代码搜索:NETWORKS
找到约 10,000 项符合「NETWORKS」的源代码
代码结果 10,000
www.eeworm.com/read/179943/9330509
cxx testmacsecurity.cxx
#include
#include
#include
#include
#include
#include
#include
www.eeworm.com/read/179943/9330596
hxx rlmi.hxx
#if !defined(RESIP_RLMI_HXX)
#define RESIP_RLMI_HXX
#include
#include "resip/stack/Contents.hxx"
#include "rutil/Data.hxx"
namespace resip
{
class Rlmi : public Contents
{
www.eeworm.com/read/179943/9330606
cxx parsercategories.cxx
#if defined(HAVE_CONFIG_H)
#include "resip/stack/config.hxx"
#endif
/* ====================================================================
* The Vovida Software License, Version 1.0
*
*
www.eeworm.com/read/179943/9330654
cxx tcptransport.cxx
#if defined(HAVE_CONFIG_H)
#include "resip/stack/config.hxx"
#endif
#include
#include "rutil/compat.hxx"
#include "rutil/Data.hxx"
#include "rutil/Socket.hxx"
#include "rutil/Logger.
www.eeworm.com/read/179943/9330674
hxx embedded.hxx
#if !defined(RESIP_EMBEDDED_HXX)
#define RESIP_EMBEDDED_HXX
namespace resip
{
class Data;
class Embedded
{
public:
static char* decode(const Data& input, unsigned int& decodedL
www.eeworm.com/read/375436/9360128
txt help.txt
Pittnet currently has four popular neural network paradigms:
(1) backpropagation (BP)
(2) Kohonen self-organizing
(3) adaptive resonance theory I (ART I)
(4) radial basis function (RBF).
Pit
www.eeworm.com/read/356986/10218152
txt help.txt
Pittnet currently has four popular neural network paradigms:
(1) backpropagation (BP)
(2) Kohonen self-organizing
(3) adaptive resonance theory I (ART I)
(4) radial basis function (RBF).
Pit
www.eeworm.com/read/356040/10238016
ps chapter4.ps
%!
%%BoundingBox: (atend)
%%Pages: (atend)
%%DocumentFonts: (atend)
%%EndComments
%
% FrameMaker PostScript Prolog 3.0, for use with FrameMaker 3.0
% Copyright (c) 1986,87,89,90,91 by Frame Technology
www.eeworm.com/read/418779/10908012
txt 13349.txt
Rule:
--
Sid:
13349
--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in an ActiveX control.
--
Impact:
A successful attack can cause a buffer overflow an
www.eeworm.com/read/418779/10910551
txt 13348.txt
Rule:
--
Sid:
13348
--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in an ActiveX control.
--
Impact:
A successful attack can cause a buffer overflow an