Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested.
标签: Complete Referenc listings Eclipse
上传时间: 2017-01-19
上传用户:as275944189
These files contain all of the code listings in Java 2: The Complete Reference The source code is organized into files by chapter. within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested. The code for Scrabblet is in its own ZIP file, called CHAP32.ZIP.
标签: The Reference Complete listings
上传时间: 2013-11-28
上传用户:3到15
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/
标签: open-source encryption Features software
上传时间: 2013-12-20
上传用户:123啊
Builder uses to integrate a larger system module. Each component consists of a structured set of files within a directory. The files in a component directory serve the following The RS232 UART Core implements a method for communication of serial data. The core provides a simple register-mapped Avalon庐 interface. Master peripherals [such as a Nios庐 II processor] communicate with the core by reading and writing control and data registers.
标签: structured integrate component consists
上传时间: 2014-01-15
上传用户:lnnn30
In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here we suggest using high-order transformations to create smooth moduli at the outer boundary of the cloak, therefore completely eliminating the detrimental scattering within the limit of geometric optics. We apply this scheme to a non-magnetic cylindrical cloak and demonstrate that the scattered field is reduced substantially in a cloak with optimal quadratic transformation as compared to its linear counterpart.
标签: electromagnetic transformation properties approach
上传时间: 2017-03-30
上传用户:pkkkkp
We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicitly. Near the operation frequency, the energy transport velocity has rather peculiar distribution. The velocity along a line joining the origin of the cloak is a constant, while the velocity approaches zero at the inner boundary of the cloak. A ray pointing right into the origin of the cloak will experience abrupt changes of velocities when it impinges on the inner surface of the cloak. This peculiar distribution causes long time delays for beams passing through the ideal cloak within a geometric optics description.
标签: distribution dimensional transport obtained
上传时间: 2013-12-18
上传用户:zhliu007
This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.
标签: application architects interested building
上传时间: 2014-01-24
上传用户:xwd2010
Java Media APIs: Cross-Platform Imaging, Media, and Visualization presents integrated Java media solutions that demonstrate the best practices for using this diverse collection. According to Sun MicroSystems, "This set of APIs supports the integration of audio and video clips, animated presentations, 2D fonts, graphics, and images, as well as speech input/output and 3D models." By presenting each API in the context of its appropriate use within an integrated media application, the authors both illustrate the potential of the APIs and offer the architectural guidance necessary to build compelling programs.
标签: Media Java Cross-Platform Visualization
上传时间: 2013-12-04
上传用户:hanli8870
Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20 in Volume 1. within each chapter, the routines appear in the same order as in Volume 1, but not broken out separately by section number within Volume 1鈥檚 chapters. There are commentaries accompanying many of the routines, generally following the printed listing of the routine to which they apply. These are of two kinds: issues related to parallelizing the algorithm in question, and issues related to the Fortran 90 implementation. To distinguish between these two, rather different, kind
标签: Numerical following the Chapters
上传时间: 2017-04-11
上传用户:6546544
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
标签: perceptual implementation algorithms fingerpr
上传时间: 2013-12-08
上传用户:星仔