虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

around

  • This article describes how to consume Web services in Java 1.5.0 using the new JAX-WS 2.0 API (JSR 2

    This article describes how to consume Web services in Java 1.5.0 using the new JAX-WS 2.0 API (JSR 228). Developers around the world, including me, have always complained about the hard ways to work in Java to consume even a Web service as simple as adding two numbers. However, with JAX-WS 2.0 API now available in core Java in JDK 1.5.0, life is simple like never before.

    标签: describes services article consume

    上传时间: 2013-11-27

    上传用户:kelimu

  • This article presents GISCoordinate.java - a class that allows you to represent a GIS coordinate in

    This article presents GISCoordinate.java - a class that allows you to represent a GIS coordinate in your JAVA code in decimal degrees (38.4443, e.g. 122.33433) , minute degrees (33 44 22E, 122 33 44N), or radian degrees. Also, you can use this class to manipulate the coordinate, moving it around the globe by giving it distances in feet and direction of travel. You can then extract the new coordinate that is calculated after the travel.

    标签: GISCoordinate coordinate represent presents

    上传时间: 2013-12-02

    上传用户:wangchong

  • Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.

    Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there keep a unix box around to use tools such as Netcat or to test their systems with the unix version of an NT vulnerability exploit. With Netcat for NT part of that feeling disempowerment is over.

    标签: the resource Netcat Swiss

    上传时间: 2017-04-02

    上传用户:onewq

  • Mac OS X for Java Geeks delivers a complete and detailed look at the Mac OS X platform, geared speci

    Mac OS X for Java Geeks delivers a complete and detailed look at the Mac OS X platform, geared specifically at Java developers. Programmers using the 10.2 (Jaguar) release of Mac OS X, and the new JDK 1.4, have unprecedented new functionality available to them. Whether you are a Java newbie, working your way through Java Swing and classpath issues, or you are a Java guru, comfortable with digital media, reflection, and J2EE, this book will teach you how to get around on Mac OS X. You ll also get the latest information on how to build applications that run seamlessly, and identically, on Windows, Linux, Unix, and the Mac.

    标签: Mac delivers complete detailed

    上传时间: 2017-04-08

    上传用户:小码农lz

  • There are _NO_ standard sample rate for the samples used in modules. But most often the samples are

    There are _NO_ standard sample rate for the samples used in modules. But most often the samples are done on the rate called C-3 (which is about 16574 Hz if you have a PAL machine). Sometimes drums are sampled at A-3 (around 28 kHz), and some sounds are at ~8 kHz or anything else to save space.

    标签: samples are the standard

    上传时间: 2017-04-14

    上传用户:稀世之宝039

  • A Convex Hull is the smallest convex polygon that contains every point of the set S. A polygon P is

    A Convex Hull is the smallest convex polygon that contains every point of the set S. A polygon P is convex if and only if, for any two points A and B inside the polygon, the line segment AB is inside P. One way to visualize a convex hull is to put a "rubber band" around all the points, and let it wrap as tight as it can. The resultant polygon is a convex hull.

    标签: polygon S. the contains

    上传时间: 2013-12-23

    上传用户:it男一枚

  • The idea is to track mouse cursor movement over the screen, and show enlarged (2x to 8x) section aro

    The idea is to track mouse cursor movement over the screen, and show enlarged (2x to 8x) section around the cursor, in the image control

    标签: enlarged movement section cursor

    上传时间: 2017-07-04

    上传用户:cc1

  • The emphasis of this book is on real-time application of Synopsys tools, used to combat various pro

    The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution.

    标签: application real-time Synopsys emphasis

    上传时间: 2017-07-05

    上传用户:waitingfy

  • FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seap

    FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seapage". The average machine broadcasts a lot of information about itself on open networks. This tool captures and organizes this information. This code is extremely low quality, hacked together in order to demonstrate the problem at the BlackHat Federal 2007 conference. Higher quality code should be available around May 2007 on our website at http://www.erratasec.com.

    标签: tool demonstrate broadcast analysis

    上传时间: 2013-11-30

    上传用户:1101055045

  • Wireless range extenders or wireless repeaters can extend the range of an existing wireless network.

    Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device connected to any of the repeaters in the chain will have a throughput that is limited by the weakest link between the two nodes in the chain from which the connection originates to where the connection ends

    标签: wireless range extenders repeaters

    上传时间: 2014-01-02

    上传用户:zhangyigenius