eight digital, BFS may lead to insufficient memory, using heuristic search, heuristic function f (x) = g (x) h (x) g (x) for the target node is different from the number of nodes, h (x) for the nodes of depth, the choice between f (x) nodes that the smallest node expansion. the introduction of an "expanded array [4]" (because the expansion of the nodes at most four), The array maintains a node of 0:00 a.m. to expand in all directions in the target node, and then expanded array analysis, use heuristic function during recursive expansion ...
Platform: | Size: 10240 | Author: 丁如敏 | Hits:

[Other200671920394993

Description: 第一个公开源码的游戏内存修改作弊程序!支持搜索过滤任意进程(核心进程除外)所在的内存中和搜索匹配的内容,并对内存值进行锁定、修改等功能!Win98或2000下测试通过。-first open-source memory of the game revised procedures for cheating! Search filter support arbitrary process (except for the core process) where the memory matching and search the content, Memory values as well as lock and revise functional! Win98 or 2000 under test.
Platform: | Size: 8192 | Author: 雷鸣 | Hits:

[Other Databaseszgglxt

Description: 1.问题描述   对单位的职工进行管理,包括插入、删除、查找、排序等功能。 2.要求   职工对象包括姓名、性别、出生年月、工作年月、学历、职务、住址、电话等信息。 (1)新增一名职工:将新增职工对象按姓名以字典方式职工管理文件中。 (2)删除一名职工:从职工管理文件中删除一名职工对象。 (3)查询:从职工管理文件中查询符合某些条件的职工。 (4)修改:检索某个职工对象,对其某些属性进行修改。 (5)排序:按某种需要对职工对象文件进行排序。 3.实现提示   职工对象数不必很多,便于一次读入内存,所有操作不经过内外存交换。 (1)由键盘输入职工对象,以文件方式保存。程序执行时先将文件读入内存。 (2)对职工对象中的"姓名"按字典顺序进行排序。 (3)对排序后的职工对象进行增、删、查询、修改、排序等操作。 4.选做内容   将职工对象按散列法存储,并设计解决冲突的方法。在此基础上实现增、删、查询、修改、排序等操作。 -1. Problem description of the workers of unit management, including insert, delete, search and sort functions. 2. Asked the staff and workers including name, sex, date of birth, years of work, qualifications, duties, address and telephone information. (1) a new staff : new workers targeted by name in the dictionary way workers manage documents. (2) delete a trade union : From the document management workers to remove an object workers. (3) Availability : from the document management staff inquiries, subject to certain conditions the workers. (4) The modifications : a retrieval workers object, attribute some of its changes. (5) Ranking : according to some workers need to target document sorting. 3. Achieve targeted several employees suggested not many easy to read into memory, not all opera
Platform: | Size: 2048 | Author: szl | Hits:

[Other resourceQQ_LLK_SOURCE

Description: QQ连连看外挂源码 20050609qq 连连看外挂简介 原理 1 截取屏幕,从而取得方块数据,然后搜索算法. 2 通过鼠标键盘钩子发送消息来消去. 3 腾讯反外挂作的很牛,连连看程序在接到鼠标点击消息的同时从驱动层判断有没有 点击消息,所以把0x00403291地址的内存锁定为0x00就可以让腾讯的凡外挂系统失效。 4 在消除过程中因为烟雾等特效的影响,中途按F9键分析结果很可能错误,谁有办法 解决这个问题一定要告诉我啊! 最好能取消动画特效,直接消去. 5 因为时间仓促,利用周末匆匆写完这个程序,所以代码极不规范,还请大家谅解.-QQ Lianliankan extrapolated source 20050609qq Lianliankan pylon on an interception principle screen, obtain data box, Then search algorithm. 2 mouse through the keyboard hook Send Message to eliminate. 3 Tencent anti- pylon for the very cattle, Lianliankan procedures for the receipt of information a mouse click at the same time from the driver layer judgment it is not news. Therefore 0 x00403291 address to the memory lock on the 0x00 allows Tencent Van extrapolated system failure. Four in the elimination process because of the smoke, and other effects, according to the F9 key halfway analysis it is very likely wrong. who has the solution to this problem must tell me ah! best to abolish the animation effects, direct elimination. 5 because of the time constraints, the use of hastily finishe
Platform: | Size: 1850368 | Author: wancb | Hits:

[WEB Codekevin

Description: 都快2007年了是吧.呵呵... 虽然早先的记忆已经全部被我格式化,但唯一保存在U盘里的,却依旧还闪耀着暗淡的光芒. 这些代码,记录了很多东西,包括个人的思绪,曾经的美好理想,爱情的伤感以及渴望. 但是它终究没有来. 去Google搜索了一下我的名字,发现似乎有人很想要这个东西. 那还是不那么吝啬了.拿去吧. 2007年也快到了.想问候那些离开一年多的朋友.你们还好吗? /Miss kEvin1986 @ 2006.10.28 Night-away in 2007 the right. Ha ha ... although earlier memory I have all been formatted, But only in the preservation of the U tray, but also still radiates with dim light. these codes to record a lot of things, include personal thoughts, and had a beautiful ideal, Love, as well as the desire of sad. But it ultimately did not come. Google to search for a moment my name, It was found that seems to want this very thing. That is not so reluctant. take it. 2007 is approaching. ask those left waiting more than a year of a friend. How are you/Miss kEvin1986@2006.10. 28 Night
Platform: | Size: 28672 | Author: | Hits:

[Process-ThreadEnTeHandle_1

Description: EnTeHandle可以让你查看当前进程打开的句柄。句柄可以是文件、事件、互斥信号量等等。此外,你也可以查看进程当前打开的DLL,线程信息,进程内存,甚至是动态更新。也可以搜索dll和句柄-EnTeHandle can let you see the current process opened handle. Can handle documents, events, etc. mutex semaphores. In addition, you can view the current process open DLL, thread information, the process of memory, or even dynamic update. Dll can also search and handle
Platform: | Size: 84992 | Author: yang | Hits:

[Software EngineeringJSP-JAVA

Description: 基于JSP(JAVA)的企业资源管理系统 摘 要 企业资源管理系统软件作为一种管理软件正在各企事业单位中得到越来越广泛的应用。正是由于计算机在企业管理中应用的普及,使得利用计算机实现企业的管理势在必行。使用计算机对企业资源进行管理,具有无法比拟的优点。例如:检索迅速、查找方便、可靠性高、存储量大、保密性好、寿命长、成本低等。这些优点能够极大地提高企业资源管理的效率,也是企业的科学化、正规化管理,与世界接轨的重要条件。 随着Internet/Intranet应用的普及和web技术的发展,为网络化的企业资源管理系统提供了一个理想的平台,而基于web企业资源管理系统的为异地办公及跨企业的合作提供了良好的基础,采用Web技术为本企业资源管理系统的主要特征。 本课题是采用JSP技术开发的一个基于web的企业资源管理系统,主要完成工作是对企业资源管理系统中的人力资源管理部分,其中对货物管理功能也作简单实现。-based on JSP (Java) Enterprise Resource Management System summary of the Enterprise Resource Management System software as a Management Software is the enterprise units were widely used. It is precisely because of the computer in enterprise management application of, makes use of the computer to achieve the management imperative. Use computers to enterprise resource management, with incomparable advantages. For example : the rapid retrieval and search for convenient, high reliability, large memory capacity, high security, a good, long life, low cost. These advantages can greatly enhance the efficiency of resource management for enterprises, but also scientific, standardized management. connected with the world of important conditions. With the Internet/Intranet application of the technol
Platform: | Size: 292864 | Author: 潘宽标 | Hits:

[OtherSFProgWed

Description: The concept of Adaptive Memory coupled with advances in neighborhood structures derived from dynamic and adaptive search constructions have been the source of numerous important developments in metaheuristic optimization throughout the last decade.
Platform: | Size: 346112 | Author: 郑林 | Hits:

[OtherOllyDbg_wqjc

Description: ollydbg完全教程。OllyDbg 是一种具有可视化界面的 32 位汇编-分析调试器。它的特别之处在于可以在没有源代码时解决问题,并且可以处理其它编译器无法解决的难题。 一,什么是 OllyDbg? 二,一般原理[General principles] 三,反汇编器[Disassembler] 四,分析器[Analysis] 五,Object扫描器[Object scanner] 六,Implib扫描器 [Implib scanner] 七,如何开始调试[How to start debugging session] 八,CPU 窗口[CPU window] 九,断点[Breakpoints] 十,内存映射窗口[Memory map window] 十一、十二,监视与监察器[Watches and inspectors] 十三,线程[Threads] 十四,复制到剪切板[Copy to clipboard] 十五,调用栈[Call stack] 十六,调用树[Call tree] 十七,选项[Options] 十八,搜索[Search] 十九,自解压文件[Self-extracting (SFX) files] 二十,单步执行与自动执行[Step-by-step execution and animation] 二一,Hit跟踪[Hit trace]
Platform: | Size: 168960 | Author: 沈浪 | Hits:

[Special Effectsbwdistsc

Description: This function computes Euclidean distance transform for 3D binary image with non-trivial aspect ratio (i.e. anisotropic pixels). The algorithm uses fast optimized line-scans and is actually faster than MATLAB s BWDIST implementation of search on optimized kd-tree for many cases. It also uses cell-array representation for internal data, and thus is less demanding to physical memory.
Platform: | Size: 49152 | Author: fangfei | Hits:

[CA authHash

Description: 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。-Hash method (Hashing) search and general search method (searching) is not the same. In the hash law, the key (key value) or identifier (identifier) address in memory by the function (function) derived from the conversion. Such a function, commonly known as hash function (Hashing function) or key corresponds to the address converter (key to address transformation). For a limited storage space, can be used effectively and in time to add or delete can be completed faster, the use of hash is the most appropriate of all. Because the hash table search in the absence of a collision (collision) and overflow (overflow) circumstances, as long as one can be retrieved.
Platform: | Size: 35840 | Author: 張建良 | Hits:

[Search Enginefirtex-1.0.3_RC_src

Description: 中文开源搜索引擎firtex-1.0.3_RC版 架构、接口做了重大改进 修正了一些BUG 增加了对gz压缩的TREC格式的支持 增加了对北大天网数据集的支持 增加了同时检索内存中索引数据的支持 支持实时在线索引和检索 实现了在线索引更新的几个策略 ... -Chinese open-source search engine firtex-1.0.3_RC version of the structure, interfaces make a significant improvement in a number of amendments BUG increased gz compressed format TREC support an increase in the North Skynet data sets at the same time support an increase in the memory retrieval index data support real-time online support for indexing and retrieval realize an online index to update several strategy ...
Platform: | Size: 8653824 | Author: 张峰 | Hits:

[source in ebookbtree

Description: B-tree 在内存中的实现,包括插入、删除、查找。-B-tree in memory to achieve, including insert, delete, search.
Platform: | Size: 6144 | Author: xl | Hits:

[AI-NN-PRicsiboost-0.3.tar

Description: Boosting is a meta-learning approach that aims at combining an ensemble of weak classifiers to form a strong classifier. Adaptive Boosting (Adaboost) implements this idea as a greedy search for a linear combination of classifiers by overweighting the examples that are misclassified by each classifier. icsiboost implements Adaboost over stumps (one-level decision trees) on discrete and continuous attributes (words and real values). See http://en.wikipedia.org/wiki/AdaBoost and the papers by Y. Freund and R. Schapire for more details [1]. This approach is one of most efficient and simple to combine continuous and nominal values. Our implementation is aimed at allowing training from millions of examples by hundreds of features in a reasonable time/memory.
Platform: | Size: 116736 | Author: njustyw | Hits:

[DocumentsExcelTool

Description: Excel工具,用于控制电子表格Excel中Sheet的显示和隐藏,并能够自动寻找数种类型的值,类似于程序内存修改器-Excel tools, used to control Excel spreadsheet Sheet of the show and hide, and can automatically search for several types of values, similar to procedures for amending the memory device
Platform: | Size: 22528 | Author: Moneky | Hits:

[OS programVC++_xitongceshi

Description: 可以查询系统 内存信息、Windows信息、CPU信息、分辨率和磁盘信息。-Information can search for system memory, Windows information, CPU information, resolution, and disk information.
Platform: | Size: 1900544 | Author: 向阳 | Hits:

[Driver DevelopIDTGuard

Description: IDT Hook 检测及恢复 此程序在 Ring3 下打开物理内存对象取得当前内存中的 IDT,再用打开对应的原始内核文件进行比较。带恢复功能。 此程序适用于 XP/2003。采用特征码搜索方式查找。注释详细,代码规范-IDT Hook detection and recovery procedures in this Ring3 to open the physical memory object to obtain the current memory of IDT, and then open the corresponding document to compare original kernel. With recovery. This procedure applies to XP/2003. Using signature search search. Notes detailed specification code
Platform: | Size: 6144 | Author: 张京 | Hits:

[Game Hook CrackC++LLK

Description: 连连看外挂原理 1 截取屏幕,从而取得方块数据,然后搜索算法. 2 通过鼠标键盘钩子发送消息来消去. 3 腾讯反外挂作的很牛,连连看程序在接到鼠标点击消息的同时从驱动层判断有没有 点击消息,所以把0x00403291地址的内存锁定为0x00就可以让腾讯的凡外挂系统失效。-Lianliankan one interception screen plug-in principle, to obtain the data box, and then search algorithm through the mouse keyboard hook .2 send a message to eliminate the anti-plug for .3 Tencent very cattle, Lianliankan process of receiving messages at the same time the mouse clicks from the drive layer to determine whether there click information, so the memory address 0x00403291 to 0x00 can be locked so that
Platform: | Size: 75776 | Author: mhs | Hits:

[Data structspdclib-0.4.1

Description: 一组基础的C库的实现,包括了 字符串操作、内存操作、数学操作、排序、查找 等基础数据结构和算法的实现,可以替代标准的C库函数,跨平台运行-One group C based on the realization of the Treasury, including string operations, memory operations, mathematical operations, sorting, search and other basic data structures and algorithms realize, can replace the standard C library function, cross-platform operation
Platform: | Size: 65536 | Author: 黑夜路人 | Hits:
« 1 2 ... 5 6 7 8 9 1011 12 13 14 15 ... 21 »

CodeBus www.codebus.net