搜索结果

找到约 1,069 项符合 user 的查询结果

按分类筛选

显示更多分类

加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/519/413134.html
下载: 97
查看: 1093

Java编程 JCommon is a Java class library that is used by JFreeChart, Pentaho Reporting and a few other projec

JCommon is a Java class library that is used by JFreeChart, Pentaho Reporting and a few other projects. The library contains miscellaneous classes that support: * configuration and dependency management code * a general logging framework * text utilities * user interface classes for ...
https://www.eeworm.com/dl/633/431212.html
下载: 31
查看: 1117

系统设计方案 The most straightforward approximation is the standard Gaussian approximation, where the MAI is appr

The most straightforward approximation is the standard Gaussian approximation, where the MAI is approximated by a Gaussian random variable. This approximation is simple, however it is not accurate in general. In situations where the number of users is not large, the Gaussian approximation is not app ...
https://www.eeworm.com/dl/678/448247.html
下载: 112
查看: 1058

VHDL/FPGA/Verilog Altera&#174 provides various tools for development of hardware and software for embedded systems. T

Altera&#174 provides various tools for development of hardware and software for embedded systems. This handbook complements the primary documentation for these tools by describing how to most effectively use the tools. It recommends design styles and practices for developing, debugging, and optimiz ...
https://www.eeworm.com/dl/663/453264.html
下载: 95
查看: 1115

书籍 LTE+Self-Organising+Networks

Mobilenetworkoperatorswillmeetmanychallengesinthecomingyears.Itisexpectedthatthe numberofpeopleconnected,wirelineandwireless,willreachfivebillionby2015.Atthesame time, people use more wireless services and they expect similar user experience to what they can now get from fixed networks. Because of t ...
https://www.eeworm.com/dl/521954.html
查看: 136

单片机编程 PICKIT™ 2 PROGRAMMER-TO-

PICKIT™ 2 PROGRAMMER-TO-GO USER GUIDE The PICkit 2 Programmer-To-Go functionality allows a PIC MCU memory image to be downloaded into the PICkit 2 unit for later programming into a specific PIC MCU. No software or PC is required to program devices once the PICkit 2 unit is set up for Programmi ...
https://www.eeworm.com/dl/502/30389.html
下载: 123
查看: 1171

Linux/Unix编程 LibTorrent is a BitTorrent library written in C++ for *nix, with a focus on high performance and goo

LibTorrent is a BitTorrent library written in C++ for *nix, with a focus on high performance and good code. The library differentiates itself from other implementations by transfering directly from file pages to the network stack. On high-bandwidth connections it is able to seed at 3 times the speed ...
https://www.eeworm.com/dl/619/178690.html
下载: 114
查看: 1101

编译器/解释器 Here are some short instructions for use of mod-xslt. The stylesheet is specified using the Proce

Here are some short instructions for use of mod-xslt. The stylesheet is specified using the Processing Instruction <?xml-stylesheet type="text/xsl" href="URL-OF-YOUR-STYLESHEET"?> or now new <?xslt-stylesheet agent="THE-USER-AGENT-STRING-OF-THE-BROWSER" href="URL-OF-YOUR-STYLESHEET"?> This now ...
https://www.eeworm.com/dl/628/182886.html
下载: 182
查看: 1113

Java编程 该项目是一个简单的用来测试数据库连接的系统

该项目是一个简单的用来测试数据库连接的系统,通过简单的登录页面来验证数据库的连接是否成功,该系统使用struts框架实现,数据库为SQL Server 2000,数据源名为user,数据库为login,存放用户表为person。
https://www.eeworm.com/dl/633/325782.html
下载: 51
查看: 1080

其他 The worm will produce Arod.exe and " get to C: WINDOWS catalogue . After starting the machine again

The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept ...
https://www.eeworm.com/dl/534/391296.html
下载: 165
查看: 1058