Swfdec still is development software, but has also followed a rigid no-crashes-allowed policy. I believe it s stable enough now to be installed as a default plugin for people that can live with occasional crashes of their browser. But don t blame me if it does crash. File a bug at https://bugs.freedesktop.org/enter_bug.cgi?product=swfdec
标签: no-crashes-allowed development followed software
上传时间: 2016-04-14
上传用户:franktu
These listed libraries are written in WTL. But it s really hard to mix both MFC & WTL together. Obviously, it s not reasonable to ask a developer or a team to giving up MFC and move to the WTL world just because there were some great controls or visual Frameworks written in WTL (there are many things that should be considered especially in a company with hundreds of developers like the company I work for). Unfortunately, there was no such good and free visual Framework in MFC until now. Whatever difficulties there are, I still desire to be able to use them and now my effort is here to be shared with you. Under the Hood
标签: libraries WTL together written
上传时间: 2013-12-18
上传用户:wcl168881111111
北京大学ACM题 Here is a geometric problem. You have an angle and some squares in the first quadrant of the plane rectangular coordinates. The vertex of the angle is fixed on the origin O of the coordinates, and both of its radial lines are specified by the input. The sizes of the squares are also specified by the input, and the squares can shift vertically and horizontally. now your job is to use the squares and the radial lines of the angle to enclose the maximum area, which excludes the area of the squares (see Figure 1). You should note that the edges of the squares must be parallel to the axes.
标签: geometric quadrant problem squares
上传时间: 2013-12-25
上传用户:ynzfm
北京大学ACM比赛题目 In 1742, Christian Goldbach, a German amateur mathematician, sent a letter to Leonhard Euler in which he made the following conjecture: Every even number greater than 4 can be written as the sum of two odd prime numbers. For example: 8 = 3 + 5. Both 3 and 5 are odd prime numbers. 20 = 3 + 17 = 7 + 13. 42 = 5 + 37 = 11 + 31 = 13 + 29 = 19 + 23. Today it is still unproven whether the conjecture is right. (Oh wait, I have the proof of course, but it is too long to write it on the margin of this page.) Anyway, your task is now to verify Goldbach s conjecture for all even numbers less than a million.
标签: mathematician Christian Goldbach Leonhard
上传时间: 2016-04-22
上传用户:wangchong
北京大学ACM比赛题目 Consider an infinite full binary search tree (see the figure below), the numbers in the nodes are 1, 2, 3, .... In a subtree whose root node is X, we can get the minimum number in this subtree by repeating going down the left node until the last level, and we can also find the maximum number by going down the right node. now you are given some queries as "What are the minimum and maximum numbers in the subtree whose root node is X?" Please try to find answers for there queries.
标签: the Consider infinite numbers
上传时间: 2013-12-16
上传用户:日光微澜
WinChat was created in late 2000 by Spectre, DeMENted and Unique_T. You can connect to WinChat.Net by pointing your IRC client at irc.winchat.net. Or you can start a Java client right now.
标签: WinChat DeMENted Unique_T Spectre
上传时间: 2016-04-24
上传用户:zhangyi99104144
There are two files in the zip folder. bpsk_spread.m and jakesmodel.m Steps for simulation: 1] Run jakesmodel.m first 2] Then run bpsk_spread.m . 3] Note that during the first run bpsk_spread.m has no rayleigh fading.This is because the corresponding code has been commented 4] The resulting performance is stored in BER_awgn. 5] now uncomment the Rayleigh Fading code in bpsk_spread.m file. 6] Same time comment BER_awgn (line 112) and uncomment BER_ray variable. 7] Run the simulation. To compare the perfromances of the receiver using DSSS plot the BER_awgn and BER_ray
标签: bpsk_spread jakesmodel simulation folder
上传时间: 2016-05-19
上传用户:ynsnjs
This is the source code for encryption using the latest AES algorithm. AES algorithm is also called Rijndael algorithm. AES algorithm is recommended for non-classified use by the National Institute of Standards and Technology(NIST), USA. now-a-days AES is being used for almost all encryption applications all around the world.
标签: algorithm encryption AES the
上传时间: 2014-01-18
上传用户:xc216
Artistic Style is a reindenter and reformatter of C, C++, C# and Java source code. When indenting source code, we as programmers have a tendency to use both spaces and tab characters to create the wanted indentation. Moreover, some editors by default insert spaces instead of tabs when pressing the tab key, and other editors (Emacs for example) have the ability to "pretty up" lines by automatically setting up the white space before the code on the line, possibly inserting spaces in a code that up to now used only tabs for indentation.
标签: reformatter reindenter and Artistic
上传时间: 2013-12-20
上传用户:康郎
Also since the domain name--against which the retrieved domain name is to be matched--is currently hard coded. Hence the hard coded name has to be change before compiling the user mode program The .lib file which has been provided in \DD\DD folder is checked built using Win XP DDK as of now.
标签: domain name currently retrieved
上传时间: 2016-08-17
上传用户:siguazgb