This software documentation contains proprietary information of OpenAccess Software, Inc. it is provided under a license agreement containing restrictions on use and disclosure and is also protected by copyright law. Reverse engineering of the software is prohibited. If This software/documentation is delivered to a U.S. Government Agency, then it is delivered with Restricted Rights and the following legend is applicable:
标签: documentation proprietary information OpenAccess
上传时间: 2015-09-03
上传用户:mpquest
This project does not contain a full, runnable application program. Instead, the only package ope.account contains two classes which represent basic bank customer and account information.
标签: application runnable Instead project
上传时间: 2013-12-25
上传用户:许小华
This project does not contain a full, runnable application program. Instead, the only package ope.football contains two classes to represent match data for football (and possibly other team sports).
标签: application runnable Instead project
上传时间: 2015-09-03
上传用户:zhaiyanzhong
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。
标签: introduces the hacking science
上传时间: 2013-12-28
上传用户:离殇
With the information in This book, you will learn how to write not only JavaScript that can stand on its own within a Web page, but also how to write scripts that interact with applications written in other development languages.
标签: information JavaScript learn stand
上传时间: 2014-01-04
上传用户:silenthink
Implemented BFS, DFS and A* To compile This project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in This form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.
标签: Implemented following compile command
上传时间: 2014-01-01
上传用户:lhc9102
This compress with vc.very cool.it is so little
上传时间: 2015-09-04
上传用户:sardinescn
This is very good for teacher
上传时间: 2015-09-05
上传用户:asdfasdfd
* This a software code module for a time-of-day clock object. * The clock may be fixed 12-hour, fixed 24-hour, or dynamically * configurable between these two types. Clock data can be accessed * as a binary number representing the number of minutes since midnight * or a BCD number formatted according to the time-of-day description * in the TIME module 0404x. The functions work with time-of-day values * which conform to normally accepted clock values of 1:00 to * 12:59 BCD / 0 to 719 binary for a 12-hour clock or clock values * 00:00 to 23:59 BCD / 0 to 1439 binary for a 24-hour clock. On power-up * the clock is 12:00 BCD / 0 binary for a 12-hour or dynamically * configurable clock, or 00:00 BCD / 0 binary for a 24-hour clock.
标签: clock time-of-day software module
上传时间: 2013-12-07
上传用户:llandlu
* CONSTRAINTS * This module does not handle data which is considered out of range by the * application(i.e. fixed constants which represent error condition) * * Maximum weight value must be limited to 128 to prevent an overflow * condition during the calculation. * * The internal data type must be large enough to handle the calculations. * The maximum possible internal value * = Max Input Value * (weight - 1) + Max Input Value * If a maximum weight of 128 is used, the internal data type should be 2 * times the size of the input data type.
标签: CONSTRAINTS considered module handle
上传时间: 2015-09-07
上传用户:qunquan