虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

ba-T

  • 本附录介绍一些新的A P I函数

    本附录介绍一些新的A P I函数,有了这些函数,便可在自己的计算机上对I P协议统计情况 进行查询和管理。它们有助于获得下面的能力: ■ I p c o n f i g . e x e(或适用于微软Windows 95的Wi n i p c f g . e x e):显示I P配置信息,允许释放 和更新D H C P分配的I P地址。 ■ N e t s t a t . e x e:显示T C P连接表、U D P监听者表以及I P协议统计情况。 ■ R o u t e . e x e:显示并处理网络路由表。 ■ A r p . e x e:显示并修改供“地址解析协议”(A R P)使用的I P到物理地址翻译表。

    标签: 函数

    上传时间: 2014-01-12

    上传用户:569342831

  • This book is about the management of business processes. This is certainly not a new topic. Since t

    This book is about the management of business processes. This is certainly not a new topic. Since the beginning of the Industrial Revolution, it has been written about from every possible point of view—economic, sociological, psychological, accountancy, mechanical engineering and business administration. In this book, we examine the management of business processes from the perspective of computing, or—to put it more broadly—of information technology. The reason is that information technology has made huge leaps forward in recent years, resulting in the creation of completely new ways of organizing business processes. The development of generic software packages for managing business processes—so-called workflow management systems (WFMS)—is particularly important in this respect.

    标签: This management certainly processes

    上传时间: 2013-11-29

    上传用户:shus521

  • 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]

    标签: Cryptographic Primitives generate Library

    上传时间: 2015-07-16

    上传用户:wqxstar

  • PCSC读卡器

    PCSC读卡器,程序,能识别PC上的多个读卡器,并支持T=0,T=1协议

    标签: PCSC 读卡器

    上传时间: 2014-01-11

    上传用户:冇尾飞铊

  • MySQL是一个精巧的SQL数据库管理系统

    MySQL是一个精巧的SQL数据库管理系统,虽然它不是开放源代码的产品,但在某些情况下你可以自由使用。由于它的强大功能、灵活性、丰富的应用编程接口(API)以及精巧的系统结构,受到了广大自由软件爱好者甚至是商业软件用户的青睐,特别是与Apache和PHP/PERL结合,为建立基于数据库的动态网站提供了强大动力。 MySQL有瑞典的T.c.X公司负责开发和维护,MySQL的用户手册很单纯,只有一个集中的<MySQL Reference Manual>,但其内容覆盖了MySQL的所有信息,因此该手册是了解和掌握MySQL的绝佳文献。 虽然对MySQL的开发不能出一份力,但可为它的推广使用尽一份心,面对500多页的参考手册,知道要精确译出它决非易事,但愿几个月的心血能为大家提供一丝微薄的帮助。 由于本人水平有限,文中肯定有不准确的地方,敬请在阅读过程中不吝指出。文中不明之处,请参阅手册原文。 本文的内容针对MySQL 3.23.7alpla,实际上很多内容是通用的。另外,参考手册的几个附录也是很有价值的,但由于时间有限,未能译出,可参见原文。

    标签: MySQL SQL 数据库管理系统

    上传时间: 2013-12-24

    上传用户:GHF

  • The Valgrind distribution has multiple tools. The most popular is the memory checking tool (called M

    The Valgrind distribution has multiple tools. The most popular is the memory checking tool (called Memcheck) which can detect many common memory errors such as: * touching memory you shouldn t (eg. overrunning heap block boundaries) * using values before they have been initialized * incorrect freeing of memory, such as double-freeing heap blocks * memory leaks.

    标签: distribution The Valgrind checking

    上传时间: 2014-01-14

    上传用户:xc216

  • 工程计算MATLAB code to calculate the reorthogonalized sine tapers input: N = the length of the time se

    工程计算MATLAB code to calculate the reorthogonalized sine tapers input: N = the length of the time series data to be tapered p = the number of tapers requested I = the gap structure a vector of length N I(t) = 1 if there is data at time t, t=1, ..., N I(t) = 0 if there is a gap at time t output: X = N-by-p vector of the reorthogonalized sine taper

    标签: the reorthogonalized calculate MATLAB

    上传时间: 2013-12-17

    上传用户:wangyi39

  • RedHat9下apache1.3.28+php4.3.3+mysql4.0.15安装过程操作系统: RedHat 9 软件版本: apache_1.3.28.tar.gz, php-4.3.3.t

    RedHat9下apache1.3.28+php4.3.3+mysql4.0.15安装过程操作系统: RedHat 9 软件版本: apache_1.3.28.tar.gz, php-4.3.3.tar.gz, mysql-4.0.15.tar.gz 所有操作都假定在root下执行.

    标签: apache php RedHat9 RedHat

    上传时间: 2015-07-24

    上传用户:ynzfm

  • zemax源码: This DLL models a standard ZEMAX surface type, either plane, sphere, or conic The surfac

    zemax源码: This DLL models a standard ZEMAX surface type, either plane, sphere, or conic The surface also demonstrates a user-defined apodization filter The filter is defined as part of the real ray trace, case 5 The filter can be used at the stop to produce x-y Gaussian apodization similar to the Gaussian pupil apodization in ZEMAX but separate in x and y. The amplitude apodization is of the form EXP[-(Gx(x/R)^2 + Gy(y/R)^2)] The transmission is of the form EXP[-2(Gx(x/R)^2 + Gy(y/R)^2)] where x^2 + y^2 = r^2 R = semi-diameter The tranmitted intensity is maximum in the center. T is set to 0 if semi-diameter < 1e-10 to avoid division by zero.

    标签: standard surface models either

    上传时间: 2013-12-05

    上传用户:003030

  • encode.v The encoder syndrome.v Syndrome generator in decoder berlekamp.v Berlekamp algorithm in

    encode.v The encoder syndrome.v Syndrome generator in decoder berlekamp.v Berlekamp algorithm in decoder chien-search.v Chien search and Forney algorithm in decoder decode.v The top module of the decoder inverse.v Computes multiplication inverse of an Galois field element test-bench.v The test fixture, and some brief notes on using the modules. data-rom.v A simple data source for testing run For those intelligence-challenged who can t run verilog LGPL The license

    标签: Berlekamp berlekamp algorithm generator

    上传时间: 2014-02-16

    上传用户:fxf126@126.com