OLE Programmer s Reference Information in this online help system is subject to change without notice and does not represent a commitment on the part of Microsoft Corporation. The software and/or files described in this online help system are furnished under a license agreement or nondisclosure agreement. The software and/or files may be used or copied only in accordance with the terms of the agreement. The purchaser may make one copy of the software for backup purposes. No part of this online help system may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or information and retrieval systems, for any purpose other than the purchaser s personal use, without the written permission of Microsoft Corporation.
标签: Information Programmer Reference subject
上传时间: 2015-08-04
上传用户:hxy200501
pop3代理服务器源代码One of the most powerful features of Pop3 Agent is a naive Bayes filter, that is capable of recognizing spam e-mails after appropriate training. Pop3 Agent uses an embedded Firebird database server. Of course, you can configure Pop3 Agent to work with an existing server if there is another Interbase/Firebird installation available in your network. Open the Pop3 Agent home directory, delete or rename gds32.dll and ib_util.dll, and set the INI file parameter FBembedded=0.
标签: features powerful filter Agent
上传时间: 2014-01-10
上传用户:yoleeson
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
标签: PROVIDED INFORMATION THE MICROSOFT
上传时间: 2014-01-06
上传用户:skhlm
Ever wondered how all those COM components that you ve written through the years play along with the .NET runtime. If you are a diehard COM developer interested in knowing how Classic COM Components are positioned in the .NET world or how COM aware clients could consume .NET components, read on.
标签: components the wondered through
上传时间: 2013-12-18
上传用户:kristycreasy
All 3G and GSM specifications have a 3GPP specification number consisting of 4 or 5 digits. (e.g. 09.02 or 29.002). The first two digits define the series as listed in the table below. They are followed by 2 further digits for the 01 to 13 series or 3 further digits for the 21 to 55 series. The term "3G" means a 3GPP system using a UTRAN radio access network the term "GSM" means a 3GPP system using a GERAN radio access network. (Thus "GSM" includes GPRS and EDGE features.)
标签: e.g. specifications specification consisting
上传时间: 2015-08-11
上传用户:yoleeson
LINEINTRGAL Line Integral in a 2D Vector Field. LINEINTRGAL(X,Y,U,V,C) computes the line integral along the lines given in cell array C. X and Y define the coordinates of a rectangular grid over which U and V are defined. X and Y must be monotonic and 2D plaid as % produced by MESHGRID. X, Y, U, and V must all be the same size.
标签: LINEINTRGAL Integral computes integral
上传时间: 2014-01-13
上传用户:hwl453472107
UWB 功率控制 容量 Main Matlab script is in runsim.m. It generates random topologies, optimizes, and display results. IMPORTANT: you may need to add manually the lib path in Matlab in order to get all the necessary functions. Reference: Radunovic, Le Boudec, "Joint Power Control, Scheduling and Routing in UWB networks"
标签: topologies generates optimizes Matlab
上传时间: 2015-08-14
上传用户:shanml
C-Talk is interpreted scripting language with C-like syntax and dynamic type checking. Variables in C-Talk have no type. So there is no compile time type checking in C-Talk, all checking is performed at runtime. To preserve reference integrity, explicit memory deallocation is prohibited in C-Talk, unused objects are automatically deallocated by garbage collector.
标签: interpreted Variables scripting checking
上传时间: 2015-08-18
上传用户:王者A
JDiff is a Javadoc doclet which generates an HTML report of all the packages, classes, constructors, methods, and fields which have been removed, added or changed in any way, including their documentation, when two APIs are compared. This is very useful for describing exactly what has changed between two releases of a product. Only the API (Application Programming Interface) of each version is compared. It does not compare what the source code does when executed.
标签: constructors generates packages Javadoc
上传时间: 2015-09-06
上传用户:lijianyu172
2005 Center for Biological & Computational Learning at MIT and MIT All rights reserved. Permission to copy and modify this data, software, and its documentation only for internal research use in your organization is hereby granted, provided that this notice is retained thereon and on all copies. This data and software should not be distributed to anyone outside of your organization without explicit written authorization by the author(s) and MIT.
标签: Computational Biological MIT Permissio
上传时间: 2014-01-27
上传用户:gaome