虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

almost

  • This is the source code for encryption using the latest AES algorithm. AES algorithm is also called

    This is the source code for encryption using the latest AES algorithm. AES algorithm is also called Rijndael algorithm. AES algorithm is recommended for non-classified use by the National Institute of Standards and Technology(NIST), USA. Now-a-days AES is being used for almost all encryption applications all around the world.

    标签: algorithm encryption AES the

    上传时间: 2014-01-18

    上传用户:xc216

  • 这是个反向工程delphi的程序的全部源代码.能分析几乎所有的结构 Revendepro is a program to reverse engineer Delphi program. Reven

    这是个反向工程delphi的程序的全部源代码.能分析几乎所有的结构 Revendepro is a program to reverse engineer Delphi program. Revendepro finds almost all structures (classes, types, procedures, etc) in the program, and generates the pascal representation, procedures will be written in assembler. Due to some limitation in assembler the generated output can not be recompiled.

    标签: program Revendepro engineer reverse

    上传时间: 2016-07-21

    上传用户:songrui

  • 迭代自适应Simpson

    迭代自适应Simpson,Lobatto积分 In almost every standard book on numerics quadrature algorithms like the adaptive Simpson or the adaptive Lobatto algorithm are presented in a recursive way. The benefit of the recursive programming is the compact and clear representation. However, recursive quadrature algorithms might be transformed into iterative quadrature algorithms without major modifications in the structure of the algorithm. We present iterative adaptive quadrature algorithm (adaptiveSimpson and adaptiveLobatto), which preserves the compactness and the clarity of the recursive algorithms (e.g. quad, quadv, and quadl). Our iterative algorithm provides a parallel calculation of the integration function, which leads to tremendous gain in run-time, in general. Our results suggest a general iterative and not a recursive implementation of adaptive quadrature formulas, once the programming language permits parallel access to the integration function. For details the attached PDF file Conrad_08.pdf.

    标签: Simpson 迭代

    上传时间: 2014-10-25

    上传用户:xc216

  • 不错的 PERL 教程 Find a Perl programmer, and you ll find a copy of Perl Cookbook nearby. Perl Cookbook

    不错的 PERL 教程 Find a Perl programmer, and you ll find a copy of Perl Cookbook nearby. Perl Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Perl. The book contains hundreds of rigorously reviewed Perl "recipes" and thousands of examples ranging from brief one-liners to complete applications. The second edition of Perl Cookbook has been fully updated for Perl 5.8, with extensive changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Recipes have been updated to include the latest modules. New recipes have been added to every chapter of the book, and some chapters have almost doubled in size.

    标签: Cookbook Perl programmer nearby

    上传时间: 2016-11-23

    上传用户:chenbhdt

  • Boost provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work

    Boost provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work well with the C++ Standard Library. Boost libraries are intended to be widely useful, and usable across a broad spectrum of applications. The Boost license encourages both commercial and non-commercial use. We aim to establish "existing practice" and provide reference implementations so that Boost libraries are suitable for eventual standardization. Ten Boost libraries are already included in the C++ Standards Committee s Library Technical Report (TR1) as a step toward becoming part of a future C++ Standard. More Boost libraries are proposed for the upcoming TR2. Boost works on almost any modern operating system, including UNIX and Windows variants. Follow the Getting Started Guide to download and install Boost. Popular Linux and Unix distributions such as Fedora, Debian, and NetBSD include pre-built Boost packages. Boost may also already be available on your organization s internal web server.

    标签: libraries peer-reviewed emphasize provides

    上传时间: 2016-12-05

    上传用户:semi1981

  • Quaternions are hypercomplex numbers (that is generalizations of the complex numbers to higher dimen

    Quaternions are hypercomplex numbers (that is generalizations of the complex numbers to higher dimensions than two). For an introduction, refer to the Wikipedia article on Quaternions. Quaternion toolbox for Matlab® extends Matlab® to allow calculation with matrices of quaternions in almost the same way that one calculates with matrices of complex numbers. This is achieved by defining a private type to represent quaternion matrices and overloadings of many standard Matlab® functions. The toolbox supports real and complex quaternions (that is quaternions with four real or complex components).

    标签: numbers generalizations hypercomplex Quaternions

    上传时间: 2014-11-27

    上传用户:jhksyghr

  • All of Java s Input/Output (I/O) facilities are based on streams, which provide simple ways to read

    All of Java s Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four large categories: input streams and output streams, for reading and writing binary data and readers and writers, for reading and writing textual (character) data. You re almost certainly familiar with the basic kinds of streams--but did you know that there s a CipherInputStream for reading encrypted data? And a ZipOutputStream for automatically compressing data? Do you know how to use buffered streams effectively to make your I/O operations more efficient? Java I/O, 2nd Edition has been updated for Java 5.0 APIs and tells you all you ever need to know about streams--and probably more.

    标签: facilities streams provide Output

    上传时间: 2013-12-17

    上传用户:6546544

  • Last week I posted an article on a simple C++ template class, XYDataArray, I used in my system devel

    Last week I posted an article on a simple C++ template class, XYDataArray, I used in my system development tool. The main purpose of this template class is to store and sort general data types. I needed to implement the same thing in Java, since the tool I developed has a compatible Java version. I checked the Java SDK documentation before writing my own code, and found that almost everything I needed is already there, like the C++ case.

    标签: XYDataArray template article posted

    上传时间: 2017-03-03

    上传用户:问题问题

  • Serial UART open source core. The design is engineered for use as a stand alone chip or for use with

    Serial UART open source core. The design is engineered for use as a stand alone chip or for use with other of our cores. The reason for developing the Serial UART core is the fact, that asynchronous serial communication is very common that almost every machine understands it.Also, for OCRP-1, we needed a way of communication with a host computer, to make it available over the net.

    标签: engineered for use Serial

    上传时间: 2017-03-11

    上传用户:aa17807091

  • Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c

    Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.

    标签: Watermarking watermarking evaluation presented

    上传时间: 2013-12-04

    上传用户:thinode