Modern C++ Design is an important book. Fundamentally, it demonstrates generic patterns or pattern templates as a powerful new way of creating extensible designs in C++--a new way to combine templates and patterns that you may never have dreamt was possible, but is. If your work involves C++ design and coding, you should read this book. Highly recommended.-Herb Sutter。好书!
标签: Fundamentally demonstrates important patterns
上传时间: 2013-11-29
上传用户:PresidentHuang
单片机中检测测错 BADCODE is a program that has a lot of errors. When you compile this file, uVision reports a number of problems that you may interactively correct.
标签: BADCODE compile program uVision
上传时间: 2014-12-02
上传用户:13215175592
// chebysheve outlier detection // this function is used to detect the abnormal value among a set of data // input: // delta: a set of data // flag: discribe which data is already known as outlier // p: restrict level // output: // double[] door : byyond which the data may be considered as a outlier // door[0]: the upperdoor // door[1]: the lowerdoor
标签: chebysheve detection abnormal function
上传时间: 2013-11-30
上传用户:13517191407
Boost provides free peer-reviewed portable C++ source libraries. We emphasize libraries that work well with the C++ Standard Library. Boost libraries are intended to be widely useful, and usable across a broad spectrum of applications. The Boost license encourages both commercial and non-commercial use. We aim to establish "existing practice" and provide reference implementations so that Boost libraries are suitable for eventual standardization. Ten Boost libraries are already included in the C++ Standards Committee s Library Technical Report (TR1) as a step toward becoming part of a future C++ Standard. More Boost libraries are proposed for the upcoming TR2. Boost works on almost any modern operating system, including UNIX and Windows variants. Follow the Getting Started Guide to download and install Boost. Popular Linux and Unix distributions such as Fedora, Debian, and NetBSD include pre-built Boost packages. Boost may also already be available on your organization s internal web server.
标签: libraries peer-reviewed emphasize provides
上传时间: 2016-12-05
上传用户:semi1981
An abstract of the sis of Andrew Greenberg for the Master of Science in Elec- trical and Computer Engineering presented may 6, 2005.
标签: Greenberg the abstract Computer
上传时间: 2014-06-16
上传用户:z754970244
用C语言编的一个小解释器,可以执行C程序的!算是可以执行C程序的C程序吧! 选自最新C语言精华(第三版)Herbert Schildt著 A small interpreter arranges which with the C language, may carry out the C procedure! Is may carry out C the procedure C procedure! (Master) writes oh!
标签: C语言
上传时间: 2013-12-20
上传用户:kelimu
AutoSitePasswords is a users admin tool for Apache web server. AutoSitePasswords keeps the users database and allows to append, edit, delete and search the users records. AutoSitePasswords allows to generate the random login/password serieses. AutoSitePasswords makes the Apache passwords files. The users passwords may be encrypted by MD5 algorithm. The passwords files may be automatic uploaded to FTP server.
标签: AutoSitePasswords users Apache server
上传时间: 2013-12-18
上传用户:erkuizhang
C51源程序集锦 This a demo program showing a way to perform simultaneous RS-232 transmit and receive using only one hardware timer. The transmit and receive routines divide each bit time into 4 slices to allow synchronizing to incoming data that may be out of synch with outgoing data.
标签: simultaneous transmit program perform
上传时间: 2017-02-08
上传用户:yangbo69
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/
标签: open-source encryption Features software
上传时间: 2013-12-20
上传用户:123啊
A "code-what"? Unless you have spent some time working in the area of reverse engineering, chances are you have not heard of the term "codecave" before. If you have heard of it, you might not have read a clear definition of it or quite understand what it is or why it is useful. I have even asked seasoned assembly programmers about the term before and most of them had not heard of it. If it is new to you, do not worry, you are not the only one. It is a term that is scarcely used and is only useful in a reverse engineering context. Furthermore, is it "codecave" or "code cave"? I am not quite sure, but I will try my best to refer to it consistently as a "codecave". A space may sneak in there from time to time
标签: engineering code-what chances reverse
上传时间: 2014-01-17
上传用户:hn891122