BugTrack is a basic, yet fully functional web based Bug Tracking system that you may use as a framework to create an expanded system or use as is . Great for small teams working on software projects. Features include: - Search by Project, Assigned Person, Priority, Status - Sorting by any of the columns (Bug Name, Project, Priority, Assigned Person, Status) - Login Authentication - Administration of Users - Administration of Priorities - Administration of Projects - Administration of Statuse Good Luck and Thanks trying this system...
标签: functional BugTrack Tracking framew
上传时间: 2017-04-02
上传用户:qilin
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button in order to Add/Remove Users and set user rights. Once you entered Security dialog you may select your Supervisor password. 2. Click OK when finished configuring Users. Don t forget to disable some features in order to see what happens with GUI elements - menus, and buttons.
标签: SecurityBuilderDemo directory password located
上传时间: 2014-01-23
上传用户:chongcongying
lDocumentation for VxVorks 6.2. Migration Guide, Application API Reference, Driver API Reference, BSP developers Guide, CLI Tools Users Guide, Device Driver Developers Guide and more.
标签: Reference lDocumentation Application Migration
上传时间: 2014-01-23
上传用户:songyue1991
Face Recognition Library ======================== Advanced face recognition DLL using two functions : Train and Recognize. Uses neural net back propogation alogorithm with more AI tools added for imaging optimization. Library works great even for a low resolution web cam image and requires the user to align to a mirror frame on screen. Complete Source Code with Video capture and feature extraction kit for Registered Users. Please register here for only $299 with Source Code : http://www.research-lab.com/facerecognitionorder.htm (c) www.research-lab.com
标签: Recognition recognition Advanced Library
上传时间: 2017-04-25
上传用户:784533221
Learn to model various modern communication systems with this book from one of the world s leading authors in communications, John G. Proakis. A very helpful reference to MATLAB Users of various levels
标签: communication leading systems various
上传时间: 2017-05-07
上传用户:jing911003
Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match Users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.
标签: Watermarking watermarking evaluation presented
上传时间: 2013-12-04
上传用户:thinode
nTIM PATRICK has been working professionally as a software architect and developer for nearly 25 years. By day he develops custom business applications in Visual Basic for small to medium- sized organizations. He is a Microsoft Certified Solution Developer (MCSD). In April 2007, Microsoft awarded Tim with its Most Valuable Professional (MVP) award for his work in sup- porting and promoting Visual Basic and its community of Users. Tim received his under- graduate degree in computer science from Seattle Pacific University. You can contact him through his web site, www.timaki.com.
标签: professionally architect developer software
上传时间: 2013-12-26
上传用户:asdfasdfd
The most straightforward approximation is the standard Gaussian approximation, where the MAI is approximated by a Gaussian random variable. This approximation is simple, however it is not accurate in general. In situations where the number of Users is not large, the Gaussian approximation is not appropriate. In-depth analysis of must be applied. The Holtzman?s improved Gaussian approximation provides a better approximation to the MAI term. The approximation conditions the interference term on the operation condition of each user.
标签: approximation straightforward the Gaussian
上传时间: 2017-06-03
上传用户:dyctj
Altera® provides various tools for development of hardware and software for embedded systems. This handbook complements the primary documentation for these tools by describing how to most effectively use the tools. It recommends design styles and practices for developing, debugging, and optimizing embedded systems using Altera-provided tools. The handbook introduces concepts to new Users of Altera’s embedded solutions, and helps to increase the design efficiency of the experienced user.
标签: development for provides embedded
上传时间: 2017-06-15
上传用户:haoxiyizhong
Understanding the Linux Kernel helps readers understand how Linux performs best and how it meets the challenge of different environments. The authors introduce each topic by explaining its importance, and show how kernel operations relate to the utilities that are familiar to Unix programmers and Users.
标签: Linux Understanding understand how
上传时间: 2017-06-17
上传用户:ywqaxiwang