软件工程方法Prefactoring Prefactoring, in essence, is the art of applying the insights gleaned from previous experience (whether yours or Someone else s) when developing software to new projects. Doing so will likely save you from making costly design changes midstream--and maybe even save your job!
标签: Prefactoring the applying insights
上传时间: 2013-12-22
上传用户:wangchong
I think this the first time every one can look at a PE crypter source in top level language such VC++. So as I promised ... if some one sent me one nice compress source I would publish my source. I dedicate this source to all people who involve in this field. I hope it helps Someone. Have good days ashkbiz Check: yodap.cjb.net
标签: language crypter source think
上传时间: 2013-12-29
上传用户:dianxin61
windows开源代码 Microsoft Windows is a complex operating system. It offers so many features and does so much that it s impossible for any one person to fully understand the entire system. This complexity also makes it difficult for Someone to decide where to start concentrating the learning effort. Well, I always like to start at the lowest level by gaining a solid
标签: Microsoft operating features windows
上传时间: 2015-11-24
上传用户:zhuyibin
When I first studied Kalman filtering, I saw many advanced signal processing submissions here at the MATLAB Central File exchange, but I didn t see a heavily commented, basic Kalman filter present to allow Someone new to Kalman filters to learn about creating them. So, a year later, I ve written a very simple, heavily commented discrete filter.
标签: submissions processing filtering advanced
上传时间: 2015-12-23
上传用户:变形金刚
排队的MMS模型, how could Someone run (execute) your program and if it could be used for the M/M/1 model
上传时间: 2014-01-20
上传用户:mikesering
Parking Lot Simulation: Parking lot attendants often park cars bumper-to-bumper, several cars deep. This maximizes the number of cars they can fit into a parking lot at the expense of complicating the process of retrieving Someone s car when they want to leave. Consider the case of a person wanting to leave the parking lot but their car is parked in the back of a row of cars. In this case, all the cars parked in front of this person s car must be temporarily moved to allow this person to leave.
标签: Parking cars bumper-to-bumper Simulation
上传时间: 2016-02-15
上传用户:lepoke
Lotus Notes开发用的在线DHTML编辑器,基于Active X control 1. This rich text editor is based on the editor used in an older sandbox posting I found. The majority of this code was NOT written by me. Credit goes to Someone at Lotus (I think) for the original code. I only extended the base code to add more features, such as cut/copy/paste and adding tables. 2. This editor is based on an Active X control, so it will only work in Internet Explorer. I tested this in IE 5.5, but I think it should would in IE 5.x The Active X control is marked "safe for scripting" and should not trigger a warning from your browser about unsafe content.
标签: editor control Active Lotus
上传时间: 2016-11-27
上传用户:kr770906
Distributed applications, devices, and services appear in many different arrangements in an enterprise. At your company, you probably access data from your intranet services, from computers distributed throughout the company network, and from services across the firewall out on the Web. For example, you might access a calendar-sharing application or a financial application to fill out expense sheets. Someone must maintain all these applications. Not only the applications, but also the hardware that supports them must be maintained. Resource management encompasses both applications and hardware. In fact, both application and hardware management can be supported through the development of Java Management Extensions (JMX) resource management software. This book will show how you can use JMX to manage and monitor all your resources across an enterprise—both software and hardware.
标签: applications arrangements Distributed different
上传时间: 2014-01-05
上传用户:330402686
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to Someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
This small utility helps to generate seven segment display codes for different I/O connections. For example, AVR/PIC Port A.0 -> D Segment Port A.1 -> B Segment .... Also it can generate Common Cathode or Common Anode table codes.. I Coded it long time ago. I Hope help Someone. Thank you
标签: connections different generate display
上传时间: 2014-01-17
上传用户:开怀常笑