Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison Wesley Longman Inc., was aware of a trademark claim, the designations have been printed in initial caps or all caps. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contaIned herein. The publisher offers discounts on this book when ordered in quantity for special sales. For more information, please contact:
标签: manufacturers designations distinguish products
上传时间: 2017-01-23
上传用户:woshiayin
LXI Standards Documents are developed within the LXI Consortium and LXI Technical Working Groups sponsored by the LXI Consortium Board of Directors. The LXI Consortium develops its standards through a consensus development process modeled after the American National Standards Institute, which brings together volunteers representing varied viewpoints and interests to achieve the final product. Volunteers are not necessarily members of the Consortium and serve without compensation. While the LXI Consortium administers the process and establishes rules to promote fairness in the consensus development process, the LXI Consortium does not exhaustively evaluate, test, or verify the accuracy of any of the information contaIned in its standards.
标签: LXI Consortium Documents Standards
上传时间: 2013-12-23
上传用户:sxdtlqqjl
* The IMAP toolkit provided in this Distribution is * Copyright 2000 University of Washington. * The full text of our legal notices is contaIned in the file called * CPYRIGHT, included with this Distribution.
标签: Distribution University Washington Copyright
上传时间: 2013-11-30
上传用户:cazjing
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contaIned within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
标签: perceptual implementation algorithms fingerpr
上传时间: 2013-12-08
上传用户:星仔
Java has become a confusing world. Five years ago, there were few decisions to make once you started programming in Java—you used AWT for graphical user interfaces, sockets for network programming, and hacked together everything else you needed. Since then, though, the APIs available for the Java language have grown, and grown. . . and grown. Now you can dabble in Swing, servlets, Enterprise JavaBeans (EJB), JavaMail, and more. Additionally, there are now packages of APIs, like the Java 2 Micro Edition (J2ME) and Java 2 Enterprise Edition (J2EE). While these packages seem to be nicely wrapped bundles of useful APIs, they don t help the average developer figure out how to piece together the APIs contaIned in these packages. Though it s simple to find documentation on the individual APIs, getting the "big picture" is difficult, at best. One of the most interesting, but difficult, aspects of Java today is building Java enterprise applications using the J2EE package.
标签: confusing decisions become world
上传时间: 2013-12-30
上传用户:haoxiyizhong
This guide is an attempt to compile a lot of that information in here and dummy it down. Perhaps it s a fairly common show, perhaps not. It might have even been a show that you taped. Whatever the case, you want to share it with others bur aren t quite sure how. This guide should be your answer. This guide is geared towards posting a show at SharingTheGroove.org. The instructions contaIned within are for that site. Other sites hosting BT shows may have slightly different procedures for getting the torrent to them. However, torrent creation will be the same. While this guide is being written with audio concerts in mind, the same holds true for the video section of The Groove.
标签: information Perhaps attempt compile
上传时间: 2013-12-19
上传用户:zsjzc
Exceptional C++ shows by example how to go about solid software engineering. Along with a lot of other material, this book includes expanded versions of the first 30 issues of the popular Internet C++ feature Guru of the Week (or, in its short form, GotW), a series of self-contaIned C++ engineering problems and solutions that illustrate specific design and coding techniques.
标签: Exceptional engineering software example
上传时间: 2017-06-07
上传用户:yt1993410
The radially averaged power spectrum (RAPS) is the direction-independent mean spectrum, i.e. the average of all possible directional power spectra. This function computes and plots the RAPS of an input image. The function was written to produce the RAPS for square weather radar reflectivity images so you will have to relabel the plot axes and title to suit your needs. The radially averaged power spectrum provides a convenient means to view and compare information contaIned in 2D spectra in 1D
标签: spectrum direction-independent i.e. the
上传时间: 2013-12-17
上传用户:watch100
The PCI Special Interest Group disclaims all warranties and liability for the use of this document and the information contaIned herein and assumes no responsibility for any errors that may appear in this document, nor does the PCI Special Interest Group make a commitment to update the information contaIned herein.
标签: warranties disclaims liability Interest
上传时间: 2013-12-26
上传用户:leixinzhuo
While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contaIned herein.
标签: preparation precaution publisher the
上传时间: 2013-12-09
上传用户:xc216