There are several problems related to the properties of the triangular mesh representation that describes a surface of an object. Sometimes, the surface is represented just as a set of triangles without any other information and the STL file format, which is used for data exchanges, is a typicalexampl e of this situation.
标签: representation properties triangular the
上传时间: 2014-11-12
上传用户:colinal
AES, 即Advanced Encryption Standard高级加密标准模块, 它是目前国际上最先进的加密技术, 是基于DES之后的最新发布的高段加密标准. 该标准由美国NIST(National Institute of Standards and Technology)组织制定发布.
标签: Encryption Advanced Standard Nation
上传时间: 2013-12-21
上传用户:wcl168881111111
浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity ,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程序的方法,其中包括对称加密、非对称加密和数字签名算法的编程.
标签: Arithmetric Discussion Cryptology NET
上传时间: 2013-12-31
上传用户:小宝爱考拉
MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统 ======================================================================== AppWizard has created this 学生管理系统 application for you. This application not only demonstrates the basics of using the Microsoft Foundation classes but is also a starting point for writing your application. This file contains a summary of what you will find in each of the files that make up your 学生管理系统 application. 学生管理系统.dsp This file (the project file) contains information at the project level and is used to build a single project or subproject. Other users can share the project (.dsp) file, but they should export the makefiles locally.
标签: FOUNDATION MICROSOFT LIBRARY CLASS
上传时间: 2013-12-16
上传用户:天涯
BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse: Get the most out of the built-in applications Take control of email with filters, searches, and more Rev up your mobile gaming--whether you re an arcade addict or poker pro Browse the web, chat over IM, and keep up with news and weblogs Work with office documents, spell check your messages, and send faxes Become more secure, lock down your BlackBerry and stash secure information somewhere safe Manage and monitor the BlackBerry Enterprise Server (BES) and Mobile Data System (MDS) Create web sites that look great on a BlackBerry Develop and deploy BlackBerry applications
标签: BlackBerry computing enhance mobile
上传时间: 2016-12-07
上传用户:GavinNeko
The System Management BIOS Reference Specification addresses how motherboard and system vendors present management information about their products in a standard format by extending the BIOS interface on Intel architecture systems. The information is intended to allow generic instrumentation to deliver this data to management applications that use CIM (the WBEM data model) or direct access and eliminates the need for error prone operations like probing system hardware for presence detection.
标签: Specification motherboard Management Reference
上传时间: 2013-12-10
上传用户:凤临西北
Please read this document before attempting to compile and run the libraries and applications! The projects must be compiled in a particular order. Standard support questions are about compiler and/or linker errors that are generated when users try to compile the projects in the wrong order. Other information of interest is available here, so read the entire document fi rst. Wild Magic Version 2.1 is what ships with the fi rst printing of the Game Physics book. Some of the applications that are referenced in the book did not make it onto the CD–ROM for the book. Version 2.2 contains those applications, plus more
标签: applications attempting and libraries
上传时间: 2014-01-16
上传用户:Late_Li
加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encryption means that pegwit allows you to keep the information in files you send by email (or other means) confidential. Eavesdroppers will not be able to read the email. Authentication allows you to check that a file has not been tampered with (changed) since it was signed.
标签: authentication encryption performing program
上传时间: 2016-12-12
上传用户:franktu
linux 下的aodv实现源代码,由National Institute of Standards and Technology开发
上传时间: 2016-12-13
上传用户:kernaling
MS Access is commonly thought of as the little brother of Database engines, and not a lot of material has been published about methods used for exploiting it during a penetration test. The aim of this paper is to bring a lot of disparate information together into one guide.
标签: Database commonly of brother
上传时间: 2014-01-04
上传用户:dreamboy36