搜索结果
找到约 353 项符合
then 的查询结果
按分类筛选
- 全部分类
- 其他 (29)
- Java编程 (21)
- 书籍 (21)
- matlab例程 (20)
- 单片机编程 (17)
- 编译器/解释器 (14)
- 其他书籍 (13)
- 单片机开发 (12)
- 人工智能/神经网络 (10)
- 汇编语言 (10)
- Java书籍 (9)
- 软件设计/软件工程 (8)
- VC书籍 (8)
- DSP编程 (8)
- 模拟电子 (7)
- Linux/Unix编程 (7)
- 技术资料 (7)
- 数学计算 (6)
- 通讯/手机编程 (6)
- 微处理器开发 (6)
- Delphi控件源码 (5)
- 嵌入式/单片机编程 (5)
- 技术管理 (5)
- 通讯编程文档 (5)
- 驱动编程 (4)
- 数据结构 (4)
- 其他嵌入式/单片机内容 (4)
- 系统设计方案 (4)
- 数值算法/人工智能 (4)
- JavaScript (4)
- 软件工程 (4)
- VHDL/FPGA/Verilog (4)
- 电源技术 (3)
- 网络 (3)
- 行业发展研究 (3)
- SCSI/ASPI (3)
- 书籍源码 (3)
- SQL Server (3)
- J2ME (3)
- 可编程逻辑 (2)
- 其他数据库 (2)
- FlashMX/Flex源码 (2)
- GPS编程 (2)
- 文件格式 (2)
- 压缩解压 (2)
- 游戏 (2)
- 加密解密 (2)
- 编辑器/阅读器 (2)
- 软件 (2)
- 其他 (2)
- 教程资料 (1)
- 嵌入式综合 (1)
- 无线通信 (1)
- 技术书籍 (1)
- 工控技术 (1)
- 医药行业 (1)
- Modem编程 (1)
- STL (1)
- 邮电通讯系统 (1)
- 文章/文档 (1)
- 金融证券系统 (1)
- 3G开发 (1)
- BREW编程 (1)
- 中间件编程 (1)
- 语音压缩 (1)
- Jsp/Servlet (1)
- 手册 (1)
- 论文 (1)
- VIP专区 (1)
VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
Java书籍 The purpose of this chapter is to bring relative newcomers up to speed in writing, compiling, and pa
The purpose of this chapter is to bring relative newcomers up to speed in writing, compiling, and packaging servlets and JSPs. If you have never developed a servlet or JSP before, or just need to brush up on the technology to jumpstart your development, then the upcoming recipes provide simple progr ...
数值算法/人工智能 The Window Design Method The basic idea behind the design of linear-phase FIR filters using the win
The Window Design Method
The basic idea behind the design of linear-phase FIR filters using the window
method is to choose a proper ideal frequency-selective filter [which always has
a noncausal, infinite duration impulse response] and then truncate its impulse
response hd[n] to obtain a linear-phas ...
其他书籍 Software Ebooks Bible Series - ASP.NET[2] is a very important book to satart web development in ASP.
Software Ebooks Bible Series - ASP.NET[2] is a very important book to satart web development in ASP.NET. So if you are planning to do web developemtn then this book should be on your system.
其他书籍 WroxProfessionalASPNET20XML.zip this ebook is for Professional ASP.NET 2.0 with touch of XML. so if
WroxProfessionalASPNET20XML.zip this ebook is for Professional ASP.NET 2.0 with touch of XML. so if you plan to use XML then you should have this book on ur shelf.
matlab例程 iris localization using integro differential operator. The rar contains 5 files in order to computer
iris localization using integro differential operator. The rar contains 5 files in order to computer the integro differential operator of the normalized contour of the iris and puil boundaries and then add circles to the respective boundaries.
软件工程 Managing Humans is a selection of the best essays from Michael Lopps web site, Rands In Repose. Draw
Managing Humans is a selection of the best essays from Michael Lopps web site, Rands In Repose. Drawing on Lopp s management experiences at Apple, Netscape, Symantec, and Borland, this book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other ...
网络 here is a C++ code for TCP server and client on linux mechine that listens on a specific port and
here is a C++ code for TCP server and client on linux mechine that listens on a specific port
and then replies back to the client
其他 In some graphs, the shortest path is given by optimizing two different metrics: the sum of weights o
In some graphs, the shortest path is given by optimizing two different metrics: the sum of weights of the edges and the number of edges. For example: if two paths with equal cost exist then, the path with the least number of edges is chosen as the shortest path. Given this metric, you have find out ...