虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Through

  • In addition to individual algorithm, Demonstration System is a "data structure" (C language version)

    In addition to individual algorithm, Demonstration System is a "data structure" (C language version) book algorithm corresponding to the code (CPP) and the test operating procedures (VC + +6.0 to the EXE). Through the system can demonstrate that the algorithm source code and operating results

    标签: Demonstration individual algorithm structure

    上传时间: 2013-12-24

    上传用户:change0329

  • First of all, the Applet-phone is a SIP User-Agent with audio and text messaging capabilities. But

    First of all, the Applet-phone is a SIP User-Agent with audio and text messaging capabilities. But i s also embedded in an applet where you can use it as usual if your firewall allow you to use the UDP transport. If not, you can use TCP to carry your voice in a voice messaging fashion. Your voice is recorded and encoded locally then sent as a message, decoded and played back by your peer. Voice messaging allow you to go Through any firewall, so that you can continue to chat and talk with your friends from an applet !

    标签: Applet-phone capabilities User-Agent messaging

    上传时间: 2014-01-11

    上传用户:c12228

  • What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss

    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop Through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)

    标签: Sometimes the contents desire

    上传时间: 2013-12-25

    上传用户:playboys0

  • This document contains a general overview in the first few sections as well as a more detailed refer

    This document contains a general overview in the first few sections as well as a more detailed reference in later sections for SVMpython. If you re already familiar with SVMpython, it s possible to get a pretty good idea of how to use the package merely by browsing Through svmstruct.py and multiclass.py. This document provides a more in depth view of how to use the package. Note that this is not a conversion of SVMstruct to Python. It is merely an embedding of Python in existing C code. All code other than the user implemented API functions is still in C, including optimization.

    标签: document contains detailed overview

    上传时间: 2013-12-14

    上传用户:希酱大魔王

  • Samples are organized by chapter, and then by "application" or example name. You should open a proje

    Samples are organized by chapter, and then by "application" or example name. You should open a project in Visual Studio .NET Through the .sln (solution) file. Note that Visual Studio .NET automatically creates various temporary and debugging files in the obj and bin sub-directory for each project. The actual uncompiled code is only the .vb files that are contained in the root project directory.

    标签: application organized Samples chapter

    上传时间: 2015-12-14

    上传用户:ghostparker

  • Networking for Dummies 8th Edition ,Written for even the most network-shy novice, this book begins w

    Networking for Dummies 8th Edition ,Written for even the most network-shy novice, this book begins with the most basic of basics and progresses Through all the essentials, from cables, routers and hubs to building a wireless network.英文版 CHM格式

    标签: network-shy Networking for Dummies

    上传时间: 2015-12-16

    上传用户:shus521

  • C++, although a marvelous language, isn t perfect. Matthew Wilson has been working with it for over

    C++, although a marvelous language, isn t perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn t just tell you what s wrong with C++, but offers practical techniques and tools for writing code that s more robust, flexible, efficient, and maintainable. He shows you how to tame C++ s complexity, cut Through its vast array of paradigms, take back control over your code--and get far better results

    标签: marvelous although language Matthew

    上传时间: 2014-01-22

    上传用户:妄想演绎师

  • With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s

    With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started Through running enterprise-class User Mode Linux servers. You ll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.

    标签: Linux computer machines virtual

    上传时间: 2013-12-19

    上传用户:xinzhch

  • This paper examines the asymptotic (large sample) performance of a family of non-data aided feedfor

    This paper examines the asymptotic (large sample) performance of a family of non-data aided feedforward (NDA FF) nonlinear least-squares (NLS) type carrier frequency estimators for burst-mode phase shift keying (PSK) modulations transmitted Through AWGN and flat Ricean-fading channels. The asymptotic performance of these estimators is established in closed-form expression and compared with the modified Cram`er-Rao bound (MCRB). A best linear unbiased estimator (BLUE), which exhibits the lowest asymptotic variance within the family of NDA FF NLS-type estimators, is also proposed.

    标签: performance asymptotic examines non-data

    上传时间: 2015-12-30

    上传用户:225588

  • java语言开发的P2P流媒体系统

    java语言开发的P2P流媒体系统,“Stream-2-Stream implements multicast+, a next generation streaming protocol. Multicast+ is more efficient and requires less bandwidth than direct streaming (e.g. shoutcast/icecast). Stream-2-Stream (abbreviated "s2s" or "S2S") stations have no user limit stations can be set up without paying a fortune for bandwidth. Stream-2-Stream saves bandwidth by passing streams from one peer to another Through multicast and unicast p2p, rather than everyone getting a stream from one central server (Shoutcast/Icecast). ”更多:http://s2s.sourceforge.net/about.php

    标签: java P2P 语言 流媒体系统

    上传时间: 2016-01-09

    上传用户:ikemada