This book is the most accurate and up-to-date source of information the STL currently available. ... It has an approach and appeal of its own: it explains techniques for building data structures and algorithms on top of the STL, and in this way appreciates the STL for what it is - a framework. Angelika Langer, Independent Consultant and C++ Report Columnist "A superbly authored treatment of the STL......an excellent book which belongs in any serious C++ developer s library." Jim Armstrong, President 2112 F/X, Texas. \n The C++ Standard Template Library (STL) represents a breakthrough in C++ programming techniques. With it, software developers can achieve vast improvements in the reliability of their software, and increase their own productivity.
標簽: information up-to-date available currently
上傳時間: 2015-10-31
上傳用戶:CHINA526
palm編程,用于測試在treo設備中檢測5-way按鈕的操作.
上傳時間: 2014-01-08
上傳用戶:thinode
Spikes can be taken as absolute quantities of measuring values which are large than approximately four (expressed as variable [Times_SD] in the program)times of the standard deviation of the time series, and can be removed by repeating 3 times with each time series. When a measuring value with the deviation from the mean larger than four times of the standard deviation, the variable can be taken as NO_VALUE, and the number of spikes is saved into the variable [SpikeNum]. If the variable [Times_SD] is taken as four, many records will be removed, so the variable [Times_SD] can be taken as larger, for example eight.
標簽: approximately quantities measuring absolute
上傳時間: 2015-11-09
上傳用戶:yangbo69
CFlowchartEditor is an extension of CDiagramEditor. CDiagramEditor is a vector editor, with a CWnd-derived window (CDiagramEditor), a data container (CDiagramEntityContainer) holding the draw-objects, undo stack and managing copy and paste, and objects derived from CDiagramEntity representing objects drawn on screen. CDiagramEditor lacks one feature (that is difficult to implement in both simple and general fashion) - links. Manually maintaining links in a - for example - flowchart or network topography map is unwieldy. Therefore, I ve created a reference implementation for one way of adding this functionality.
標簽: CDiagramEditor CFlowchartEditor extension CWnd-d
上傳時間: 2015-11-21
上傳用戶:氣溫達上千萬的
WordNet is an extensive database developed by Princeton University faculty and students over the last thirty years. The database defines relationships between words in a comparable method to the way humans think of related words.
標簽: University Princeton extensive developed
上傳時間: 2014-06-12
上傳用戶:Andy123456
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
標簽: Sometimes the contents desire
上傳時間: 2013-12-25
上傳用戶:playboys0
Software Engineering and Computer Games By Rudy Rucker Software Engineering and Computer Games was written with four broad goals: To teach a lively style of object-oriented software engineering. To show how to bring a complete program to the level of a commercial release. To provide a "game engine" framework of linked classes for game development. To help students create computer games that are interactive, rapidly executing, and visually beautiful.
標簽: Engineering Software Computer Games
上傳時間: 2015-12-02
上傳用戶:cc1
Universal Serial Bus (USB) is a communications architecture that gives a personal computer (PC) the ability to interconnect a variety of devices using a simple four- wire cable. The USB is actually a two-wire serial communication link that runs at either 1.5 or 12 megabits per second (mbs). USB protocols can configure devices at startup or when they are plugged in at run time. These devices are broken into various device classes. Each device class defines the common behavior and protocols for devices that serve similar functions. Some examples of USB device classes are shown in the following table
標簽: communications architecture Universal computer
上傳時間: 2015-12-08
上傳用戶:stvnash
The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add authentication, encoding, and encryption to their Microsoft Win32® -based applications. Application developers can use the functions in the CryptoAPI without knowing anything about the underlying implementation, in much the same way as they can use a graphics library without knowing anything about the particular graphics hardware configuration.
標簽: Cryptographic Application Programming Microsoft
上傳時間: 2013-12-27
上傳用戶:pinksun9
Apprehend Screen Capture Component Version 4.2 A non-visible component to capture images. Freeware with source. Includes Four Demos with source and EXE s. 3,550 KB. 10/09/2005
標簽: non-visible Apprehend Component component
上傳時間: 2015-12-23
上傳用戶:佳期如夢