一个用keil and Proteus设计的C51音乐播放程序与大家分享
上传时间: 2014-07-08
上传用户:dianxin61
Perl & XML. by Erik T. Ray and Jason McIntosh ISBN 0-596-00205-X First Edition, published April 2002. (See the catalog page for this book.) Table of Contents Copyright Page Preface Chapter 1: Perl and XML Chapter 2: An XML Recap Chapter 3: XML Basics: Reading and Writing Chapter 4: Event Streams Chapter 5: SAX Chapter 6: Tree Processing Chapter 7: DOM Chapter 8: Beyond Trees: XPath, XSLT, and More Chapter 9: RSS, SOAP, and Other XML Applications Chapter 10: Coding Strategies Index Colophon --------------------------------------------------------------------------------
标签: T. published McIntosh Edition
上传时间: 2013-12-24
上传用户:yzhl1988
The program of BASE 64 encryption and decryption
标签: encryption decryption program BASE
上传时间: 2015-09-03
上传用户:yuanyuan123
Keyboard and remote driven operation fully functional, implements preprogrammed chars in TOUCH PAD
标签: preprogrammed functional implements operation
上传时间: 2014-01-20
上传用户:784533221
SPI flash control and access program
标签: control program access flash
上传时间: 2015-09-04
上传用户:ANRAN
Parallel flash access and control program
标签: Parallel control program access
上传时间: 2014-01-14
上传用户:标点符号
给vim增加函数列表。Author: Yegappan Lakshmanan (yegappan AT yahoo DOT com) For Vim version 6.0 and above Last change: 2006 November 14
标签: Lakshmanan Yegappan yegappan version
上传时间: 2015-09-04
上传用户:ecooo
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。
标签: introduces the hacking science
上传时间: 2013-12-28
上传用户:离殇
Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.
标签: Implemented following compile command
上传时间: 2014-01-01
上传用户:lhc9102
Overview Provides a way to store very large collections of email addresses (100,000+ addresses) and efficiently check whether a specific address is contained in a collection. The collection can be created programmatically, or through a pluggable persistence mechanism. Functionality Maintains large collections of email addresses. Efficiently checks whether an address is in the collection or not.
标签: addresses collections Overview Provides
上传时间: 2013-12-17
上传用户:xg262122