虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

made

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • Reads/writes text as a character stream, buffering characters so as to provide for the efficient rea

    Reads/writes text as a character stream, buffering characters so as to provide for the efficient reading/writing of characters, arrays, and lines. The buffer size may be specified, or the default size may be used. The default is large enough for most purposes. In general, each read request made of a Reader causes a corresponding read request to be made of the underlying character or byte stream. It is therefore advisable to wrap a BufferedReader around any Reader whose read() operations may be costly, such as FileReaders and InputStreamReaders.

    标签: characters character buffering efficient

    上传时间: 2017-02-20

    上传用户:cjl42111

  • Custom Visual Basic Packager and Installer for Visual Basic Developers. This is a group of standard

    Custom Visual Basic Packager and Installer for Visual Basic Developers. This is a group of standard exe projects 1. Packager 2. Setup1 The packager works like Visual basic Application deployment Wizard. And the setup1 project is used for the installation of the package. This project demonstrates how to compile visual basic project without launching the Vb6 kit and retrieving the dependency Files of any Visual basic project (although roughly done without any specific algorithm), Somebody can help me with this. I don’ t have time for the project, so I don’ t want any comment on the code indentation or arrangement and variable scoping. Comments are in the code therefore it would not be a problem to understand the code. If anyone wants to vote, I will like it Oh! I found some of the setup1 code and modify it with new features, so i have no or less credit for the setup1 project I felt like sharing code with PSCites. Thats why I made it

    标签: Visual Basic Developers Installer

    上传时间: 2017-02-26

    上传用户:FreeSky

  • cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used

    cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide. the method dates back to volder [1959], and due to its versatility and compactness, it made possible the microcoding of the hp35 pocket scientific calculator in 1972. here is some code to illustrate the techniques. ive split the methods into three parts linear, circular and hyperbolic. in the hp35 microcode these would be unified into one function (for space reasons). because the linear mode can perform multiply and divide, you only need add/subtract and shift to complete the implementation. you can select in the code whether to do the multiples and divides also by cordic means. other multiplies and divides are all powers of 2 (these dont count). to eliminate these too, would involve ieee hackery.

    标签: essentially algorithm describe suitably

    上传时间: 2017-03-02

    上传用户:litianchu

  • A new type of cloak is discussed: one that gives all cloaked objects the appearance of a flat conduc

    A new type of cloak is discussed: one that gives all cloaked objects the appearance of a flat conducting sheet. It has the advantage that none of the parameters of the cloak is singular and can in fact be made isotropic. It makes broadband cloaking in the optical frequencies one step closer.

    标签: appearance discussed cloaked objects

    上传时间: 2017-03-30

    上传用户:rishian

  • It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

    It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have however simplified material parameters in order to facilitate easier realization as well as to avoid infinities in optical constants. Here we show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.

    标签: invisibility constructed proposed electrom

    上传时间: 2013-12-18

    上传用户:13215175592

  • Want to try a copy of Linux 2.6.29-rc5 in progess with Angstom and Opie? Opie probably isn t good fo

    Want to try a copy of Linux 2.6.29-rc5 in progess with Angstom and Opie? Opie probably isn t good for much but testing but it is kind of fun. This has a very slow boot, which is much improved since this NAND image was made. NAND image of Linux 2.6.9-rc5 with Angstrom and Opie for test. Download file. Set to NOR and power on. Install using the vivi command "Restore NAND Flash from HOST thru USB" Turn off, set to NAND, turn on. Enjoy.

    标签: Opie probably Angstom progess

    上传时间: 2013-12-17

    上传用户:gaojiao1999

  • It is a good program

    It is a good program,I think it can help you to you study ,and so you can made your own program more better!

    标签: program good It is

    上传时间: 2013-12-30

    上传用户:维子哥哥

  • In c++ risks is a reference to a variable which exists i.e. one 2nd name for the same variable. Thi

    In c++ risks is a reference to a variable which exists i.e. one 2nd name for the same variable. This program is broken up into functions.露the function hand constitutes the entrance point of the program, firstly there is the function message which us affiche hello , and the second function produced 露procedure affich_calcul, one declared the prototype and one it definite after one made the call has this function.

    标签: variable i.e. reference exists

    上传时间: 2013-12-17

    上传用户:netwolf

  • CodeGear Delphi2009 has lots of new features like use of Generics in Delphi. Generic methods, proced

    CodeGear Delphi2009 has lots of new features like use of Generics in Delphi. Generic methods, procedures and data types are made easy to use datatype free working with you classes.

    标签: Delphi CodeGear features Generics

    上传时间: 2017-05-22

    上传用户:fandeshun