虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

pre-advice

  • 这是写给作为软件工程项目经理的书

    这是写给作为软件工程项目经理的书,原书的书评是: "If you re looking for solid, easy-to-follow advice on estimation, requirements gathering, managing change, and more, you can stop now: this is the book for you." --Scott Berkun, Author of The Art of Project Management

    标签: 软件工程 项目

    上传时间: 2013-12-17

    上传用户:225588

  • This companion disc contains the source code for the sample programs presented in INSIDE VISUAL C++

    This companion disc contains the source code for the sample programs presented in INSIDE VISUAL C++ 5.0, as well as pre- compiled copies of the programs.

    标签: companion the presented contains

    上传时间: 2013-12-28

    上传用户:windwolf2000

  • DSP/BIOS Driver Developer Kit 1.11 The DSP/BIOS Driver Developer Kit (DDK) provides a selection of

    DSP/BIOS Driver Developer Kit 1.11 The DSP/BIOS Driver Developer Kit (DDK) provides a selection of pre-tested DSP/BIOS device drivers, and documentation on how to write a driver to the DSP/BIOS driver model, known as IOM. The DDK includes C source code for all drivers. The DDK 1.11 has been validated with CCS 3.1 and DSP/BIOS 5.20.

    标签: Developer Driver BIOS DSP

    上传时间: 2014-11-23

    上传用户:maizezhen

  • 《多传感器数据融合手册》 《Handbook of Multisensor Data Fusion》 作者: David L. Hall 定价: USD 199.95 出版社: CRC 出版

    《多传感器数据融合手册》 《Handbook of Multisensor Data Fusion》 作者: David L. Hall 定价: USD 199.95 出版社: CRC 出版年: 2001-06-20 简介 · · · · · ·    Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical estimation. This handbook is an up-to-date, comprehensive resource for data fusion system designers and researchers. Top experts in the field lead readers from a basic introduction and survey of data fusion technology to advanced mathematics and theory and to some very practical advice for systems implementers.

    标签: L. Multisensor Handbook 199.95

    上传时间: 2014-02-06

    上传用户:二驱蚊器

  • About: hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses

    About: hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses memory mapped I/O (if available), supports cursors, and can create in-memory databases. Release focus: Major feature enhancements Changes: This release comes with many changes and new features. It can manage multiple databases in one file. A new flag (HAM_LOCK_EXCLUSIVE) places an exclusive lock on the file. hamsterdb was ported to Windows CE, and the Solution file for Visual Studio 2005 now supports builds for x64. Several minor bugs were fixed, performance was improved, and small API changes occurred. Pre-built libraries for Windows (32-bit and 64-bit) are available for download. Author: cruppstahl

    标签: C. hamsterdb structure database

    上传时间: 2013-12-11

    上传用户:LouieWu

  • Hey. This some pid code for the atmega88 that I once used to control a heater. It s purpose is pre

    Hey. This some pid code for the atmega88 that I once used to control a heater. It s purpose is pretty specific, and I only wrote it to work on the mega88, so the code itself won t be too useful. It is a good place to start if you re trying to use or figure out pid though.

    标签: control purpose atmega heater

    上传时间: 2013-12-19

    上传用户:天诚24

  • This code was used to produce simulation results described in: Using Directional Antennas to Pre

    This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.

    标签: Directional simulation described Antennas

    上传时间: 2014-12-06

    上传用户:xieguodong1234

  • With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s

    With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux servers. You ll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.

    标签: Linux computer machines virtual

    上传时间: 2013-12-19

    上传用户:xinzhch

  • The LabVIEW Development Guidelines describe many of the issues that arise when developing large app

    The LabVIEW Development Guidelines describe many of the issues that arise when developing large applications. The guidelines are based on the advice of LabVIEW developers, and provide a basic survey of software engineering techniques you might find useful when developing your own projects. There is also a discussion of style for creating VIs. Developers who have used LabVIEW and are comfortable in the LabVIEW environment can use the LabVIEW Development Guidelines to maintain a consistent and effective style in their projects.

    标签: Development Guidelines developing describe

    上传时间: 2015-12-26

    上传用户:iswlkje

  • 《为Windows Vista编写安全的代码》

    《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    标签: Windows Vista 编写 代码

    上传时间: 2016-01-07

    上传用户:zxc23456789