虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Most

Most是一个面向媒体的信息传输系统。是利用光导纤维作为信息传导媒介,进行数字信号的传输。首先各控制元件将电磁脉冲信号转化为光脉冲信号,传送到光纤上,而后相应的接收电脑又将光脉冲信号转换回电磁脉冲信号,从而完成相应的控制功能。由于Most系统的高传输速率,因此它可以做到只用两根光纤即可同时传递多路信号。
  • If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis

    If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will Most likely get a message saying, "To help protect your security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高级程序设计 里面自代源码

    标签: restriction Explorer Internet security

    上传时间: 2016-11-18

    上传用户:源弋弋

  • Range imaging offers an inexpensive and accurate means for digitizing the shape of three-dimensiona

    Range imaging offers an inexpensive and accurate means for digitizing the shape of three-dimensional objects. Because Most objects self occlude, no single range image suffices to describe the entire object. We present a method for combining a collection of range images into a single polygonal mesh that completely describes an object to the extent that it is visible from the outside.

    标签: three-dimensiona inexpensive digitizing accurate

    上传时间: 2016-11-29

    上传用户:yxgi5

  • The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performanc

    The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performance benchmark test originally developed by Reinhold Weicker in 1984. This benchmark is used to measure and compare the performance of different computers or, in this case, the efficiency of the code generated for the same computer by different compilers. The test reports general performance in dhrystones per second. Like Most benchmark programs, dhrystone consists of standard code and concentrates on string handling. It uses no floating-point operations. It is heavily influenced by hardware and software design, compiler and linker options, code optimizing, cache memory, wait states, and integer data types. The DHRY program is available in different targets: Simulator: Large Model: DHRY example in LARGE model for Simulation Philips 80C51MX: DHRY example in LARGE model for the Philips 80C51MC

    标签: general-performanc benchmarks Dhrystone dhrystone

    上传时间: 2016-11-30

    上传用户:hphh

  • BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that th

    BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse: Get the Most out of the built-in applications Take control of email with filters, searches, and more Rev up your mobile gaming--whether you re an arcade addict or poker pro Browse the web, chat over IM, and keep up with news and weblogs Work with office documents, spell check your messages, and send faxes Become more secure, lock down your BlackBerry and stash secure information somewhere safe Manage and monitor the BlackBerry Enterprise Server (BES) and Mobile Data System (MDS) Create web sites that look great on a BlackBerry Develop and deploy BlackBerry applications

    标签: BlackBerry computing enhance mobile

    上传时间: 2016-12-07

    上传用户:GavinNeko

  • Design patterns are elegant, adaptable, and reusable solutions to everyday software development prob

    Design patterns are elegant, adaptable, and reusable solutions to everyday software development problems. Programmers use design patterns to organize objects in programs, making them easier to write and modify. C# Design Patterns: A Tutorial is a practical guide to writing C# programs using the Most common patterns. This tutorial begins with clear and concise introductions to C#, object-oriented programming and inheritance, and UML diagrams. Each chapter that follows describes one of twenty-three design patterns, recommends when to use it, and explains the impact that it will have on the larger design. The use of every pattern is demonstrated with simple example programs. These programs are illustrated with screen shots and UML diagrams displaying how the classes interact. Each of these programs is available on the companion CD-ROM and can be run, examined, edited, and applied.

    标签: development adaptable solutions patterns

    上传时间: 2014-09-07

    上传用户:wangchong

  • The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

    The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the Most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.

    标签: cryptography literature has Secrecy

    上传时间: 2016-12-08

    上传用户:fxf126@126.com

  • This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page

    This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but Most of the techniques discussed have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL Injection". The paper covers in more detail some of the points described in its predecessor, providing examples to clarify areas where the previous paper was perhaps unclear. An effective method for privilege escalation is described that makes use of the openrowset function to scan a network. A novel method for extracting information in the absence of helpful error messages is described the use of time delays as a transmission channel. Finally, a number of miscellaneous observations and useful hints are provided, collated from responses to the original paper, and various conversations around the subject of SQL injection in a SQL Server environment.

    标签: Server SQL Injection Microsoft

    上传时间: 2014-07-28

    上传用户:xhz1993

  • ResOrg 图形化管理Vc项目的资源ID的工具的源代码。 ResOrg - Manage and Renumber Resource Symbol IDs Introduction The

    ResOrg 图形化管理Vc项目的资源ID的工具的源代码。 ResOrg - Manage and Renumber Resource Symbol IDs Introduction The Resource ID Organiser (ResOrg for short) is an Add-in for Visual C++ designed to help overcome one of the Most annoying (and unnecessary) chores of developing/maintaining Windows applications - maintaining resource symbol ID values.

    标签: ResOrg Introduction Renumber Resource

    上传时间: 2013-12-25

    上传用户:dsgkjgkjg

  • sqlite的帮助文档

    sqlite的帮助文档, This ZIP archive contains Most of the static HTML files that comprise this website, including all of the SQL Syntax and the C/C++ interface specs and other miscellaneous documentation.

    标签: sqlite 文档

    上传时间: 2013-12-23

    上传用户:evil

  • RChart 2.1 for the Java[TM] Platform and SWT 有源码

    RChart 2.1 for the Java[TM] Platform and SWT 有源码,例子 Most popular java component which has been available since 2000 and has been ported also to .NET and Php programming languages

    标签: Platform RChart Java 2.1

    上传时间: 2014-08-24

    上传用户:playboys0