亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

User-rights

  • Excel的強大函數功能

    Excel的強大函數功能,為我們帶來了極大方便,雖然它有200多個函數,但有時我們為實現一項規定的功能,可能用到幾個函數或者采用嵌套函數,這樣應用起來,也不太方便。其實對于我們經常用到的功能,我們可以創建自定義函數UDF(User—defined function),它的運行與Excel中自帶的函數完全相同。建立自定義函數有以下幾個優點:建立自己特殊的功能和名稱的函數;能將復雜的、嵌套的、多個原有的函數組合在一起,發揮更大的威力。

    標簽: Excel 函數

    上傳時間: 2013-12-24

    上傳用戶:gxrui1991

  • SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems

    SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems of linear equations on high performance machines. The library is written in C and is callable from either C or Fortran. The library routines will perform an LU decomposition with partial pivoting and triangular system solves through forward and back substitution. The LU factorization routines can handle non-square matrices but the triangular solves are performed only for square matrices. The matrix columns may be preordered (before factorization) either through library or user supplied routines. This preordering for sparsity is completely separate from the factorization. Working precision iterative refinement subroutines are provided for improved backward stability. Routines are also provided to equilibrate the system, estimate the condition number, calculate the relative backward error, and estimate error bounds for the refined solutions.

    標簽: nonsymmetric solution SuperLU general

    上傳時間: 2017-02-20

    上傳用戶:lepoke

  • This taglib contains tags used to create struts input forms, as well as other tags generally useful

    This taglib contains tags used to create struts input forms, as well as other tags generally useful in the creation of HTML-based user interfaces. Many of the tags in this tag library will throw a JspException at runtime when they are utilized incorrectly (such as when you specify an invalid combination of tag attributes). JSP allows you to declare an "error page" in the <%@ page %> directive. If you wish to process the actual exception that caused the problem, it is passed to the error page as a request attribute under key org.apache.struts.action.EXCEPTION.

    標簽: tags generally contains taglib

    上傳時間: 2017-02-21

    上傳用戶:dianxin61

  • Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardw

    Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardware. The original firmware from the manufacturer is extended with new functions and programs which may be selected by the user

    標簽: firmware-extension modification identical devices

    上傳時間: 2014-12-08

    上傳用戶:qw12

  • Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html

    Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html part 2 of 3: user mode LIB

    標簽: EKernel Murphy murphy RTOS

    上傳時間: 2013-12-23

    上傳用戶:小鵬

  • /* This software is copyrighted by and is the sole property of Express */ /* Logic, Inc. All

    /* This software is copyrighted by and is the sole property of Express */ /* Logic, Inc. All rights, title, ownership, or other interests */ /* in the software remain the property of Express Logic, Inc. This */ /* software may only be used in accordance with the corresponding */ /* license agreement. Any unauthorized use, duplication, transmission, */ /* distribution, or disclosure of this software is expressly forbidden. */

    標簽: copyrighted software property Express

    上傳時間: 2017-03-04

    上傳用戶:lindor

  • Java technology is both a programming language and a platform. The Java programming language origina

    Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop

    標簽: programming language Java technology

    上傳時間: 2014-01-03

    上傳用戶:huangld

  • Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While

    Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While original Windows Mobile ring vibration constant vibrating during all ring, this driver help to apply any user vibrating pattern.

    標簽: customization vibration incoming Windows

    上傳時間: 2017-03-07

    上傳用戶:498732662

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    標簽: demonstrates encryption functions implement

    上傳時間: 2017-03-08

    上傳用戶:xuanchangri

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    標簽: demonstrates encryption functions implement

    上傳時間: 2014-01-10

    上傳用戶:yyq123456789

主站蜘蛛池模板: 贵州省| 体育| 祁东县| 宝清县| 胶州市| 姜堰市| 山阴县| 客服| 乳山市| 山阳县| 惠东县| 丰县| 张北县| 新野县| 赞皇县| 望江县| 定兴县| 铁岭县| 平江县| 南郑县| 多伦县| 广昌县| 浠水县| 虞城县| 吐鲁番市| 南陵县| 甘南县| 梁平县| 阜南县| 光山县| 思南县| 仙桃市| 普洱| 寿宁县| 封丘县| 聂荣县| 东丰县| 清流县| 宝山区| 安多县| 新沂市|