Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before entering the membership secured areas. Features: 1. Flexibility LM3.0 allows administrator to integrate it with the current unprotected website. This is especially useful if major changes are going to be painful. With LM3.0, you re just one step towards getting the security you needed most. 2. Speed LM3.0 uses PHP and MySQL which enables fast data transactions.
标签: authentication 3.0 integrate existing
上传时间: 2017-06-06
上传用户:hullow
迷宫算法(maze) /* Maze * Starting point is m[0][0], need to find a path go to m[9][9]. 0 means OK, * 1 means cannot go there, boundary is 0 and 9, cannot go beyond boundary. * Each step can be made horizontally or vertically for one more grid (diagonal * jump is not allowed). * Your program should print a series of grid coordinates that start from m[0][0] * and go to m[9][9] * Hint: No need to find the shortest path, only need to find one path that gets * you to desitination. */
上传时间: 2013-12-27
上传用户:Divine
Software-defined radios (SDRs) have been around for more than a decade. The first complete Global Positioning System (GPS) implementation was described by Dennis Akos in 1997. Since then several research groups have presented their contributions.We therefore find it timely to publish an up-to-date text on the subject and at the same time include Galileo, the forthcoming European satellitebased navigation system. Both GPS and Galileo belong to the category of Global Navigation Satellite Systems (GNSS).
标签: Software-defined complete Global radios
上传时间: 2017-06-08
上传用户:wkchong
迷宫探险算法,一个CPP文件实现。在TC下编译生成。生成的程序是dos exe。LEFT/UP/RIGHT/DOWN 在迷宫中向左、上、右、下走一步。走过的路线显示为黄色,回头路显示为红色。
上传时间: 2017-06-10
上传用户:
With this example-driven book, you get a quick, practical, and thorough introduction to Java s API for XML Web Services (JAX-WS) and the Java API for RESTful Web Services (JAX-RS). Java Web Services: Up and Running takes a clear, no-nonsense approach to these technologies by providing you with a mix of architectural overview, complete working code examples, and short yet precise instructions for compiling, deploying, and executing a sample application. You ll not only learn how to write web services from scratch, but also how to integrate existing services into your Java applications. All the source code for the examples is available from the book s companion website.
标签: example-driven introduction practical thorough
上传时间: 2013-12-18
上传用户:lnnn30
A user-space device driver can do many of the things that kernel drivers can t, such as perform a long-running computation, block while waiting for an event, or read files from the file system. Unlike kernel drivers, a user-space device driver can use other device drivers--that is, access the network, talk to a serial port, get interactive input from the user, pop up GUI windows, or read from disks. User-space drivers implemented using FUSD can be much easier to debug it is impossible for them to crash the machine, are easily traceable using tools such as gdb, and can be killed and restarted without rebooting even if they become corrupted. FUSD drivers don t have to be in C--Perl, Python, or any other language that knows how to read from and write to a file descriptor can work with FUSD. User-space drivers can be swapped out, whereas kernel drivers lock physical memory.
标签: user-space can drivers perform
上传时间: 2014-01-01
上传用户:saharawalker
Wishbone to LPC (Low-Pin Count) Bridge, includes master and slave modules. Supports 8-bit I/O Read and Write cycles, 8-bit Memory Read/Write cycles, DMA cycles, and up to 32-bit Firmware memory read/write cycles. Serial IRQ support is also provided. None of this has been tested (yet) with a third-party LPC Peripheral or Host.
标签: Wishbone Supports includes Low-Pin
上传时间: 2014-12-20
上传用户:古谷仁美
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.
标签: implementation twofish cipher VHDL
上传时间: 2017-06-25
上传用户:王小奇
Normally a list view is updated by a user directly by selecting a list view item and then editing or deleting it. New items are usually added at the bottom of the list. This works fine since the user knows which items have been changed or deleted and where the new items will pop up. A drawback of it is that, if the list is sorted, then new items will not be displayed in a sorted way, instead they will be listed in the order of being created.
标签: list view selecting Normally
上传时间: 2017-07-02
上传用户:Pzj
The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution.
标签: application real-time Synopsys emphasis
上传时间: 2017-07-05
上传用户:waitingfy