虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Need

  • Use the links below to download a source distribution of Ant from one of our mirrors. It is good pra

    Use the links below to download a source distribution of Ant from one of our mirrors. It is good practice to verify the integrity of the distribution files, especially if you are using one of our mirror sites. In order to do this you must use the signatures from our main distribution directory. Ant is distributed as zip, tar.gz and tar.bz2 archives - the contents are the same. Please note that the tar.* archives contain file names longer than 100 characters and have been created using GNU tar extensions. Thus they must be untarred with a GNU compatible version of tar. If you do not see the file you Need in the links below, please see the master distribution directory or, preferably, its mirror.

    标签: distribution download mirrors source

    上传时间: 2014-01-06

    上传用户:xuanchangri

  • This a free web game, animportantnote of this, "xia domain" for free software, follow the "general p

    This a free web game, animportantnote of this, "xia domain" for free software, follow the "general public to permit" all the provisions of any recognition can be modified to increase capacity, publish, but to revise and increase the No Need to publish, not of any reason not to open

    标签: free animportantnote software general

    上传时间: 2016-11-23

    上传用户:colinal

  • This book is designed to teach you the best practices in developing Windows DNA applications. We ha

    This book is designed to teach you the best practices in developing Windows DNA applications. We have avoided making this book a primer on every technology associated with Windows DNA. If we had followed this course, this would be an encyclopedia set. Everyone has their favorite authors and books on the various technical subject areas. The market is full of books to teach you the basics, the how, this book tries to be different in that we pull out the important points to teach you about the why. If you Need training in a particular technology covered in this book, Sams has a number of 24-hour and 21-day books that cover a wide range of topics.

    标签: applications developing practices designed

    上传时间: 2016-11-27

    上传用户:yyq123456789

  • Hid Led Tester is a simple USB(interrupt mode)device tester package. There are firmware and software

    Hid Led Tester is a simple USB(interrupt mode)device tester package. There are firmware and software in it. Hid Led tester follows USB HID protocol, we don’t Need to install driver for the device, and Windows (Win 2000 and later) will install the device automatic.

    标签: interrupt firmware software package

    上传时间: 2014-01-03

    上传用户:llandlu

  • AMOP 0.3 is an Automatic Mock Object for C++. By using ABI and template techniques, it can simulate

    AMOP 0.3 is an Automatic Mock Object for C++. By using ABI and template techniques, it can simulate a pseudo-"Reflection" which is normally not support in C++ . The main differences between AMOP and other mock object library is that, users DO NOT Need to implement the interface of the object which to mock...

    标签: techniques Automatic template simulate

    上传时间: 2013-12-31

    上传用户:rocwangdp

  • The System Management BIOS Reference Specification addresses how motherboard and system vendors pres

    The System Management BIOS Reference Specification addresses how motherboard and system vendors present management information about their products in a standard format by extending the BIOS interface on Intel architecture systems. The information is intended to allow generic instrumentation to deliver this data to management applications that use CIM (the WBEM data model) or direct access and eliminates the Need for error prone operations like probing system hardware for presence detection.

    标签: Specification motherboard Management Reference

    上传时间: 2013-12-10

    上传用户:凤临西北

  • * Lightweight backpropagation neural network. * This a lightweight library implementating a neura

    * Lightweight backpropagation neural network. * This a lightweight library implementating a neural network for use * in C and C++ programs. It is intended for use in applications that * just happen to Need a simply neural network and do not want to use * Needlessly complex neural network libraries. It features multilayer * feedforward perceptron neural networks, sigmoidal activation function * with bias, backpropagation training with settable learning rate and * momentum, and backpropagation training in batches.

    标签: backpropagation implementating Lightweight lightweight

    上传时间: 2013-12-27

    上传用户:清风冷雨

  • Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provi

    Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers Need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML together to streamline the development process. XML and Java(TM), Second Edition provides new coverage of emerging areas such as document management, databases, messaging, servlets, JDBC, data binding, security, and more. It begins with an overview of XML programming techniques, standard APIs, and tools. Building upon this foundation, the book goes on to cover the latest technologies, including DOM Level 2, SAX2, XSLT, SOAP, WSDL, and UDDI. It explores the role of these major middleware technologies in XML and Java-based Web application development, as well as the limitations and potential pitfalls.

    标签: technologies and standards Edition

    上传时间: 2014-01-05

    上传用户:hj_18

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived Need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It Needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • 银行家算法可以避免死锁。算法结构 n : 系统中进程个数 m :系统中的资源类数 1)available(m):现有资源向量 2) max(n,m):资源最大申请量 3)allocat

    银行家算法可以避免死锁。算法结构 n : 系统中进程个数 m :系统中的资源类数 1)available(m):现有资源向量 2) max(n,m):资源最大申请量 3)allocation(n,m):资源分配矩阵 4)Need(n,m):进程以后还需要的资源矩阵 5)request(n,m):进程申请资源矩阵

    标签: available allocat 资源 max

    上传时间: 2013-12-30

    上传用户:李梦晗