虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

WANT

  • Software Testing, Second Edition provides practical insight into the world of software testing and q

    Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software is ready for release. Updated from the previous edition in 2000 to include a chapter that specifically deals with testing software for security bugs, the processes and techniques used throughout the book are timeless. This book is an excellent investment if you WANT to better understand what your Software Test team does or you WANT to write better software.

    标签: practical Software provides software

    上传时间: 2015-04-30

    上传用户:bjgaofei

  • JBoss, one of the leading java Open Source groups, integrates and develops these services for a full

    JBoss, one of the leading java Open Source groups, integrates and develops these services for a full J2EE-based implementation. JBoss provides JBossServer, the basic EJB container, and Java Manage Preface 18 Great Events of the Twentieth Centuryment Extension (JMX) infrastructure. It also provides JBossMQ, for JMS messaging, JBossTX, for JTA/JTS transactions, JBossCMP for CMP persistence, JBossSX for JAAS based security, and JBossCX for JCA connectivity. Support for web components, such as servlets and JSP pages, is providedby an abstract integration layer. Implementations of the integration service are provided for third party servlet engines like Tomcat and Jetty. JBoss enables you to mix and match these components through JMX by replacing any component you WANT with a JMX compliant implementation for the same APIs.

    标签: integrates develops services leading

    上传时间: 2014-11-03

    上传用户:wsf950131

  • The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he

    The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are some simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you WANT a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)

    标签: ptfsf following the contains

    上传时间: 2013-11-28

    上传用户:风之骄子

  • Expert Choice represents a significant contribution to the decision making process 工t assists a deci

    Expert Choice represents a significant contribution to the decision making process 工t assists a decision maker in solving complex problems involving many criteria and several courses of action . An Expert Choice solution to a problem reflects the expertise of the decision maker , not the computer . Behavioral scientists have spent many years studying the human mind and how it makes decisions . They have found that humans are influenced by their previous experiences and this causes them to have biases . Basic instincts , preferences and environmental factors also play key roles in how we analyze data and make decisions . There 15 way to remove these factors from human decision making , nor would we necessarily WANT to , but as the problems of our world become more and more complex , it 15 necessary for us to employ a framework to help make more logical and less biased decisions while still taking our feelings and intuition into consideration .

    标签: contribution significant represents decision

    上传时间: 2015-06-02

    上传用户:gmh1314

  • Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in the

    Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll WANT this book beside you every step of the way.

    标签: 802.11 introduction Beginning Security

    上传时间: 2013-12-04

    上传用户:CHINA526

  • This a set of notes I put together for my Computer Architecture class in 1990. Students had a proje

    This a set of notes I put together for my Computer Architecture class in 1990. Students had a project in which they had to model a microprocessor architecture of their choice. They used these notes to learn VHDL. The notes cover the VHDL-87 version of the language. Not all of the language is covered (about 95%). You may use this booklet for your own personal learning purposes. You may not use it for profit (eg, selling copies of it, using it in a course for which people pay, etc). If you WANT to make use of it beyond these conditions, contact me and we can come to some arrangement.

    标签: Architecture Computer Students together

    上传时间: 2014-01-15

    上传用户:wxhwjf

  • If we have two individually sorted vectors "a" and "b" but they are not sorted with respect to each

    If we have two individually sorted vectors "a" and "b" but they are not sorted with respect to each other and we WANT to merge them into vector "c" such that "c" is also a sorted vector. Then c=mergesorted(a,b) can be used.

    标签: sorted individually respect vectors

    上传时间: 2015-09-23

    上传用户:comua

  • This practical, roll-up-your-sleeves guide distills years of ingenious XML hacking into a complete s

    This practical, roll-up-your-sleeves guide distills years of ingenious XML hacking into a complete set of tips, tricks, and tools for web developers, system administrators, and programmers who WANT to leverage the untapped power of XML. If you WANT more than the average XML user--to explore and experiment, discover clever shortcuts, and show off just a little (and have fun in the process)--this invaluable book is a must-have.

    标签: roll-up-your-sleeves practical ingenious distills

    上传时间: 2015-11-01

    上传用户:lili123

  • 用vc实现的连接sql数据库程序

    用vc实现的连接sql数据库程序,主要是管理方面的一些。you can add some new student news.And you can search news that you WANT.

    标签: sql 连接 数据库 程序

    上传时间: 2014-11-24

    上传用户:lgnf

  • UCOS/II for ICCAVR - The version of UCOS/II is 2.04 - the original port was done by Ole Saether

    UCOS/II for ICCAVR - The version of UCOS/II is 2.04 - the original port was done by Ole Saether for the IAR compiler. Jens E. Holtegaard ported one version using ICCAVR. Joerg Meyer did another port (using Jens port as a start?). This is basically Joerg s port plus a little bit of changes and documentation by me. - YOU MUST DOWNLOAD THE MAIN PART OF THE UCOS/II FROM THE UCOS/II WEBSITE http://www.ucos-ii.com . The supplied project file assumes the portable source is in the ..\source directory. - Joerg has written couple document showing the stack frames etc. but it is in German :-) They are included in this directory. - The Timer2 overflow interrupt is used for Timer Tick. If you WANT to change that, modify os_cpu_c.c and os_cpu_a.s - I have tested this using ATMega103 with and without external RAM using AVR Studio simulator. See test1.c test program. Both Code Compressed (PRO) and STD versions have been tested.

    标签: UCOS original Saether version

    上传时间: 2015-11-14

    上传用户:ippler8