搜索结果

找到约 166 项符合 within 的查询结果

Java书籍 Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Referenc

Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. Within each chapter file, the listings are store ...
https://www.eeworm.com/dl/656/394081.html
下载: 95
查看: 1053

Jsp/Servlet These files contain all of the code listings in Java 2: The Complete Reference The source cod

These files contain all of the code listings in Java 2: The Complete Reference The source code is organized into files by chapter. Within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you a ...
https://www.eeworm.com/dl/696/399531.html
下载: 193
查看: 1039

Linux/Unix编程 Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or dr ...
https://www.eeworm.com/dl/619/402655.html
下载: 172
查看: 1073

其他书籍 Builder uses to integrate a larger system module. Each component consists of a structured set of fi

Builder uses to integrate a larger system module. Each component consists of a structured set of files within a directory. The files in a component directory serve the following The RS232 UART Core implements a method for communication of serial data. The core provides a simple register-mapped Avalo ...
https://www.eeworm.com/dl/542/419351.html
下载: 187
查看: 1037

文章/文档 In an electromagnetic cloak based on a transformation approach, reduced sets of material properties

In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here we suggest using high-order transforma ...
https://www.eeworm.com/dl/652/421409.html
下载: 155
查看: 1048

文章/文档 We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicit

We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicitly. Near the operation frequency, the energy transport velocity has rather peculiar distribution. The velocity along a line joining the origin of the cloak is a constant, while the velocity approaches ...
https://www.eeworm.com/dl/652/421412.html
下载: 33
查看: 1051

软件工程 This book is for systems architects who are interested in building security into their application

This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to ...
https://www.eeworm.com/dl/540/423323.html
下载: 136
查看: 1059

Java书籍 Java Media APIs: Cross-Platform Imaging, Media, and Visualization presents integrated Java media sol

Java Media APIs: Cross-Platform Imaging, Media, and Visualization presents integrated Java media solutions that demonstrate the best practices for using this diverse collection. According to Sun MicroSystems, "This set of APIs supports the integration of audio and video clips, animated presentations ...
https://www.eeworm.com/dl/656/425130.html
下载: 184
查看: 1035

软件工程 Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 throu

Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20 in Volume 1. Within each chapter, the routines appear in the same order as in Volume 1, but not broken out separately by section number wit ...
https://www.eeworm.com/dl/540/426506.html
下载: 90
查看: 1101

数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...
https://www.eeworm.com/dl/641/429179.html
下载: 51
查看: 1136