搜索结果

找到约 557 项符合 end-users 的查询结果

其他 TOYFDTD1 is a stripped-down minimalist, 3D FDTD code demonstrating the basic tasks in implementing a

TOYFDTD1 is a stripped-down minimalist, 3D FDTD code demonstrating the basic tasks in implementing a simple 3D FDTD simulation. An idealized rectangular waveguide is modeled by treating the interior of the mesh as free space and enforcing PEC conditions on the faces of the mesh. A simplified plane w ...
https://www.eeworm.com/dl/534/137845.html
下载: 38
查看: 1073

通讯编程文档 The goal with this project was to make it possible for almost any mobile-phone to use ICQ and be abl

The goal with this project was to make it possible for almost any mobile-phone to use ICQ and be able to communicate with other users! One other goal with this project was to lower the GPRS-traffic in the phone and make the ICQ-ing cheaper. A third goal was to make this service as easy to log-in t ...
https://www.eeworm.com/dl/646/138432.html
下载: 174
查看: 1106

人工智能/神经网络 CGAL is a collaborative effort of several sites in Europe and Israel. The goal is to make the most i

CGAL is a collaborative effort of several sites in Europe and Israel. The goal is to make the most important of the solutions and methods developed in computational geometry available to users in industry and academia in a C++ library.
https://www.eeworm.com/dl/650/139332.html
下载: 29
查看: 1049

其他书籍 制作本书的目的是为了方便大家的阅读。转载时请保持本电子书的完整性。 前言、条款2、16、21、44根据从Addison-Wesley出版社下载的开放条款翻译。条款26、27、28、45根据从Sc

制作本书的目的是为了方便大家的阅读。转载时请保持本电子书的完整性。 前言、条款2、16、21、44根据从Addison-Wesley出版社下载的开放条款翻译。条款26、27、28、45根据从Scott Meyers的网站下载的《Three Guidelines for Effective Iterator Usage》一文翻译。条款43根据从C/C++ Users Journal网站下载的《STL Algorithm ...
https://www.eeworm.com/dl/542/139942.html
下载: 177
查看: 1033

Internet/网络编程 This program queries the network and shows the Domains/Servers/Workstations structure. It also shows

This program queries the network and shows the Domains/Servers/Workstations structure. It also shows the users of each Server or Workstation and can send messages to the selected PC. This programs works only on a Windows NT 4.0 Machine! 查询网络,显示 域/服务器/工作站的结构,它也显示用户,并将信息发送 ...
https://www.eeworm.com/dl/620/140719.html
下载: 23
查看: 1062

电子书籍 jboss 开发人员 手册 JBoss: A Developer s Notebook also introduces the management console, the web service

jboss 开发人员 手册 JBoss: A Developer s Notebook also introduces the management console, the web services messaging features, enhanced monitoring capabilities, and shows you how to improve performance. At the end of each lab, you ll find a section called "What about..." that anticipates and answers ...
https://www.eeworm.com/dl/cadence/ebook/142239.html
下载: 132
查看: 1104

人工智能/神经网络 RSA算法实现(经典) 1.   首先要把文件夹中的rsa.c文件拷贝到运行工具(如TURBOC2)下文件夹名为INCLUDE的文件夹中。   (在本机上已经做过

RSA算法实现(经典) 1.   首先要把文件夹中的rsa.c文件拷贝到运行工具(如TURBOC2)下文件夹名为INCLUDE的文件夹中。   (在本机上已经做过,所以不需要做)     2.   RSA的加密对象为C盘下文件名为CODE.txt的前8位(如果没有一定要在C盘下建立一个文件名为CODE.txt的文件,  把要加密的数据写到文件里),加密 ...
https://www.eeworm.com/dl/650/143347.html
下载: 170
查看: 1073

人工智能/神经网络 1.   首先要把文件夹中的rsa.c文件拷贝到运行工具(如TURBOC2)下文件夹名为INCLUDE的文件夹中。   (在本机上已经做过

1.   首先要把文件夹中的rsa.c文件拷贝到运行工具(如TURBOC2)下文件夹名为INCLUDE的文件夹中。   (在本机上已经做过,所以不需要做)     2.   RSA的加密对象为C盘下文件名为CODE.txt的前8位(如果没有一定要在C盘下建立一个文件名为CODE.txt的文件,  把要加密的数据写到文件里),加密后在C盘下生成一个文 ...
https://www.eeworm.com/dl/650/143348.html
下载: 76
查看: 1056

VC书籍 有效使用STL迭代器ITERATOR的三条基本原则

有效使用STL迭代器ITERATOR的三条基本原则,是C/C++ Users Journal摘录的Effective STL的三个独立条款
https://www.eeworm.com/dl/686/146987.html
下载: 25
查看: 1054

网络 接收pop3 Public Function Retrieve(ByVal rhs As Pop3Message) As Pop3Message Dim message, response A

接收pop3 Public Function Retrieve(ByVal rhs As Pop3Message) As Pop3Message Dim message, response As String Dim msg As New Pop3Message msg.bytes = rhs.bytes msg.number = rhs.number message = "RETR " + rhs.number.ToString + vbCrLf write(message) response = Respond() If response.Substring(0, 3 ...
https://www.eeworm.com/dl/635/147009.html
下载: 115
查看: 1126