虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

One

  • Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each rec

    Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each recipe also includes explanations of how and why the approach works, so you can adapt the techniques to similar situations. One of the biggest challenges facing developers today is sorting through the wide variety of tools available form various source and figuring out how to them effectively. The recipes in Java Extreme Programming Cookbook showcase how to use the most important features of these XP tools. Many of these tools are geared towards unit testing, while others are invaluable for continuous integration with these practical examples, you ll be able to choose the most effective tools to accomplish your goals, then implement them in a cohesive development environment quickly.

    标签: cut-and-paste Programming collection Cookbook

    上传时间: 2017-06-29

    上传用户:cmc_68289287

  • *** HyperString v6.0 *** (c)1996-2000 EFD Systems, All rights reserved

    *** HyperString v6.0 *** (c)1996-2000 EFD Systems, All rights reserved efd@mindspring.com *** THIS IS NOT PUBLIC DOMAIN SOFTWARE *** See below for license agreement, disclaimer, installation and use. Introduction --------------------------------------------------------- Welcome to HyperString! One of the most significant new features with Delphi32 is long dynamic strings. However, the built-in functions don t really exploit the full potential of these new strings. HyperString provides over 400 fast, efficient string management routines to help you realize the full power of this highly versatile new data type.

    标签: HyperString reserved Systems rights

    上传时间: 2017-07-04

    上传用户:mhp0114

  • AJAX Book Reader is a complete AJAX client-server application that may be used with a Web browser to

    AJAX Book Reader is a complete AJAX client-server application that may be used with a Web browser to display a sequence of text files One page at a time. The display style is completely controlled by a configuration file. The first application of this is as a book viewer where each chapter resides in a seperate text file. It is also suitable for any case where it is not practical to show all of the text to be displayed at once in the browser window.

    标签: AJAX client-server application complete

    上传时间: 2014-01-02

    上传用户:kikye

  • In number theory, the Euclidean algorithm (also called Euclid s algorithm) is an algorithm to determ

    In number theory, the Euclidean algorithm (also called Euclid s algorithm) is an algorithm to determine the greatest common divisor (GCD) of two elements of any Euclidean domain (for example, the integers). Its major significance is that it does not require factoring the two integers, and it is also significant in that it is One of the oldest algorithms known, dating back to the ancient Greeks.

    标签: algorithm Euclidean Euclid number

    上传时间: 2017-07-17

    上传用户:恋天使569

  • A digital filter structure for wideband filtering is proposed. It consists of two allpass filters a

    A digital filter structure for wideband filtering is proposed. It consists of two allpass filters and a linearphase FIR filter. One major advantage of this structure is that the allpass filters are functions of zM which implies that the maximal sample frequency is M times higher for this structure than for the corresponding conventional structures.

    标签: structure filtering consists proposed

    上传时间: 2014-01-21

    上传用户:weixiao99

  • This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secr

    This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secret image is in LSB of 1st 32 pixels of 1st row of the cover image.This helps in the recovery of secret image. The secret image must be smaller than cover image.A message box will appear with a number ,that number is the maximum product of width and height of secret image that can be successfully embedded in the cover image. The final png image will appear in workspace with random name.This image contains the secret image.One such png image is in the zip file with name 4447.png it contains an image of res 100x122.

    标签: image jpeg png another

    上传时间: 2017-07-25

    上传用户:gououo

  • Exploring C++ uses a series of self–directed lessons to divide C++ into bite–sized chunks that you c

    Exploring C++ uses a series of self–directed lessons to divide C++ into bite–sized chunks that you can digest as rapidly as you can swallow them. The book assumes only a basic understanding of fundamental programming concepts (variables, functions, expressions, statements) and requires no prior knowledge of C or any other particular language. It reduces the usually considerable complexity of C++. The included lessons allow you to learn by doing, as a participant of an interactive education session. You’ll master each step in a One sitting before you proceed to the next. Author Ray Lischner has designed questions to promote learning new material. And by responding to questions throughout the text, youll be engaged every step of the way.

    标签: Exploring directed lessons series

    上传时间: 2014-11-15

    上传用户:caiiicc

  • LIBSVM 是台湾大学林智仁(Chih-Jen Lin)博士等开发设计的一个操作简单、易于使用、快速有效的通用SVM 软件包

    LIBSVM 是台湾大学林智仁(Chih-Jen Lin)博士等开发设计的一个操作简单、易于使用、快速有效的通用SVM 软件包,可以解决分类问题(包括C- SVC、n - SVC )、回归问题(包括e - SVR、n - SVR )以及分布估计(One-class-SVM )等问题,提供了线性、多项式、径向基和S形函数四种常用的核函数供选择,可以有效地解决多类问题、交叉验证选择参数、对不平衡样本加权、多类问题的概率估计等。 2.89版本是09年刚更新的一个版本。

    标签: Chih-Jen LIBSVM Lin SVM

    上传时间: 2014-01-18

    上传用户:baitouyu

  • This article discusses some issues that a typical Windows C++ programmer will encounter when approac

    This article discusses some issues that a typical Windows C++ programmer will encounter when approaching Symbian OS for the first time. Our experience in developing for three successive versions of Symbian OS has given us considerable perspective on what can be difficult when working in this otherwise rich and stable environment. While One reason for Symbian s success may be the desire of many mobile phOne manufacturers not to be tied to Microsoft, the other reason is that Symbian has put together a lightweight, elegant system that succeeds in providing a very impressive range of functionality. Here are some pointers to help ease the transition to successful Symbian OS application development.

    标签: programmer discusses encounter article

    上传时间: 2017-07-30

    上传用户:zhaiyanzhong

  • A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

    A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes compOnents that issue digital certificates and distribute certificate status information. PKI users select One or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using One of their trust anchors.

    标签: Infrastructure cryptographic entities physical

    上传时间: 2017-07-31

    上传用户:561596