一個用keil and Proteus設(shè)計的C51音樂播放程序與大家分享
上傳時間: 2014-07-08
上傳用戶:dianxin61
Perl & XML. by Erik T. Ray and Jason McIntosh ISBN 0-596-00205-X First Edition, published April 2002. (See the catalog page for this book.) Table of Contents Copyright Page Preface Chapter 1: Perl and XML Chapter 2: An XML Recap Chapter 3: XML Basics: Reading and Writing Chapter 4: Event Streams Chapter 5: SAX Chapter 6: Tree Processing Chapter 7: DOM Chapter 8: Beyond Trees: XPath, XSLT, and More Chapter 9: RSS, SOAP, and Other XML Applications Chapter 10: Coding Strategies Index Colophon --------------------------------------------------------------------------------
標簽: T. published McIntosh Edition
上傳時間: 2013-12-24
上傳用戶:yzhl1988
The program of BASE 64 encryption and decryption
標簽: encryption decryption program BASE
上傳時間: 2015-09-03
上傳用戶:yuanyuan123
Keyboard and remote driven operation fully functional, implements preprogrammed chars in TOUCH PAD
標簽: preprogrammed functional implements operation
上傳時間: 2014-01-20
上傳用戶:784533221
SPI flash control and access program
標簽: control program access flash
上傳時間: 2015-09-04
上傳用戶:ANRAN
Parallel flash access and control program
標簽: Parallel control program access
上傳時間: 2014-01-14
上傳用戶:標點符號
給vim增加函數(shù)列表。Author: Yegappan Lakshmanan (yegappan AT yahoo DOT com) For Vim version 6.0 and above Last change: 2006 November 14
標簽: Lakshmanan Yegappan yegappan version
上傳時間: 2015-09-04
上傳用戶:ecooo
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 譯作:《黑客入侵的藝術(shù)》,也是從朋友的寶箱中搜來的,以前層大致瀏覽過,是難得一件的好資料。
標簽: introduces the hacking science
上傳時間: 2013-12-28
上傳用戶:離殤
Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.
標簽: Implemented following compile command
上傳時間: 2014-01-01
上傳用戶:lhc9102
Overview Provides a way to store very large collections of email addresses (100,000+ addresses) and efficiently check whether a specific address is contained in a collection. The collection can be created programmatically, or through a pluggable persistence mechanism. Functionality Maintains large collections of email addresses. Efficiently checks whether an address is in the collection or not.
標簽: addresses collections Overview Provides
上傳時間: 2013-12-17
上傳用戶:xg262122
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1