搜索结果

找到约 2,427 项符合 that 的查询结果

按分类筛选

显示更多分类

软件设计/软件工程 That is source code for DijKstra Algo

That is source code for DijKstra Algo
https://www.eeworm.com/dl/684/465341.html
下载: 57
查看: 1018

Ajax AJAX Book Reader is a complete AJAX client-server application that may be used with a Web browser to

AJAX Book Reader is a complete AJAX client-server application that may be used with a Web browser to display a sequence of text files one page at a time. The display style is completely controlled by a configuration file. The first application of this is as a book viewer where each chapter resides i ...
https://www.eeworm.com/dl/702/465494.html
下载: 118
查看: 1057

加密解密 Program that implements echo watermarking. The basic idea is to embed a watermark by adding an e

Program that implements echo watermarking. The basic idea is to embed a watermark by adding an echo to the original sample.
https://www.eeworm.com/dl/519/466026.html
下载: 99
查看: 1051

matlab例程 program that compares the DCT of two matrix

program that compares the DCT of two matrix
https://www.eeworm.com/dl/665/466081.html
下载: 155
查看: 1021

CA认证 HDB3 codification, a matlab program that make a hdb3 codification

HDB3 codification, a matlab program that make a hdb3 codification
https://www.eeworm.com/dl/640/466085.html
下载: 176
查看: 1057

Java编程 The Java(tm) Telnet Applet is a fully featured telnet/SSH program that allows users to connect and l

The Java(tm) Telnet Applet is a fully featured telnet/SSH program that allows users to connect and login to remote hosts via the Internet or an Intranet using only their WWW Browser. It includes not only telnet-compliant connection services.
https://www.eeworm.com/dl/633/466284.html
下载: 60
查看: 1078

其他 Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to ...
https://www.eeworm.com/dl/534/466392.html
下载: 82
查看: 1104

数据结构 This program finds the locations of placing n queens in a n*n chessboard so that none attack any oth

This program finds the locations of placing n queens in a n*n chessboard so that none attack any other
https://www.eeworm.com/dl/654/467179.html
下载: 146
查看: 1033

Java编程 it is a java editor that can compile, show errors, etc

it is a java editor that can compile, show errors, etc
https://www.eeworm.com/dl/633/467274.html
下载: 30
查看: 1068

电子书籍 A stack-based threaded approach would require that stack space be reserved for each execution contex

A stack-based threaded approach would require that stack space be reserved for each execution context
https://www.eeworm.com/dl/cadence/ebook/467677.html
下载: 51
查看: 1030