Da traduttori professionisti, imprese, pagine web e archivi di traduzione disponibili gratuitamente al pubblico.
* sqpr tree implementation in the open graph drawing framework.
== external links ==* spqr tree implementation in the open graph drawing framework.
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
* an implementation of a cryptographically safe shrinking pseudorandom number generator.
* an implementation of a cryptographically safe shrinking pseudorandom number generator.
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
this source is using tarjan's implementation for the dense graph.
this source is using tarjan's implementation for the dense graph.
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
* a matlab implementation of adaboost* milk for python implements adaboost.
*a matlab implementation of adaboost*multi-threaded matlab-compatible implementation of boosted trees*milk for python implements adaboost.
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
"plankalkül: the first high-level programming language and its implementation".
"plankalkül: the first high-level programming language and its implementation".
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
Attenzione: contiene formattazione HTML nascosta
خرابشدهitems in kleo:: backendconfigwidget listview (1: protocol; 2: implementation name)
failed
Ultimo aggiornamento 2011-10-23
Frequenza di utilizzo: 1
Qualità:
# libbitap، a free implementation that shows how the algorithm can easily be extended for most regular expressions.
#libbitap, a free implementation that shows how the algorithm can easily be extended for most regular expressions.
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
* secret code breaker - autokey cipher decoder and encoder* a javascript implementation of the autokey cipher
==external links==* secret code breaker - autokey cipher decoder and encoder* a javascript implementation of the autokey cipher
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
* an interactive مایکروسافت اکسل spreadsheet naive bayes implementation using vba (requires enabled macros) with viewable source code.
* an interactive microsoft excel spreadsheet naive bayes implementation using vba (requires enabled macros) with viewable source code.
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
's free software reference implementation of domainkeys* spamcop faq entry about bogus bounces also discusses domainkeys== منابع ==
's free software reference implementation of domainkeys* spamcop faq entry about bogus bounces also discusses domainkeys
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
* mpboost++, a c++ implementation of the original adaboost.mh algorithm and of an improved variant, the mpboost algorithm.
*mpboost++, a c++ implementation of the original adaboost.mh algorithm and of an improved variant, the mpboost algorithm.
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
* nice explanation of voronoi diagram and visual implementation of fortune's algorithm* a voronoi diagram on a sphere* plot a voronoi diagram with mathematica
* nice explanation of voronoi diagram and visual implementation of fortune's algorithm* a voronoi diagram on a sphere* plot a voronoi diagram with mathematica* voronoi software for shattering 3d geometry* hand-drawing voronoi diagrams* overlaid voronoi diagram of the united states based on state capitals* overlaid voronoi diagram of the world based on national capitals
Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:
(black packets), route availability, identity management, node authentication, authorization, availability, efficient key distribution, and secure utilization of symmetric keys by authorized devices. however, chakrabarty and engels did not focus on the security architecture and sdn implementation for the iot.
(black packets), route availability, identity management, node authentication, authorization, availability, efficient key distribution, and secure utilization of symmetric keys by authorized devices. however, chakrabarty and engels did not focus on the security architecture and sdn implementation for the iot.
Ultimo aggiornamento 2021-01-22
Frequenza di utilizzo: 1
Qualità:
Riferimento: