虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

t<b>In</b>k

  • Copyright© 2004 Sergiu Dumitriu, Marta Gî rdea, Că tă lin Hriţ cu Permission is

    Copyright© 2004 Sergiu Dumitriu, Marta Gî rdea, Că tă lin Hriţ cu Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License" All brand names, product names, or trademarks belong to their respective holders.

    标签: Permission Copyright 259 Dumitriu

    上传时间: 2015-04-02

    上传用户:jackgao

  • A very small 250-line library (written entirely in MATLAB) that allows multiple MATLAB programs to t

    A very small 250-line library (written entirely in MATLAB) that allows multiple MATLAB programs to talk to each other, so that hundreds of processors can work together.

    标签: MATLAB entirely multiple programs

    上传时间: 2015-04-03

    上传用户:nanshan

  • 算法ebook(10部算法经典著作的合集) 算法ebook> 10部算法经典著作的合集 chm格式 (1)Fundamentals of Data Structures by Ellis Hor

    算法ebook(10部算法经典著作的合集) 算法ebook> 10部算法经典著作的合集 chm格式 (1)Fundamentals of Data Structures by Ellis Horowitz and Sartaj Sahni (2)Data Structures, Algorithms and Program Style Using C by James F. Korsh and Leonard J. Garrett (3)Data Structures and Algorithm Analysis in C by Mark Allen Weiss (4)Data Structures: From Arrays to Priority Queues by Wayne Amsbury (5)Information Retrieval: Data Structures & Algorithms edited by William B. Frakes and Ricardo Baeza-Yates (6)Introduction to Algorithms by Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest (7)Practical Data Structures in C++ by Bryan Flamig (8)Reliable Data Structures in C by Thomas Plum (9)Data Structures and Algorithms Alfred V. Aho, Bell Laboratories, Murray Hill, New Jersey John E. Hopcroft, Cornell University, Ithaca, New York Jeffrey D. Ullman, Stanford University, Stanford, California (10)DDJ Algorithms and Data Structures Articles

    标签: ebook Fundamentals Structures Ellis

    上传时间: 2015-04-04

    上传用户:tfyt

  • Training embedded apps to process speech may be as easy as finding the right 8-bit micro. Don t let

    Training embedded apps to process speech may be as easy as finding the right 8-bit micro. Don t let what Rodger has to say about using an ADPCM algorithm and PWM output to generate speech to go in one ear and out the other

    标签: Training embedded process finding

    上传时间: 2014-01-26

    上传用户:plsee

  • prolog 找路例子程序: === === === === === === Part 1-Adding connections Part 2-Simple Path example

    prolog 找路例子程序: === === === === === === Part 1-Adding connections Part 2-Simple Path example | ?- path1(a,b,P,T). will produce the response: T = 15 P = [a,b] ? Part 3 - Non-repeating path As an example, the query: ?- path2(a,h,P,T). will succeed and may produce the bindings: P = [a,depot,b,d,e,f,h] T = 155 Part 4 - Generating a path below a cost threshold As an example, the query: ?- path_below_cost(a,[a,b,c,d,e,f,g,h],RS,300). returns: RS = [a,b,depot,c,d,e,g,f,h] ? RS = [a,c,depot,b,d,e,g,f,h] ? no ==================================

    标签: Part connections example prolog

    上传时间: 2015-04-24

    上传用户:ljt101007

  • DELPHI basicCtrl+NUM 直接将光标跳到NUM处

    DELPHI basicCtrl+NUM 直接将光标跳到NUM处,NUM是用Ctrl+Shift+NUM设置的标号。 NUM不能用小键盘。 Ctrl+Home 将光标移至文件头。 Ctrl+End 将光标移至文件尾。 Ctrl+B Buffer List窗口。 Ctrl+I 同Tab键。 Ctrl+M 同Enter键。 Ctrl+N 同Enter键,但光标位置保持不变。 Ctrl+T 删除光标右边的一个单词。 Ctrl+Y 删除光标所在行。 Ctrl+Shift+↑ 光标在函数体内时,将光标快速移至当前函数声明处。 Ctrl+Shift+↓ 光标在函数声明行时,将光标快速移至函数定义处。 Ctrl+Shift+C 声明一个过程或函数后,直接生成过程或函数的名称、begin、end Ctrl+Shift+E 光标在Edit窗口和Explorer窗口间切换。 Ctrl+Shift+G 插入GUID。 Ctrl+Shift+J 弹出Delphi语句提示窗口,选择所需语句将自动完成一条语句。 Ctrl+Shift+T 在光标行加入To-Do注释。 Ctrl+Shift+Y 删除光标之后至本行末尾之间的文本。 Ctrl+F3 Call Stack窗口。 Ctrl+F4 等于File菜单中的Close项。

    标签: basicCtrl NUM DELPHI 光标

    上传时间: 2014-11-26

    上传用户:kr770906

  • How to Use Tables With the JTable (in the API reference documentation) class you can display tables

    How to Use Tables With the JTable (in the API reference documentation) class you can display tables of data, optionally allowing the user to edit the data. JTable doesn t contain or cache data it s simply a view of your data. Here s a picture of a typical table displayed within a scroll pane

    标签: documentation the reference display

    上传时间: 2013-12-23

    上传用户:ayfeixiao

  • This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end

    This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the memory looks so you can identify where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected if there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.

    标签: the embedded detects almost

    上传时间: 2015-05-07

    上传用户:comua

  • RapidForm add-in template for Visual C++. Using this template project, a user can create RapidForm t

    RapidForm add-in template for Visual C++. Using this template project, a user can create RapidForm template conveniently

    标签: RapidForm template project add-in

    上传时间: 2015-05-10

    上传用户:15071087253

  • I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

    I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1

    标签: I. vulnerability Introduction undisclosed

    上传时间: 2015-05-15

    上传用户:xhz1993