搜索结果
找到约 268 项符合
Implement 的查询结果
按分类筛选
- 全部分类
- 技术资料 (42)
- Java编程 (18)
- 其他 (16)
- 其他书籍 (14)
- VHDL/FPGA/Verilog (14)
- matlab例程 (12)
- 微处理器开发 (10)
- 人工智能/神经网络 (7)
- 数据结构 (7)
- 软件设计/软件工程 (6)
- 数值算法/人工智能 (5)
- 加密解密 (5)
- 教程资料 (5)
- 编译器/解释器 (5)
- 单片机开发 (5)
- 可编程逻辑 (4)
- 数学计算 (4)
- 通讯编程文档 (4)
- 嵌入式/单片机编程 (4)
- 系统设计方案 (4)
- 多媒体处理 (3)
- 通讯/手机编程 (3)
- 模拟电子 (3)
- 电子书籍 (3)
- 压缩解压 (3)
- 驱动编程 (3)
- Linux/Unix编程 (3)
- 汇编语言 (3)
- 文章/文档 (3)
- Java书籍 (3)
- Delphi控件源码 (3)
- VC书籍 (3)
- 源码 (2)
- 书籍 (2)
- 单片机编程 (2)
- 电源技术 (2)
- 软件工程 (2)
- 网络 (2)
- 文件格式 (2)
- VIP专区 (2)
- 教程 (1)
- 手册 (1)
- 论文 (1)
- 数据库系统 (1)
- 仿真技术 (1)
- 操作系统开发 (1)
- 书籍源码 (1)
- 测试测量 (1)
- 工控技术 (1)
- Mentor (1)
- Internet/网络编程 (1)
- 编辑器/阅读器 (1)
- 多国语言处理 (1)
- 其他数据库 (1)
- uCOS (1)
- STL (1)
- J2ME (1)
- 其他行业 (1)
- TAPI编程 (1)
- JavaScript (1)
- 其他嵌入式/单片机内容 (1)
- SQL Server (1)
- 邮电通讯系统 (1)
- 行业发展研究 (1)
- Ajax (1)
VC书籍 The source code of Travelling Salesman Problem. Implement in Visual C++.
The source code of Travelling Salesman Problem. Implement in Visual C++.
其他书籍 论文《research_and_implement_distributed_intrusion_detection_system_on_mobile_agent》
论文《research_and_implement_distributed_intrusion_detection_system_on_mobile_agent》
通讯/手机编程 Implement a Rayleigh fading channel simulator based on the Filtered Gaussian Noise method
Implement a Rayleigh fading channel simulator based on the Filtered Gaussian Noise method
压缩解压 This toolbox contains Matlab files that implement the nonsubsample contourlet transform and its util
This toolbox contains Matlab files that implement the nonsubsample contourlet transform and its utility functions. Some Matlab files are the same as those in Contourlet Toolbox.
数值算法/人工智能 自行implement的k-mean(含fuzzy c mean)
自行implement的k-mean(含fuzzy c mean),可以直接於vc++針對大量數據進行分群的動作
文章/文档 An Empirical Study on Effectiveness and Impact Factors Analysis of Enterprise Implement ERP System
An Empirical Study on Effectiveness and Impact Factors Analysis of Enterprise Implement ERP System
VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
其他书籍 an ebook describing cryptographic protocols in a suitable way for developers to implement them easil
an ebook describing cryptographic protocols in a suitable way for developers to implement them easily in certain ways.
Java编程 Specification File adjacencyListGragh class GeneralGraph: use adjacency list to implement the gr
Specification File
adjacencyListGragh
class GeneralGraph:
use adjacency list to implement the graph which data structure is vector
Construct methods:
* public GeneralGraph():
contain an empty vector store the vertex and a boolean determines whether graph is directed or not, defaulted is undirecte ...