搜索结果
找到约 1,070 项符合
First-out 的查询结果
Java编程 Genetic Algorithm example using Java You have 10 cards numbered 1 to 10. You have to divide them i
Genetic Algorithm example using Java
You have 10 cards numbered 1 to 10.
You have to divide them into 2 piles so that:
The sum of the first pile is as close as possible to 36 and the product of all in second pile is as close as poss to 360.
Java编程 Java企业人事管理系统源码javahr 配置Oracle数据库 在配置Oracle数据库时
Java企业人事管理系统源码javahr
配置Oracle数据库
在配置Oracle数据库时,请参见以下步骤:
(1)请确定数据库已经成功启动;
(2)请确认已经存在名称为“PERSONNEL_MANAGE”的用户,如果不存在,请先创建。
(3)将光盘\\TM\\03\\Database\\文件夹中的personnel_manage.dmp文件拷贝到C盘的根目录下;
(4)依次单击 ...
技术管理 simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiri
simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiries, deposits, withdrawals and alter the code. Simulation of ATM terminal users logged in, their account numbers and passwords through the ATM network to transmit to the server, ATM database server bas ...
数值算法/人工智能 FIR Filter Design This chapter treats the design of linear-phase FIR filters. The assignments are
FIR Filter Design
This chapter treats the design of linear-phase FIR filters. The assignments are
divided in two parts, the first part focuses on the design of FIR filters using the
window design method while the second part focuses on design
Java编程 跟踪检查Java内存溢出问题
跟踪检查Java内存溢出问题,Out of memory问题,此工具能够帮助分析
VC书籍 Windows applications using C++ and the Microsoft Foundation Class (MFC) library. The text builds fro
Windows applications using C++ and the Microsoft Foundation Class (MFC) library. The text builds from the ground up, first describing the Windows architecture and showing how MFC works with that architecture next covering the document/view framework that simplifies the creation of industrial-streng ...
微处理器开发 Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.
Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any
of the resource kits. It has proved to be an extremely versatile tool on
the unix platform. So why should NT always be unix s poor cousin when it
comes to tcp/ip testing and exploration? I bet many NT admins out there
ke ...
其他书籍 It is not the intention of this application note to illustrate usage of the part in either of opera
It is not the intention of this application note to illustrate usage
of the part in either of operational modes. The application
note does not cover details on setting up for data transfers.
After having reviewed this application note, the reader is
expected to understand the data flow for and IN an ...
Delphi控件源码 Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite
Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite handy with INI files which you can use to get and set data for you applications. You can also check out some dates related to passwords and expiry dates. Send emails using Microsoft Email client. No n ...
软件工程 Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems. In this book, Bruce D
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems. In this book, Bruce Douglass illustrates for the first time how two important contemporary software
engineering advances鈥攑atterns and the UML鈥攃an be applied advantageously to the concepts and
techniques traditionall ...