电脑公司销售、财务管理子系统 本文重点研究的是电脑公司管理信息系统,此系统实现了对电脑公司各部门各项工作的管理,其中包括人事管理子系统、仓库管理子系统、销售与财务管理子系统、客服管理子系统等几个主要模块。系统采用B/S结构与C/S结构相结合的形式,在后台数据库中使用了一定量的存储过程、触发器和视图,这在数据库访问量特别大,或者是查询频率相当高的时候,能显著地提高系统性能。
上传时间: 2014-01-08
上传用户:bibirnovis
报时小闹钟 本程序是一个用汇编编的精致的图形时钟,运行时双击clock图标即可, 钟表显示的时间为本机系统的时间。 按b键可扩大画面 ;按s键可缩小画面;按c键可改变颜色;按e键可听音乐; 按q键退出本程序.
上传时间: 2013-12-20
上传用户:lyy1234
linux下,基于S3C2410开发板的家庭视频监控系统,基于OV511芯片摄像头,实现了软件方式的RGB图像编码,包括驱动,动态连接库,核心代码。采用B/S结构设计,
标签: linux
上传时间: 2013-12-27
上传用户:sclyutian
Input : A set S of planar points Output : A convex hull for S Step 1: If S contains no more than five points, use exhaustive searching to find the convex hull and return. Step 2: Find a median line perpendicular to the X-axis which divides S into SL and SR SL lies to the left of SR . Step 3: Recursively construct convex hulls for SL and SR. Denote these convex hulls by Hull(SL) and Hull(SR) respectively. Step 4: Apply the merging procedure to merge Hull(SL) and Hull(SR) together to form a convex hull. Time complexity: T(n) = 2T(n/2) + O(n) = O(n log n)
标签: contains Output convex planar
上传时间: 2017-02-19
上传用户:wyc199288
Instead of finding the longest common subsequence, let us try to determine the length of the LCS. Then tracking back to find the LCS. Consider a1a2…am and b1b2…bn. Case 1: am=bn. The LCS must contain am, we have to find the LCS of a1a2…am-1 and b1b2…bn-1. Case 2: am≠bn. Wehave to find the LCS of a1a2…am-1 and b1b2…bn, and a1a2…am and b b b b1b2…bn-1 Let A = a1 a2 … am and B = b1 b2 … bn Let Li j denote the length of the longest i,g g common subsequence of a1 a2 … ai and b1 b2 … bj. Li,j = Li-1,j-1 + 1 if ai=bj max{ L L } a≠b i-1,j, i,j-1 if ai≠j L0,0 = L0,j = Li,0 = 0 for 1≤i≤m, 1≤j≤n.
标签: the subsequence determine Instead
上传时间: 2013-12-17
上传用户:evil
一个办公自动化管理系统,基于B/S架构,用jsp+javabeans 编写的,很不错的
上传时间: 2017-03-31
上传用户:1159797854
网页采集系统 ================= 安装配置 ------- 1 程序我就不说了 2 配置文件 applicationContext.xml 里面有详细的注释 3 已经包含了多个论坛博客的参数,如CSDN论坛、博客园、新浪博客、百度Hi、ccidnet等的解析参数 需要的类库 --------- 1 Spring 2.5 2 common-logging 1.1 3 paoding-analysis 2.0.4-beta 4 commons-dbcp-1.2.2.jar 5 mysql-connector-java-5.1.7-bin.jar 6 commons-pool-1.4.jar 7 Lucene.2.4.0.jar 8 Lucene-highlighter-2.4.0.jar 9 java2000.jar 演示例子 ------- 本地:在com.laozizhu.search.demo目录下面 B/S: http://search.laozizhu.com
标签: applicationContext xml 页 采集系统
上传时间: 2017-04-07
上传用户:牧羊人8920
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
标签: fault-tolerant algorithms redundant underlyin
上传时间: 2013-12-18
上传用户:jkhjkh1982
ITU-T G.729 Annex C+ - Reference C code for floating point implementation of G.729 at 6.4/8/11.8 kbit/s with DTX functionality (integration of Annexes B, D and E)
标签: implementation 729 Reference floating
上传时间: 2017-04-10
上传用户:cccole0605
为 了提高用户身份认证和授权管理的灵活性,从We b 应用系统的安全性角度出发,讨论了 一 种在. N E T F r a me w o r k下保证应用程序安全性的身份验证和授权模型,并给出了模型的具体实现方法。 该模型利用 F o r ms身份验证方法对用户的身份进行鉴别。在授权处理上,模型结合统一资源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授权模式和用户所具有的系统角色,分别从页面级和页面操作级对用户的访问进行 控制。该模型在企业局域网环境内能够提供比较灵活的身份认证和基于角色的授权服务。实际应用表明, 基于该模型的We b应用系统能够对用户的访问进行有效的控制,从而保证了系统的安全性
上传时间: 2013-12-31
上传用户:VRMMO