虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

How

  • MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programme

    MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programmers. What kind are you? The first kind are the good programmers who write programs that conform to the way MFC wants you to do things. The second bunch are wild-eyed anarchists who insist on getting things done their way. Me, I’m in the second group. If you are in the same boat (or would like to be) this book is for you. This book won’t teach you MFC—not in the traditional sense. You should pick it up with a good understanding of basic MFC programming and a desire to do things differently. This isn’t a Scribble tutorial (although I will review some fundamentals in the first chapter). You will learn How to wring every drop from your MFC programs. You’ll discover How to use, abuse, and abandon the document/view architecture. If you’ve ever wanted custom archives, you’ll find that, too.

    标签: MFC Introduction programmer programme

    上传时间: 2015-05-30

    上传用户:youke111

  • Expert Choice represents a significant contribution to the decision making process 工t assists a deci

    Expert Choice represents a significant contribution to the decision making process 工t assists a decision maker in solving complex problems involving many criteria and several courses of action . An Expert Choice solution to a problem reflects the expertise of the decision maker , not the computer . Behavioral scientists have spent many years studying the human mind and How it makes decisions . They have found that humans are influenced by their previous experiences and this causes them to have biases . Basic instincts , preferences and environmental factors also play key roles in How we analyze data and make decisions . There 15 way to remove these factors from human decision making , nor would we necessarily want to , but as the problems of our world become more and more complex , it 15 necessary for us to employ a framework to help make more logical and less biased decisions while still taking our feelings and intuition into consideration .

    标签: contribution significant represents decision

    上传时间: 2015-06-02

    上传用户:gmh1314

  • Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in the

    Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about How the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.

    标签: 802.11 introduction Beginning Security

    上传时间: 2013-12-04

    上传用户:CHINA526

  • JPG Graph API Win 32 JPG API is a 32bit JPEG api dll. You can call it to sHow a JPG file in your

    JPG Graph API Win 32 JPG API is a 32bit JPEG api dll. You can call it to sHow a JPG file in your program by only one sentence. The only thing that you have to know is How to load a dll libary and How to call ist functions. A example of Visual FoxPro is supplied in package.

    标签: JPG API Graph 32

    上传时间: 2015-06-23

    上传用户:SimonQQ

  • Many applications use connection/object pool. A program may require a IMAP connection pool and LDAP

    Many applications use connection/object pool. A program may require a IMAP connection pool and LDAP connection pool. One could easily implement a IMAP connection pool, then take the existing code and implement a LDAP connection pool. The program grows, and now there is a need for a pool of threads. So just take the IMAP connection pool and convert that to a pool of threads (Copy, paste, find, replace????). Need to make some changes to the pool implementation? Not a very easy task, since the code has been duplicated in many places. Re-inventing source code is not an intelligent approach in an object oriented environment which encourages re-usability. It seems to make more sense to implement a pool that can contain any arbitrary type rather than duplicating code. How does one do that? The answer is to use type parameterization, more commonly referred to as templates.

    标签: connection pool applications program

    上传时间: 2013-12-25

    上传用户:playboys0

  • Writing an Input Module The sample module introduced here is called idiom (Input Device for Interc

    Writing an Input Module The sample module introduced here is called idiom (Input Device for Intercepting Output of Mice), The sample module registers itself with the USB kernel subsystem as a mouse driver and with the input management subsystem as a keyboard driver. idiom translates mouse movement events into keyboard input events: it reports arrow events to the input system according to How the physical mouse is moved.

    标签: Input introduced Writing Device

    上传时间: 2015-06-25

    上传用户:731140412

  • Open Source for the Enterprise Open source software is changing the world of Information Technolo

    Open Source for the Enterprise Open source software is changing the world of Information Technology. But making it work for your company is far more complicated than simply installing a copy of Linux. If you are serious about using open source to cut costs, accelerate development, and reduce vendor lock-in, you must institutionalize skills and create new ways of working. You must understand How open source is different from commercial software and what responsibilities and risks it brings. Open Source for the Enterprise is a sober guide to putting open source to work in the modern IT department.

    标签: Open Information Enterprise the

    上传时间: 2013-12-27

    上传用户:R50974

  • Example of a digital data transmission implementing GMSK modulation This Simulink model simulates a

    Example of a digital data transmission implementing GMSK modulation This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate How part of the GSM transmission and reception works. It also measures the BER, affected by an AWGN channel

    标签: implementing transmission modulation simulates

    上传时间: 2015-07-12

    上传用户:jiahao131

  • softIce is a good tool for windows to debug . This is a book which introduce many commond and teach

    softIce is a good tool for windows to debug . This is a book which introduce many commond and teach us How to us the commonds in softice

    标签: introduce softIce commond windows

    上传时间: 2014-01-07

    上传用户:13517191407

  • The DSP Design Flow workshop provides an introduction to the advanced tools you need to design and i

    The DSP Design Flow workshop provides an introduction to the advanced tools you need to design and implement DSP algorithms targeting FPGAs. This intermediate workshop in implementing DSP functions focuses on learning How to use System Generator for DSP, as well as HDL design flow, CORE Generator software, and design implementation tools. Through hands-on exercises, you will implement a design from algorithm concept to verification.

    标签: introduction workshop provides advanced

    上传时间: 2014-12-06

    上传用户:sammi