虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

key-value

  • flash lite开发 ArcadeHeroes.swf SWF content games/invaders.swf SWF content games/pacman.swf SWF

    flash lite开发 ArcadeHeroes.swf SWF content games/invaders.swf SWF content games/pacman.swf SWF content Arcade1_2nd_edition.SIS Nokia S60 2nd Edition SIS package Arcade1_3rd_edition_signed.sis Nokia S60 3rd Edition signed SIS package Arcade1_2nd_edition.pkg Nokia S60 2nd Edition SIS Package descriptor Arcade1_3rd_edition.pkg Nokia S60 3rd Edition SIS Package descriptor makesis.php PHP script mykey.key sample certificate key, created using makekeys.exe mycert.cer sample certificate, created using makekeys.exe makekeys.exe Symbian application to create signing keys

    标签: content SWF swf games

    上传时间: 2014-01-22

    上传用户:hn891122

  • 表达式类型的实现: 1、 一个表达式和一颗二叉树之间

    表达式类型的实现: 1、 一个表达式和一颗二叉树之间,存在着自然的对应关系。 2、 假设算术表达式Expression内可以含有变量(a~z)、常量(0~9)和二元运算符(+,-,*,/,^)。实现一下操作。 (1) ReadExpr(E)——以字符序列的形式输入语法正确的前缀表示式并构造表达式E。 (2) WritrExpr(E)——用带括弧的中缀表示式输出表达式E。 (3) Assign(V,c)——实现对变量V的赋值(V=c),变量的初值为0。 (4) Value(E)——对算术表达式E求值。 (5) CompoundExpr(P,E1,E2)——构造一个新的复合表达式(E1)P (E2)。

    标签: 表达式 二叉树

    上传时间: 2013-12-09

    上传用户:luke5347

  • The MDP toolbox proposes functions related to the resolution of discrete-time Markov Decision Proces

    The MDP toolbox proposes functions related to the resolution of discrete-time Markov Decision Process : finite horizon, value iteration, policy iteration, linear programming algorithms with some variants. The functions (m-functions) were developped with MATLAB v6.0 (one of the functions requires the Mathworks Optimization Toolbox) by the decision team of the Biometry and Artificial Intelligence Unit of INRA Toulouse (France). The version 2.0 (February 2005) handles sparse matrices and contains an example

    标签: discrete-time resolution functions Decision

    上传时间: 2014-01-01

    上传用户:xuanjie

  • 输入n个数

    输入n个数,在输入数的过程中建立一个二叉排序树。建立成功后,输入一个key, //在二叉树中实现删除key所在的结点

    标签: 输入

    上传时间: 2014-01-06

    上传用户:cursor

  • Image Compression A collection of simple routines for image compression using different techniqu

    Image Compression A collection of simple routines for image compression using different techniques. 图象压缩的不同方法 BTCODE: Image compression Using Block Truncation Coding. PYRAMID: Image compression based on Gaussian Pyramids. DCTCOMPR: Image compression based on Discrete Cosine Transform. IMCOMPR: Image compression based on Singular Value Decomposition. The given codes can be also used in 2D noise suppression. Notes: The function "conv2fft" performs a 2D FFT-based convolution. Type "help conv2fft" on Matlab command window for more informations.

    标签: Compression compression collection different

    上传时间: 2016-05-11

    上传用户:磊子226

  • 扫描一个C源程序

    扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现频度。用线性探测法解决Hash冲突。设Hash函数为: Hash(key)=[(key的第一个字母序号)*100+(key的最后一个字母序号)] MOD 41

    标签: 源程序

    上传时间: 2014-01-05

    上传用户:ardager

  • 在Linux下访问LDAP目录

    在Linux下访问LDAP目录,验证客户端用USB KEY签名的文件。

    标签: Linux LDAP 访问 目录

    上传时间: 2014-01-30

    上传用户:shizhanincc

  • LPC21XX系列开发板测试原代码,包括FLASH电源管理MODEMKEY等驱动程序

    LPC21XX系列开发板测试原代码,包括FLASH\电源管理\MODEM\KEY等驱动程序

    标签: MODEMKEY FLASH LPC 21

    上传时间: 2014-01-13

    上传用户:kelimu

  • This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au

    This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code.

    标签: message authentication keyed-hash describes

    上传时间: 2014-01-07

    上传用户:凤临西北

  • Tasks Read the textbook about the details of Vigenére Cipher. Implement the algorithm by C or C++.

    Tasks Read the textbook about the details of Vigenére Cipher. Implement the algorithm by C or C++. Requirements You do this lab in a group of two students. Your program should have input and output as follows: csci>a.out --> Please input the key: receptive --> Please input the plain text: wearediscoveredsaveyourself --> The cipher text is : nicvtwqngfzgvtwavzvcqyglmgj -->The original message is: wearediscoveredsaveyourself • You should test your program with several runs.

    标签: the Implement algorithm textbook

    上传时间: 2013-12-21

    上传用户:bruce5996