虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

must

  • 利用java实现文件的AES加密功能 This Java AES Crypt package contains the Java class es.vocali.util.AESCrypt, whi

    利用java实现文件的AES加密功能 This Java AES Crypt package contains the Java class es.vocali.util.AESCrypt, which provides file encryption and decryption using aescrypt file format. Requirements The Java AES Crypt package only works in Java 6, but can be easily adapted to Java 5 by replacing the call to NetworkInterface.getHardwareAddress() with something else. In order to use 256 bit AES keys, you must download and install "Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files" from http://java.sun.com/javase/downloads/index.jsp

    标签: Java AES AESCrypt contains

    上传时间: 2017-02-11

    上传用户:kiklkook

  • This file contains board-specific information for the Motorola cpv3060 target board. Specifically,

    This file contains board-specific information for the Motorola cpv3060 target board. Specifically, this file contains information on any BSP interface changes from previous software or hardware versions, and contains caveats that the user must be aware of before using this BSP. Additionally, the target board s reference entry (i.e., cpv3060/target.nr) provides board-specific information necessary to run VxWorks, and should be read before this BSP is used.

    标签: board-specific Specifically information Motorola

    上传时间: 2017-02-16

    上传用户:libinxny

  • This file contains board-specific information for the Motorola LoPEC in support of the lopec BSP. S

    This file contains board-specific information for the Motorola LoPEC in support of the lopec BSP. Specifically, this file contains information on any BSP interface changes from previous software or hardware versions, and contains caveats that the user must be aware of before using this BSP. Additionally, the target board s manual page entry (for example, lopec/target.nr) provides board-specific information necessary to run VxWorks, and should be read before this BSP is used.

    标签: board-specific information the Motorola

    上传时间: 2013-12-05

    上传用户:a673761058

  • Instead of finding the longest common subsequence, let us try to determine the length of the LCS.

    Instead of finding the longest common subsequence, let us try to determine the length of the LCS. 􀂄 Then tracking back to find the LCS. 􀂄 Consider a1a2…am and b1b2…bn. 􀂄 Case 1: am=bn. The LCS must contain am, we have to find the LCS of a1a2…am-1 and b1b2…bn-1. 􀂄 Case 2: am≠bn. Wehave to find the LCS of a1a2…am-1 and b1b2…bn, and a1a2…am and b b b b1b2…bn-1 Let A = a1 a2 … am and B = b1 b2 … bn 􀂄 Let Li j denote the length of the longest i,g g common subsequence of a1 a2 … ai and b1 b2 … bj. 􀂄 Li,j = Li-1,j-1 + 1 if ai=bj max{ L L } a≠b i-1,j, i,j-1 if ai≠j L0,0 = L0,j = Li,0 = 0 for 1≤i≤m, 1≤j≤n.

    标签: the subsequence determine Instead

    上传时间: 2013-12-17

    上传用户:evil

  • The CSS Cookbook cuts straight through the theory to provide hundreds of useful examples and CSS cod

    The CSS Cookbook cuts straight through the theory to provide hundreds of useful examples and CSS code recipes you can use immediately to format your web pages. Reflecting CSS2 and including topics that range from basic web typography and page layout to techniques for formatting lists, forms, and tables, the CSS Cookbook is a must-have resource for any web author who has even considered using CSS.

    标签: CSS Cookbook straight hundreds

    上传时间: 2013-12-21

    上传用户:sjyy1001

  • .NET Remoting is very important in distributed environments. This book essentially deals with the co

    .NET Remoting is very important in distributed environments. This book essentially deals with the core concepts of .NET remoting along with some working examples. A must read.

    标签: environments distributed essentially important

    上传时间: 2014-01-18

    上传用户:familiarsmile

  • Shortest Paths with Multiplicative Cost. In a given undirected graph, the path cost is measured as a

    Shortest Paths with Multiplicative Cost. In a given undirected graph, the path cost is measured as a product of all the edges in the path. The weights are rational numbers (e.g., 0.25, 0.75, 3.75 etc) or integers (2, 3). There are no negative edges. Given such a graph as input, you are to output the shortest path between any two given vertices. Input is the adjacency matrix and the two vertices. You must output the path.

    标签: Multiplicative undirected Shortest measured

    上传时间: 2017-04-08

    上传用户:邶刖

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    标签: perceptual implementation algorithms fingerpr

    上传时间: 2013-12-08

    上传用户:星仔

  • The Fat Fs module is a middleware that written in ANSI C. There is no platform dependence, so long a

    The Fat Fs module is a middleware that written in ANSI C. There is no platform dependence, so long as the compiler is in compliance with ANSI C. However it handles the system portable FAT structures. You must take the endian into consideration. It must be changed for your platform first or the compiler will abort with an error.

    标签: C. dependence middleware platform

    上传时间: 2014-01-12

    上传用户:cccole0605

  • This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND.

    This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND. Author(s): Ole Saether DESCRIPTION: This example should be used together with ex2a-tx433.asm. One nRF9E5 evaluation board (receiver) should be programmed with the hex-file generated from assembling this file and the other evaluation board (transmitter) programmed with the hex-file generated from assembling ex2a-tx433.asm. All switches on the DIP-swith S206 on the receiver must be set to the "on" position and all switches on the DIP-swith S205 on the transmitter must be set to the "on" position. When one of the switched SW1-SW4 on the transmitter is pressed the corresponding LED on the receiver is turned on. The functionality is the same as in ex2c-rx.c.

    标签: distributed WARRANTY WITHOUT useful

    上传时间: 2017-05-17

    上传用户:xieguodong1234