虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

time-<b>Scale</b>

  • 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]

    标签: Cryptographic Primitives generate Library

    上传时间: 2015-07-16

    上传用户:wqxstar

  • Software Engineering is a discipline applied by teams to produce high-quality, large-scale, cost-eff

    Software Engineering is a discipline applied by teams to produce high-quality, large-scale, cost-effective software that satisfies the users’ needs, and can be maintained over time Software Development is a weaker term where standards, tools, processes, etc. may not be applied

    标签: high-quality Engineering large-scale discipline

    上传时间: 2014-01-09

    上传用户:bcjtao

  • palm编成,这种书很少,有兴趣看看 Title: Palm Programming: The Developer s Guide URL: http://safari.oreilly.com/J

    palm编成,这种书很少,有兴趣看看 Title: Palm Programming: The Developer s Guide URL: http://safari.oreilly.com/JVXSL.asp?x=1&mode=section&sortKey=rank&sortOrder=desc&view=book&xmlid=1-56592-525-4&open=false&srchText=palm+programming&code=&h=&m=&l=1&catid=&s=1&b=1&f=1&t=1&c=1&u=1&page=0 ISBN: 1-56592-525-4 Author: Julie McKeehan/ Neil Rhodes Publisher: O Reilly Page: 478 Edition: 1st edition (December 1998) Catalog: PDA programming / Palm Format: pdf Size: 2.06M Supplier: Summary: Emerging as the bestselling hand-held computers of all time, PalmPilots have spawned intense developer activity and a fanatical following. Used by Palm in their developer training, this tutorial-style book shows intermediate to experienced C programmers how to build a Palm application from the ground up. Includes a CD-ROM with source code and third-party developer tools

    标签: Programming Developer oreilly safari

    上传时间: 2013-12-10

    上传用户:litianchu

  • acm HDOJ 1051WoodenSticks Description: There is a pile of n wooden sticks. The length and weight o

    acm HDOJ 1051WoodenSticks Description: There is a pile of n wooden sticks. The length and weight of each stick are known in advance. The sticks are to be processed by a woodworking machine in one by one fashion. It needs some time, called setup time, for the machine to prepare processing a stick. The setup times are associated with cleaning operations and changing tools and shapes in the machine. The setup times of the woodworking machine are given as follows: (a) The setup time for the first wooden stick is 1 minute. (b) Right after processing a stick of length l and weight w , the machine will need no setup time for a stick of length l and weight w if l<=l and w<=w . Otherwise, it will need 1 minute for setup.

    标签: WoodenSticks Description length wooden

    上传时间: 2014-03-08

    上传用户:netwolf

  • 小程序应有如下功能: 1、登记。登记每位同学的上网卡号

    小程序应有如下功能: 1、登记。登记每位同学的上网卡号,押金(>=5 RMB)和上网时刻。 2、查询。可以查询每个上网卡号的上网时刻,上网的时间,押金和当前的费用。 3、结账。根据卡号可以算出 应收金额,应找金额。 4、提醒。当某个上网卡号的 上网费用 >= 它的押金时应提醒管理员。 5、续费。当某个上网卡号的 上网费用 >= 它的押金,他可以再次交上一定金额的押金(>=5 RMB)。 6、修改费率。上网的费率应可以调整。默认的费率是1 RMB /1小时。 为了不让机房赔本,应是这样的收费模式:先付钱后上网。如上机就五角, 以后过半小时收五角。 7、总账。一天下来管理员要知道这天他赚了多少RMB。 你需要考虑程序被意外结束等特殊情况。 如果你的程序是按系统时间进行计时,还应考虑系统时间被意外更改的特殊情况。总之,你应考虑一切会让你的程序不能正常运行的特殊情况。 如果不知道怎么计时,你可以学习参考使用<time.h>中函数。 说明: a. 假定机房有150台机器。 b. 假定初始的费率是1 RMB /1分钟(便于测试)。

    标签: 程序 上网卡

    上传时间: 2016-06-27

    上传用户:gut1234567

  • The task of clustering Web sessions is to group Web sessions based on similarity and consists of max

    The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra- group similarity while minimizing the inter-group similarity. The first and foremost question needed to be considered in clustering W b sessions is how to measure the similarity between Web sessions.However.there are many shortcomings in traditiona1 measurements.This paper introduces a new method for measuring similarities between Web pages that takes into account not only the URL but also the viewing time of the visited web page.Yhen we give a new method to measure the similarity of Web sessions using sequence alignment and the similarity of W eb page access in detail Experiments have proved that our method is valid and e币cient.

    标签: sessions clustering similarity Web

    上传时间: 2014-01-11

    上传用户:songrui

  • made by: kangkai data:2008.11.23 this one is used to test arm7 str71x. use a led to test

    made by: kangkai data:2008.11.23 this one is used to test arm7 str71x. use a led to test GPIO. a---------P0.0 b---------P0.1 c---------P0.2 d---------P0.3 e---------P0.4 f---------P0.5 g---------P0.6 just run it and you will see the led to show 0-9 all the time.

    标签: test kangkai made 2008

    上传时间: 2016-12-16

    上传用户:moerwang

  • This small utility helps to generate seven segment display codes for different I/O connections. For

    This small utility helps to generate seven segment display codes for different I/O connections. For example, AVR/PIC Port A.0 -> D Segment Port A.1 -> B Segment .... Also it can generate Common Cathode or Common Anode table codes.. I Coded it long time ago. I Hope help someone. Thank you

    标签: connections different generate display

    上传时间: 2014-01-17

    上传用户:开怀常笑

  • This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only b

    This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive.

    标签: up-to-date only cutting-edge material

    上传时间: 2017-07-09

    上传用户:comua

  • Computing and the way people use C for doing it keeps changing as years go by. So overwhelming has b

    Computing and the way people use C for doing it keeps changing as years go by. So overwhelming has been the response to all the previous editions of “Let Us C” that I have now decided that each year I would come up with a new edition of it so that I can keep the readers abreast with the way C is being used at that point in time.

    标签: overwhelming Computing changing people

    上传时间: 2013-12-23

    上传用户:epson850