搜索结果
找到约 888 项符合
Side-Information 的查询结果
加密解密 This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar
This program applies Message Digest (MD5) Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information and Network Security Material
Java书籍 The book then branches out into different approaches for incorporating Ajax, which include: The
The book then branches out into different approaches for incorporating Ajax, which include:
The Prototype and script.aculo.us Javascript libraries, the Dojo and Rico libraries, and DWR
Integrating Ajax into Java ServerPages (JSP) applications
Using Ajax with Struts
Integrating Ajax into Java ...
其他书籍 This document specifies a collection of compiler directives, library routines, and environment vari
This document specifies a collection of compiler directives, library routines, and
environment variables that can be used to specify shared-memory parallelism in C, C++
and Fortran programs. This functionality collectively defines the specification of the
OpenMP Application Program Interface (OpenMP ...
Java编程 This book is for merging practical electronic devices with the Internet, for hardware and software
This book is for merging practical electronic
devices with the Internet, for hardware and software designers looking to expand their
skills of JAVA programming.This book is a complete introduction to Internet-enabled devices,it provide all of the information to inexpensively build web-enabled hardwa ...
J2ME 在本教程中
在本教程中,我们将基于 CLDC(连接有限设备配置,Connected Limited Device Configuration)和 MIDP(移动信息设备概要,Mobile Information Device Profile)API 构建一个名为 UniStocks 的典型 Java 2 Platform, Micro Edition(J2ME)应用程序。
其他 This book is for someone who wants to quickly master the basics of how to install, run, and maintai
This book is for someone who wants to quickly master the basics of how to install, run, and
maintain Linux on an Intel-based personal computer. All of the tools you need are included.
Your computer should have a monitor, or display, keyboard, mouse, hard drive, floppy drive,
and CD-ROM drive. Althou ...
嵌入式/单片机编程 The potential of solving real-time demanding industrial applications, using vision-based algorithms
The potential of solving real-time demanding industrial applications, using vision-based
algorithms, drastically grew due to an increasing availability of computational power.
In this thesis a novel real-time, vision-based Blackjack analysis system is presented. The
embedding of the vision algorithm ...
数值算法/人工智能 The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of cla
The algorithm ID3 (Quinlan) uses the method top-down induction of decision trees. Given a set of classified examples a decision tree is induced, biased by the information gain measure, which heuristically leads to small trees. The examples are given in attribute-value representation. The set of poss ...
单片机开发 face detection Face detection can be regarded as a more general case of face localization In face
face detection
Face detection can be regarded as a more general case of face localization In face localization, the task is to find the locations and sizes of a known number of faces (usually one). In face detection, one does not have this additional information.
Early face-detection algorithms fo ...
文章/文档 Installation of PelcoNet NET300 requires support from your network administrator. Contact your admi
Installation of PelcoNet NET300 requires support from your network
administrator. Contact your administrator to assist with STEP 2A –
Configuring PelcoNet Using HyperTerminal. Write down the following
information from your network administrator: