This is an example how one could hide a process on Windows based operation systems from task viewers like ProcDump (G-RoM, Lorian & Stone) or ProcessExplorer (SysInternals). It could e.g. be used as SOME kind of dump protection. The way to get this done is very different on NT and 9x machines.
標簽: operation Windows example process
上傳時間: 2013-12-17
上傳用戶:wang0123456789
21天學會用JAVA開發網絡游戲 書籍語言: 簡體中文 書籍類型: 程序設計 授權方式: 免費軟件 書籍大小: 287 KB 書籍等級: 整理時間: 2004-11-3 20:41:10 With all of the media attention that is focused on the Internet and the World Wide Web, figuring out exactly what they are all about is SOMEtimes difficult. Are they just a neat new way to market products or will they truly offer us a new medium of communication that will SOMEday surpass even televisions and telephones? The answer is, who knows? Unfortunately, the ultimate use for the Internet is still unknown. This is because it is still in such a state of flux that it s pretty much impossible to accurately predict where it will end up. However, you can look at the evidence of what is there now and gain SOME insight into what the Internet might become, at least in terms of games.
上傳時間: 2013-12-20
上傳用戶:天誠24
ABAQUS is a general purpose finite element analysis program which is widely used to analyses mechanical, structure and civil engineering problems. Abaqus has SOME special feature for analysing fracture mechanics problems, and therefore it is a main tools for the FE-analysis in the Fracture Group at the Mechanical Engineering at Glasgow Universtity. The software which can transfer data from Abaqus into a Matlab readable environment has been developed as a part of a research program in Constraint Estimation in Fracture Mechanics. This research program was funded by a grant from the Defence Research Agency through Prof. J. Sumpter.
標簽: analysis analyses general element
上傳時間: 2015-05-13
上傳用戶:xfbs821
The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are SOME simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)
標簽: ptfsf following the contains
上傳時間: 2013-11-28
上傳用戶:風之驕子
Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). SOME of them do provide SOME mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is SOMEwhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s SOMEthing like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.
標簽: available libraries Although nearly
上傳時間: 2014-01-22
上傳用戶:zhoujunzhen
This toolbox contains Matlab code for several graph and mesh partitioning methods, including geometric, spectral, geometric spectral, and coordinate bisection. It also has routines to generate recursive multiway partitions, vertex separators, and nested dissection orderings and it has SOME sample meshes and mesh generators. The toolbox contains a Matlab interface to Leland and Hendrickson s Chaco partitioning package, but it doesn t contain Chaco itself. The file "chaco/README" tells how to install the interface to Chaco. It also contains a Matlab interface to Karypis et al. s Metis partitioning package, using Robert Bridson s "metismex" code.
標簽: partitioning including contains toolbox
上傳時間: 2015-05-25
上傳用戶:tzl1975
MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programmers. What kind are you? The first kind are the good programmers who write programs that conform to the way MFC wants you to do things. The second bunch are wild-eyed anarchists who insist on getting things done their way. Me, I’m in the second group. If you are in the same boat (or would like to be) this book is for you. This book won’t teach you MFC—not in the traditional sense. You should pick it up with a good understanding of basic MFC programming and a desire to do things differently. This isn’t a Scribble tutorial (although I will review SOME fundamentals in the first chapter). You will learn how to wring every drop from your MFC programs. You’ll discover how to use, abuse, and abandon the document/view architecture. If you’ve ever wanted custom archives, you’ll find that, too.
標簽: MFC Introduction programmer programme
上傳時間: 2015-05-30
上傳用戶:youke111
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling SOME of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.
標簽: 802.11 introduction Beginning Security
上傳時間: 2013-12-04
上傳用戶:CHINA526
The Hopfield model is a distributed model of an associative memory. Neurons are pixels and can take the values of -1 (off) or +1 (on). The network has stored a certain number of pixel patterns. During a retrieval phase, the network is started with SOME initial configuration and the network dynamics evolves towards the stored pattern which is closest to the initial configuration.
標簽: model distributed associative Hopfield
上傳時間: 2015-06-17
上傳用戶:l254587896
Many applications use connection/object pool. A program may require a IMAP connection pool and LDAP connection pool. One could easily implement a IMAP connection pool, then take the existing code and implement a LDAP connection pool. The program grows, and now there is a need for a pool of threads. So just take the IMAP connection pool and convert that to a pool of threads (Copy, paste, find, replace????). Need to make SOME changes to the pool implementation? Not a very easy task, since the code has been duplicated in many places. Re-inventing source code is not an intelligent approach in an object oriented environment which encourages re-usability. It seems to make more sense to implement a pool that can contain any arbitrary type rather than duplicating code. How does one do that? The answer is to use type parameterization, more commonly referred to as templates.
標簽: connection pool applications program
上傳時間: 2013-12-25
上傳用戶:playboys0