good program ,I like very much
上传时间: 2014-01-08
上传用户:lhc9102
a program that takes in three arguments: the first one represents the size of an array that will be created the second one represents the maximum value that each of the array elements can have the third one represents the position in the array that you would like to print the value of.
标签: that represents arguments the
上传时间: 2015-07-22
上传用户:waitingfy
maven 2.0 The following instructions show how to install Maven 2: 1) Unpack the archive where you would like to store the binaries, eg: tar zxvf maven-2.0.tar.gz or unzip maven-2.0.zip 2) A directory called "maven-2.0" will be created. 3) Add the bin directory to your PATH, eg: export PATH=/usr/local/maven-2.0/bin:$PATH or set PATH="c:\program files\maven-2.0\bin" %PATH% 4) Make sure JAVA_HOME is set to the location of your JDK 5) Run "mvn --version" to verify that it is correctly installed.
标签: instructions following archive install
上传时间: 2014-01-19
上传用户:weiwolkt
This project attempts to implement a Database using B+Tree. The project has developed a DATABASE SYSTEM with lesser memory consumption. Its API includes simple SQL Statements and the output is displayed on the screen. Certain applications for which several features of existing databases like concurrency control, transaction management, security features are not enabled. B+Trees can be used as an index for factor access to the data. Help facility is provided to know the syntax of SQL Statements.
标签: project implement developed Database
上传时间: 2013-12-25
上传用户:semi1981
A complete set of bit banged, software driven I2C routines I created for any PIC device - and they work!! These functions are single master only functions, and are ideal for communicating with things like EEPROMs, LCD Drivers, ADC Converters etc
标签: complete routines software created
上传时间: 2013-12-17
上传用户:王小奇
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。
标签: introduces the hacking science
上传时间: 2013-12-28
上传用户:离殇
JoSQL 1.5的源代码。JoSQL(SQL for Java Objects)为Java开发者提供运用SQL语句来操作Java对象集的能力.利用JoSQL可以像操作数据库中的数据一样对任何Java对象集进行查询,排序,分组。比如要查找所有的Html文件:SELECT * FROM java.io.File Where name $Like "%html"
上传时间: 2015-09-16
上传用户:13188549192
利用OPENCV图像处理软件,选取扩展的Haar-like特征,实现基于Adaboost的人脸检测技术,
上传时间: 2013-12-08
上传用户:gut1234567
Lossless Data Compression Toolkit Version 1.1 of the lossless data compression toolkit by Nico deVries. The C sources in this toolkit include an LZW compressor, AR002 archiver, a PPM like compressor using arithmetic compression, Huffman compressor, splay tree program, and LZRW1. Quite a variety.
标签: Compression compression Lossless lossless
上传时间: 2014-01-24
上传用户:caixiaoxu26
We often get questions about how the deflate() and inflate() functions should be used. Users wonder when they should provide more input, when they should use more output, what to do with a Z_BUF_ERROR, how to make sure the process terminates properly, and so on. So for those who have read zlib.h (a few times), and would like further edification, below is an annotated example in C of simple routines to compress and decompress from an input file to an output file using deflate() and inflate() respectively. The annotations are interspersed between lines of the code. So please read between the lines. We hope this helps explain some of the intricacies of zlib.
标签: functions questions deflate inflate
上传时间: 2014-01-02
上传用户:zhuyibin