搜索结果
找到约 67 项符合
person 的查询结果
按分类筛选
- 全部分类
- 其他 (11)
- Java编程 (8)
- 软件工程 (4)
- 其他书籍 (4)
- 软件设计/软件工程 (3)
- 书籍 (3)
- 书籍源码 (2)
- 微处理器开发 (2)
- 其他数据库 (2)
- 游戏 (2)
- 文章/文档 (2)
- VC书籍 (2)
- 多国语言处理 (2)
- 其他嵌入式/单片机内容 (1)
- 电子书籍 (1)
- 驱动编程 (1)
- 操作系统开发 (1)
- 数据结构 (1)
- 文件格式 (1)
- Applet (1)
- 邮电通讯系统 (1)
- Linux/Unix编程 (1)
- FlashMX/Flex源码 (1)
- 网络 (1)
- 嵌入式/单片机编程 (1)
- matlab例程 (1)
- *行业应用 (1)
- Jsp/Servlet (1)
- Java书籍 (1)
- SQL Server (1)
- 源码 (1)
- 软件 (1)
- 技术资料 (1)
其他书籍 Your application should never assign a seat that has already been assigned. When the economy sectio
Your application should never assign a seat that has already been assigned. When the economy
section is full, your application should ask the person if it is acceptable to be placed in
the first-class section (and vice versa). If yes, make the appropriate seat assignment.
源码 c#简单计算器
// 学生管理.cpp : Defines the entry point for the application.
//
#include "stdafx.h"
#include "resource.h"
#define MAX_LOADSTRING 100
// Global Variables:
HINSTANCE hInst; // current instance
TCHAR szTitle[MAX_LOADSTRING]; // The title bar text
TCHAR szWindowClass[MAX_LOADSTRING]; ...
软件 简单的计算器
// 学生管理.cpp : Defines the entry point for the application.
//
#include "stdafx.h"
#include "resource.h"
#define MAX_LOADSTRING 100
// Global Variables:
HINSTANCE hInst; // current instance
TCHAR szTitle[MAX_LOADSTRING]; // The title bar text
TCHAR szWindowClass[MAX_LOADSTRING]; ...
书籍 Crime+and+Intelligence+Analysis
In the hit CBS crime show Person of Interest, which debuted in 2011,
the two heroes—one a former Central Intelligence Agency agent and
the other a billionaire technology genius—work together using the
ubiquitous surveillance system in New York City to try to stop violent
crime. It’s referred to b ...
书籍 Smart Homes
In this research, we have designed, developed implemented a wireless sensor
networks based smart home for safe, sound and secured living environment for
any inhabitant especially elderly living alone. We have explored a methodology
for the development of efficient electronic real time data processin ...
书籍 Wireless Identification
We are in the era of ubiquitous computing in which the use and development of Radio Frequency Iden-
tification (RFID) is becoming more widespread. RFID systems have three main components: readers,
tags, and database. An RFID tag is composed of a small microchip, limited logical functionality, and an ...
技术资料 开关电源设计(英文版)
It all started rather innocuously. I walked into Dr GT Murthy’s office one fine day, andchanged my life. “Doc” was then the General Manager, Central R&D, of a very largeelectrical company headquartered in Bombay. In his new state-of-the-art electronics center,he had hand-picked some of India’s b ...