优美源码的绝好参考书籍!Beautiful code was conceived by greg wilson in 2006 as a way to elicit insights from leading software developers and computer scientists
标签: Beautiful conceived insights elicit
上传时间: 2016-03-20
上传用户:xzt
This handbook is a concise guide to architecting, designing, and building J2EE applications. It guides technical architects through the entire J2EE project, including identifying business requirements, performing use-case analysis, doing object and data modeling, and leading a development team through construction. Whether you are about to architect your first J2EE application or are looking for ways to keep your projects on-time and on-budget, you will refer to this handbook again and again.
标签: architecting applications designing handbook
上传时间: 2014-08-06
上传用户:xuan‘nian
The Rails Cookbook is is packed with the solutions you need to be a proficient developer with Rails, the leading framework for building the new generation of Web 2.0 applications. Recipes range from the basics, like installing Rails and setting up your development environment, to the latest techniques, such as developing RESTful web services. Topics include: . Modeling data with the ActiveRecord library . Setting up views with ActionView and RHTML templates . Building your application s logic into ActionController . Testing and debugging your Rails application . Building responsive web applications using JavaScript and Ajax . Ensuring that your application is security and performs well . Deploying your application with Mongrel and Apache . Using Capistrano to automate deployment . Using the many Rails plugins Working with graphics
标签: Rails with proficient developer
上传时间: 2013-12-23
上传用户:pkkkkp
This discussion will attempt to outline some truths and common misconceptions about digital audio watermarking. It will survey the intrinsic obstacles that such technology is required to overcome, shedding light on its performance criteria, compromises and limitations. While doing so, it will also survey a few common types of applications, hopefully leading to a clear understanding as to the appropriateness of such technology and its expertise within multimedia content protection.
标签: misconceptions discussion attempt digital
上传时间: 2016-07-18
上传用户:520
Given Perl s natural fit for web applications development, it s no surprise that Perl is also a natural choice for web services development. It s the most popular web programming language, with strong implementations of both SOAP and XML-RPC, the leading ways to distribute applications using web services. But books on web services focus on writing these applications in Java or Visual Basic, leaving Perl programmers with few resources to get them started. "Programming Web Services with Perl" changes that, bringing Perl users all the information they need to create web services using their favorite language.
标签: Perl applications development surprise
上传时间: 2014-11-21
上传用户:xiaoyunyun
M3GExport enables developers to export complex 3D animated scenes from Maya® directly to Mobile 3D Graphics file format (M3G), the emerging 3D file format for mobile 3D games. Created by the developers of JBenchmark3D - the leading performance measurement tool for mobile 3D graphics, M3GExport lets use sophisticated features of M3G format like skeletal animation, morphing meshes, triangle stripping and other useful optimisations. M3GExport for Maya is available in two editions, Limited and Standard. The Standard version contains sophisticated optimisation options used mostly by commercial game developers.
标签: developers M3GExport animated directly
上传时间: 2014-08-11
上传用户:xjz632
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
Design of Integrated Circuits for Optical Communications deals with the design of high-speed integrated circuits for optical communication systems. Written for both students and practicing engineers, the book systematically takes the reader from basic concepts to advanced topics, establishing both rigor and intuition. The text emphasizes analysis and design in modern VLSI technologies, particularly CMOS, and presents numerous broadband circuit techniques. leading researcher Behzad Razavi is also the author of Design of Analog CMOS Integrated Circuits.
标签: Communications Integrated high-speed Circuits
上传时间: 2013-12-21
上传用户:zhouchang199
learning English The following appeared in a memorandum written by the vice president of Nature s Way, a chain of stores selling health food and other health-related products. "Previous experience has shown that our stores are most profitable in areas where residents are highly concerned with leading healthy lives. We should therefore build our next new store in Plainsville, which has many such residents. Plainsville merchants report that sales of running shoes and exercise clothing are at all-time highs. The local health club, which nearly closed five years ago due to lack of business, has more members than ever, and the weight training and aerobics classes are always full. We can even anticipate a new generation of customers: Plainsville s schoolchildren are required to participate in a fitness for life program, which emphasizes the benefits of regular exercise at an early age.
标签: memorandum following president learning
上传时间: 2017-03-06
上传用户:youth25
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
标签: perceptual implementation algorithms fingerpr
上传时间: 2013-12-08
上传用户:星仔