虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

On-the-Go

  • 很丰富的 Registry 改动例子

    很丰富的 Registry 改动例子,很多特别的例子 如: Change The Internet explorer Title, Showing the Windows Version on the Desktop Remove the shortcut arrows from all your icons Creating 3D Window Effect To prevent any changes to the Start Menu Disable Registry Editing Tools

    标签: Registry

    上传时间: 2017-02-11

    上传用户:爺的气质

  • 自己写的robocup-2d程序

    自己写的robocup-2d程序,从UVA改编 This method is the first complete simple team and defines the actions taken by all the players on the field (excluding the goalie). It is based on the high-level actions taken by the simple team FC Portugal that it released in 2000.

    标签: robocup 程序

    上传时间: 2014-01-27

    上传用户:上善若水

  • Custom Visual Basic Packager and Installer for Visual Basic Developers. This is a group of standard

    Custom Visual Basic Packager and Installer for Visual Basic Developers. This is a group of standard exe projects 1. Packager 2. Setup1 The packager works like Visual basic Application deployment Wizard. And the setup1 project is used for the installation of the package. This project demonstrates how to compile visual basic project without launching the Vb6 kit and retrieving the dependency Files of any Visual basic project (although roughly done without any specific algorithm), Somebody can help me with this. I don’ t have time for the project, so I don’ t want any comment on the code indentation or arrangement and variable scoping. Comments are in the code therefore it would not be a problem to understand the code. If anyone wants to vote, I will like it Oh! I found some of the setup1 code and modify it with new features, so i have no or less credit for the setup1 project I felt like sharing code with PSCites. Thats why I made it

    标签: Visual Basic Developers Installer

    上传时间: 2017-02-26

    上传用户:FreeSky

  • WiiFuse is a FUSE filesystem module for Linux and Mac OS X. It will let you mount a Wii disc ISO an

    WiiFuse is a FUSE filesystem module for Linux and Mac OS X. It will let you mount a Wii disc ISO and browse its contents, and it contains a server which may be run on the Wii so you can browse the contents of the Wii s internal filesystem.

    标签: X. filesystem WiiFuse module

    上传时间: 2013-12-18

    上传用户:rocketrevenge

  • ShCti driver user s manual, y Details NDIS driver development, Under XP-driven development (Eng

    ShCti driver user s manual, y Details NDIS driver development, Under XP-driven development (Engl Based on the expansion of passthr Parallel and Distributed Simulati The driver of a scanner to prepar Tuopu TCB8000 Chinese liquid crys USB development with Delphi sourc This is a printer port control-dr

    标签: development driver XP-driven Details

    上传时间: 2014-01-09

    上传用户:黄华强

  • Measuring Frequency Content in Signals I this section we will study some non parametric methods fo

    Measuring Frequency Content in Signals I this section we will study some non parametric methods for spectrum estimation of a stochastic process. These methods are described in the literature. All methods are based on the Periodogram which is defined for a sequence x[n] with length N according to

    标签: parametric Measuring Frequency Content

    上传时间: 2017-03-20

    上传用户:秦莞尔w

  • Code was successfully implemented within ALtera FPGA with Quartus 6.0. It presents two polish own fe

    Code was successfully implemented within ALtera FPGA with Quartus 6.0. It presents two polish own female names: ULA and ALA whose are scrolling on the 4-columns crystal LED. When you press the switch it will turn from ULA into ALA and continue scrolling.

    标签: successfully implemented presents Quartus

    上传时间: 2013-12-09

    上传用户:zjf3110

  • 在网络安全中经常会遇到rootkit

    在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    标签: rootkit 网络安全

    上传时间: 2017-04-04

    上传用户:xaijhqx

  • Symbolic Representations of Time Series... SAX is just as good as other representations, or working

    Symbolic Representations of Time Series... SAX is just as good as other representations, or working on the raw data for most problems (Slides shown at the end of this presentation)

    标签: Representations representations Symbolic working

    上传时间: 2014-01-16

    上传用户:dongqiangqiang

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    标签: perceptual implementation algorithms fingerpr

    上传时间: 2013-12-08

    上传用户:星仔