虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

byte-of-<b>Python</b>-chinese-edition

  • Perl & XML. by Erik T. Ray and Jason McIntosh ISBN 0-596-00205-X First Edition, published April

    Perl & XML. by Erik T. Ray and Jason McIntosh ISBN 0-596-00205-X First Edition, published April 2002. (See the catalog page for this book.) Table of Contents Copyright Page Preface Chapter 1: Perl and XML Chapter 2: An XML Recap Chapter 3: XML Basics: Reading and Writing Chapter 4: Event Streams Chapter 5: SAX Chapter 6: Tree Processing Chapter 7: DOM Chapter 8: Beyond Trees: XPath, XSLT, and More Chapter 9: RSS, SOAP, and Other XML Applications Chapter 10: Coding Strategies Index Colophon --------------------------------------------------------------------------------

    标签: T. published McIntosh Edition

    上传时间: 2013-12-24

    上传用户:yzhl1988

  • Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search ma

    Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.

    标签: Implemented following compile command

    上传时间: 2014-01-01

    上传用户:lhc9102

  • The Linux Network Administrator s Guide, Third Edition updates a classic Linux title from O Reilly.

    The Linux Network Administrator s Guide, Third Edition updates a classic Linux title from O Reilly. This refreshed resource takes an in-depth look at everything you need to know to join a network. Topics covered include all of the essential networking software that comes with the Linux operating system, plus information on a host of cutting-edge services including wireless hubs, spam filtering, and more

    标签: Linux Administrator Edition Network

    上传时间: 2015-09-19

    上传用户:

  • This unit uses an array of bytes to represent a LARGE number. The number is binairy-stored in the ar

    This unit uses an array of bytes to represent a LARGE number. The number is binairy-stored in the array, with the Least Significant Byte (LSB) first and the Most Significant Byte (MSB) last, like all Intel-integer types.

    标签: number binairy-stored represent LARGE

    上传时间: 2015-10-08

    上传用户:xieguodong1234

  • What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss

    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)

    标签: Sometimes the contents desire

    上传时间: 2013-12-25

    上传用户:playboys0

  • Networking for Dummies 8th Edition ,Written for even the most network-shy novice, this book begins w

    Networking for Dummies 8th Edition ,Written for even the most network-shy novice, this book begins with the most basic of basics and progresses through all the essentials, from cables, routers and hubs to building a wireless network.英文版 CHM格式

    标签: network-shy Networking for Dummies

    上传时间: 2015-12-16

    上传用户:shus521

  • The Original USB 2.0 specification released on April 27, 2000 Errata to the USB 2.0 specification

    The Original USB 2.0 specification released on April 27, 2000 Errata to the USB 2.0 specification as of December 7, 2000 Mini-B connector Engineering Change Notice to the USB 2.0 specification. Pull-up/pull-down Resistors Engineering Change Notice to the USB 2.0 specification. Errata to the USB 2.0 specification as of May 28, 2002 Interface Association Descriptor Engineering Change Notice to the USB 2.0 specification. Rounded Chamfer Engineering Change Notice to the USB 2.0 specification as of October 8, 2003 Unicode Engineering Change Notice to the USB 2.0 specification as of February 21, 2005 Inter-Chip USB Supplement Revision 1.0 as of March 13, 2006 Revision 1.3 of the USB On-The-Go Supplement as of December 5, 2006 Revision 1.01 of the Micro-USB Cables and Connectors Specification as of April 4, 2007 USB 2.0 Link Power Management Addendum Engineering Change Notice to the USB 2.0 specification as of July 16, 2007.

    标签: specification 2.0 USB Original

    上传时间: 2013-12-31

    上传用户:familiarsmile

  • Core Java 2 Volume I - Fundamentals, Seventh Edition Completely revised and up-to-date coverage o

    Core Java 2 Volume I - Fundamentals, Seventh Edition Completely revised and up-to-date coverage of Generic programming, restrictions and limitations, type bounds, wilcard types, and generic reflection Swing GUI development, including input validation and other enhancements Exception handling and debugging, including chained exceptions, stack frames, assertions, and logging Streams and files, the new I/O API, memory-mapped files, file locking, and character set encoders/decoders Regular expressions using the powerful java.util.regex package Inner classes, reflection, and dynamic proxies Application packaging and the Preferences API

    标签: Fundamentals Completely up-to-date coverage

    上传时间: 2016-01-02

    上传用户:标点符号

  • cpress usb 芯片Vender 处理固件。 The purpose of this software is to demonstrate how to implement vendor s

    cpress usb 芯片Vender 处理固件。 The purpose of this software is to demonstrate how to implement vendor specific commands. The following vendor specific commands are implemented: A0 Firmware Upload/Download A2 EEProm Load A3 External Ram Load A4 Set I2C Addr A5 Get IIC Type (1 Byte or 2 Byte EEPROM) A6 Get Chip Rev A8 Renumerate

    标签: demonstrate implement software purpose

    上传时间: 2016-01-14

    上传用户:stvnash

  • Mod_python is an Apache module that embeds the Python interpreter within the server. With mod_python

    Mod_python is an Apache module that embeds the Python interpreter within the server. With mod_python you can write web-based applications in Python that will run many times faster than traditional CGI and will have access to advanced features such as ability to retain database connections and other data between hits and access to Apache internals. A more detailed description of what mod_python can do is available in this O Reilly article.

    标签: interpreter Mod_python mod_python the

    上传时间: 2016-01-25

    上传用户:yd19890720