If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高级程序设计 里面自代源码
标签: restriction Explorer Internet security
上传时间: 2016-11-18
上传用户:源弋弋
Good morning, dear teachers. I am very glad to be here for your interview. my name is xx.I am 21 years old. I come from Dafang, a small town of Guizhou province. My undergraduate period will be accomplished in East China Jiaotong University. I major in electrical engineering and automation. I am interesting in computer, especially in program design. I am a hard study student, especially in the things which I interesting in. I am a person with great perseverance. During the days I preparing for the postgraduate examination, I insist on study for more than 10 hours every day. Just owing to this, I could pass the first examination finally. I am also a person with great ambition.
标签: interview teachers morning Good
上传时间: 2014-01-11
上传用户:钓鳌牧马
Wavelet Subband coding for speaker recognition The fn will calculated subband energes as given in the att tech paper of ruhi sarikaya and others. the fn also calculates the DCT part. using this fn and other algo for pattern classification(VQ,GMM) speaker identification could be achived. the progress in extraction is also indicated by progress bar.
标签: recognition calculated Wavelet Subband
上传时间: 2013-12-08
上传用户:guanliya
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
anb 版的LBM程序 This code was written to show beginners in a simple and c short way the relevant procedures of a lattice Boltzmann solver, c pointing on how everything works "in principle". Nearly all c procedures could be implemented other (and better) as it is done c here, and even the algorithms used here could be changed to c save memory and increase performance. But the code works correct, c and we hope it will be good starting point for the first steps c in the lattice Boltzmann field. Good luck !
标签: beginners relevant written simple
上传时间: 2017-02-11
上传用户:wlcaption
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop
标签: programming language Java technology
上传时间: 2014-01-03
上传用户:huangld
This is a PHP search engine. It searches for text and then displays results. At the time I completed it it was the first of its kind. I spent many hours looking for something like it, but could not find anything. It searches the directory you put it in.
标签: displays searches complet results
上传时间: 2013-12-25
上传用户:dave520l
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
标签: perceptual implementation algorithms fingerpr
上传时间: 2013-12-08
上传用户:星仔
How to control the time s equence of LM3033B- 0BR3 LCD module by C51 programming was dis cus s ed in this paper. In this way the LCD module was driven by parallel communication and the characters and graphics could be were narrated in detail.
标签: programming control equence module
上传时间: 2017-05-29
上传用户:熊少锋
Emdros is a text database middleware-layer aimed at storage and retrieval of "text plus information about that text." This information could be linguistic analyses or other annotations. Emdros provides an abstraction of text that makes it well suited to storing /syntactic analyses/ of text, but other linguistic information is supported as well. Emdros comes with a query-language, MQL, that enables powerful queries. Emdros acts as a middleware-layer between a client (not provided) and a database back-end. Currently, PostgreSQL, MySQL, and SQLite (2 and 3) are supported, but other back-ends can easily be added.
标签: text middleware-layer information retrieval
上传时间: 2014-01-02
上传用户:wfeel