亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

SOME

  • This is an example how one could hide a process on Windows based operation systems from task viewer

    This is an example how one could hide a process on Windows based operation systems from task viewers like ProcDump (G-RoM, Lorian & Stone) or ProcessExplorer (SysInternals). It could e.g. be used as SOME kind of dump protection. The way to get this done is very different on NT and 9x machines.

    標簽: operation Windows example process

    上傳時間: 2013-12-17

    上傳用戶:wang0123456789

  • 21天學會用JAVA開發網絡游戲 書籍語言: 簡體中文 書籍類型: 程序設計 授權方式: 免費軟件 書籍大小: 287 KB 書籍等級: 整理時間: 2004-1

    21天學會用JAVA開發網絡游戲 書籍語言: 簡體中文 書籍類型: 程序設計 授權方式: 免費軟件 書籍大小: 287 KB 書籍等級: 整理時間: 2004-11-3 20:41:10 With all of the media attention that is focused on the Internet and the World Wide Web, figuring out exactly what they are all about is SOMEtimes difficult. Are they just a neat new way to market products or will they truly offer us a new medium of communication that will SOMEday surpass even televisions and telephones? The answer is, who knows? Unfortunately, the ultimate use for the Internet is still unknown. This is because it is still in such a state of flux that it s pretty much impossible to accurately predict where it will end up. However, you can look at the evidence of what is there now and gain SOME insight into what the Internet might become, at least in terms of games.

    標簽: 書籍 JAVA 2004 287

    上傳時間: 2013-12-20

    上傳用戶:天誠24

  • ABAQUS is a general purpose finite element analysis program which is widely used to analyses mechani

    ABAQUS is a general purpose finite element analysis program which is widely used to analyses mechanical, structure and civil engineering problems. Abaqus has SOME special feature for analysing fracture mechanics problems, and therefore it is a main tools for the FE-analysis in the Fracture Group at the Mechanical Engineering at Glasgow Universtity. The software which can transfer data from Abaqus into a Matlab readable environment has been developed as a part of a research program in Constraint Estimation in Fracture Mechanics. This research program was funded by a grant from the Defence Research Agency through Prof. J. Sumpter.

    標簽: analysis analyses general element

    上傳時間: 2015-05-13

    上傳用戶:xfbs821

  • The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he

    The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are SOME simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)

    標簽: ptfsf following the contains

    上傳時間: 2013-11-28

    上傳用戶:風之驕子

  • Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to w

    Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). SOME of them do provide SOME mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is SOMEwhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s SOMEthing like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.

    標簽: available libraries Although nearly

    上傳時間: 2014-01-22

    上傳用戶:zhoujunzhen

  • This toolbox contains Matlab code for several graph and mesh partitioning methods, including geometr

    This toolbox contains Matlab code for several graph and mesh partitioning methods, including geometric, spectral, geometric spectral, and coordinate bisection. It also has routines to generate recursive multiway partitions, vertex separators, and nested dissection orderings and it has SOME sample meshes and mesh generators. The toolbox contains a Matlab interface to Leland and Hendrickson s Chaco partitioning package, but it doesn t contain Chaco itself. The file "chaco/README" tells how to install the interface to Chaco. It also contains a Matlab interface to Karypis et al. s Metis partitioning package, using Robert Bridson s "metismex" code.

    標簽: partitioning including contains toolbox

    上傳時間: 2015-05-25

    上傳用戶:tzl1975

  • MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programme

    MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programmers. What kind are you? The first kind are the good programmers who write programs that conform to the way MFC wants you to do things. The second bunch are wild-eyed anarchists who insist on getting things done their way. Me, I’m in the second group. If you are in the same boat (or would like to be) this book is for you. This book won’t teach you MFC—not in the traditional sense. You should pick it up with a good understanding of basic MFC programming and a desire to do things differently. This isn’t a Scribble tutorial (although I will review SOME fundamentals in the first chapter). You will learn how to wring every drop from your MFC programs. You’ll discover how to use, abuse, and abandon the document/view architecture. If you’ve ever wanted custom archives, you’ll find that, too.

    標簽: MFC Introduction programmer programme

    上傳時間: 2015-05-30

    上傳用戶:youke111

  • Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in the

    Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling SOME of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.

    標簽: 802.11 introduction Beginning Security

    上傳時間: 2013-12-04

    上傳用戶:CHINA526

  • The Hopfield model is a distributed model of an associative memory. Neurons are pixels and can take

    The Hopfield model is a distributed model of an associative memory. Neurons are pixels and can take the values of -1 (off) or +1 (on). The network has stored a certain number of pixel patterns. During a retrieval phase, the network is started with SOME initial configuration and the network dynamics evolves towards the stored pattern which is closest to the initial configuration.

    標簽: model distributed associative Hopfield

    上傳時間: 2015-06-17

    上傳用戶:l254587896

  • Many applications use connection/object pool. A program may require a IMAP connection pool and LDAP

    Many applications use connection/object pool. A program may require a IMAP connection pool and LDAP connection pool. One could easily implement a IMAP connection pool, then take the existing code and implement a LDAP connection pool. The program grows, and now there is a need for a pool of threads. So just take the IMAP connection pool and convert that to a pool of threads (Copy, paste, find, replace????). Need to make SOME changes to the pool implementation? Not a very easy task, since the code has been duplicated in many places. Re-inventing source code is not an intelligent approach in an object oriented environment which encourages re-usability. It seems to make more sense to implement a pool that can contain any arbitrary type rather than duplicating code. How does one do that? The answer is to use type parameterization, more commonly referred to as templates.

    標簽: connection pool applications program

    上傳時間: 2013-12-25

    上傳用戶:playboys0

主站蜘蛛池模板: 阿克苏市| 博客| 合山市| 抚顺市| 徐汇区| 玉溪市| 奈曼旗| 藁城市| 那曲县| 西青区| 和平县| 长阳| 都匀市| 门头沟区| 海口市| 湟源县| 高密市| 安新县| 思茅市| 鱼台县| 苗栗市| 四川省| 同德县| 芜湖县| 耿马| 五原县| 婺源县| 翁源县| 响水县| 晴隆县| 屯门区| 乳源| 乐清市| 武隆县| 法库县| 福建省| 瑞昌市| 汶川县| 当阳市| 巴彦县| 郯城县|