虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

There

  • fantastic j2me user interface designer for midp2.0 cldcd 1.1. Works on many phones as a generic appl

    fantastic j2me user interface designer for midp2.0 cldcd 1.1. Works on many phones as a generic application. This is not my own software but for those who don t know it already: check it out. There s a super cool sample application that shows you all of the amazing possibilities for your phone.

    标签: fantastic interface designer generic

    上传时间: 2014-01-17

    上传用户:ecooo

  • This application provides much functionality for creating data-driven reports, including preview, gr

    This application provides much functionality for creating data-driven reports, including preview, graphics, and formatting. There is no documentation so you may have to work with it awhile, but There is a demo on how to use it, and the functionality is rich.

    标签: functionality application data-driven including

    上传时间: 2017-07-21

    上传用户:skhlm

  • 里面有课程设计详细说明书和数据流程图

    里面有课程设计详细说明书和数据流程图,还有业务流程图-Library Management System Design Manual, There are curriculum design and data flow chart of a detailed prospectus, as well as the operational flow chart

    标签: 说明书 数据 流程图

    上传时间: 2017-07-23

    上传用户:xinyuzhiqiwuwu

  • Solve the 8-puzzle problem using A * algorithme. Input: Program reads start state and goal state

    Solve the 8-puzzle problem using A * algorithme. Input: Program reads start state and goal state and heuristic (N or S) from EightPuzzle.INP file.0 representing blank. There are 2 Heuristic: 1. N: Number of misplaced tiles 2. S: Sum of Manhattan distance of current location and target location. Format: The first line write type of heuristic (N or S). Next is the status of departing and landing status. Between 2 states of 1 line blank. See examples EightPuzzle.INP

    标签: state algorithme Program problem

    上传时间: 2017-08-12

    上传用户:jjj0202

  • Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write

    Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write natural Java objects and some simple configuration files, and Hibernate automates all the interaction between your objects and the database. You don t even need to know the database is There, and you can change from one database to another simply by changing a few statements in a configuration file. If you ve needed to add a database backend to your application, don t put it off. It s much more fun than it used to be, and Hibernate: A Developer s Notebook shows you why.

    标签: Hibernate persistence Developer you

    上传时间: 2017-08-17

    上传用户:曹云鹏

  • C++ is a programming language. It is a programming language of many different dialects, just like

    C++ is a programming language. It is a programming language of many different dialects, just like each language that is spoken has many dialects. In C though, they are not because the "speakers" live in the North, South, or grew up in some other place, it is because There are so many compilers. There are about four major ones: Borland C++, Microsoft Visual C++, Watcom C/386, and DJGPP. You can download DJGPP http://www.delorie.com/djgpp/ or you may already have another compiler. Each of these compilers is a little different. The library functions of one will have all of the standard C++ functions, but they will also have other functions or, continuing the analogy, words. At times, this can lead to confusion, as certain programs will only run under certain compilers, though I do not believe this to be the case with the programs in these tutorials.

    标签: programming language different dialects

    上传时间: 2014-01-17

    上传用户:lz4v4

  • Feeding antennas with proper signals can be difficult. The signal is often described as a voltage, a

    Feeding antennas with proper signals can be difficult. The signal is often described as a voltage, and voltages are not well defined in electromagnetic wave formulations. There are several tricks to model voltage generators in such situations, and one is the magnetic frill. This model shows the basic steps of defining a magnetic frill voltage generator for a dipole antenna, and it also compares the resulting antenna impedance with known results.

    标签: difficult described antennas Feeding

    上传时间: 2013-12-25

    上传用户:yulg

  • Feeding antennas with proper signals can be difficult. The signal is often described as a voltage, a

    Feeding antennas with proper signals can be difficult. The signal is often described as a voltage, and voltages are not well defined in electromagnetic wave formulations. There are several tricks to model voltage generators in such situations, and one is the magnetic frill. This model shows the basic steps of defining a magnetic frill voltage generator for a dipole antenna, and it also compares the resulting antenna impedance with known results.

    标签: difficult described antennas Feeding

    上传时间: 2013-12-21

    上传用户:GavinNeko

  • Programming the video game for the evil genius by jumping start the java with project examples. Ther

    Programming the video game for the evil genius by jumping start the java with project examples. There are over 50 projects from racing, boarding, java man to brain buster games.

    标签: the Programming examples jumping

    上传时间: 2014-12-04

    上传用户:

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time There are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though There have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    标签: cryptographic applications attractive for

    上传时间: 2013-12-07

    上传用户:zhuimenghuadie