Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each recipe also includes explanations of how and why the approach works, so you can adapt the techniques to similar situations. One of the biggest challenges facing developers today is sorting through the wide variety of tools available form various source and figuring out how to them effectively. The recipes in Java Extreme Programming Cookbook showcase how to use the most important features of these XP tools. Many of these tools are geared towards unit testing, while others are invaluable for continuous integration with these practical examples, you ll be able to choose the most effective tools to accomplish your goals, then implement them in a cohesive development environment quickly.
標(biāo)簽: cut-and-paste Programming collection Cookbook
上傳時(shí)間: 2017-06-29
上傳用戶:cmc_68289287
*** HyperString v6.0 *** (c)1996-2000 EFD Systems, All rights reserved efd@mindspring.com *** THIS IS NOT PUBLIC DOMAIN SOFTWARE *** See below for license agreement, disclaimer, installation and use. Introduction --------------------------------------------------------- Welcome to HyperString! One of the most significant new features with Delphi32 is long dynamic strings. However, the built-in functions don t really exploit the full potential of these new strings. HyperString provides over 400 fast, efficient string management routines to help you realize the full power of this highly versatile new data type.
標(biāo)簽: HyperString reserved Systems rights
上傳時(shí)間: 2017-07-04
上傳用戶:mhp0114
The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution.
標(biāo)簽: application real-time Synopsys emphasis
上傳時(shí)間: 2017-07-05
上傳用戶:waitingfy
AJAX Book Reader is a complete AJAX client-server application that may be used with a Web browser to display a sequence of text files one page at a time. The display style is completely controlled by a configuration file. The first application of this is as a book viewer where each chapter resides in a seperate text file. It is also suitable for any case where it is not practical to show all of the text to be displayed at once in the browser window.
標(biāo)簽: AJAX client-server application complete
上傳時(shí)間: 2014-01-02
上傳用戶:kikye
In number theory, the Euclidean algorithm (also called Euclid s algorithm) is an algorithm to determine the greatest common divisor (GCD) of two elements of any Euclidean domain (for example, the integers). Its major significance is that it does not require factoring the two integers, and it is also significant in that it is one of the oldest algorithms known, dating back to the ancient Greeks.
標(biāo)簽: algorithm Euclidean Euclid number
上傳時(shí)間: 2017-07-17
上傳用戶:戀天使569
A digital filter structure for wideband filtering is proposed. It consists of two allpass filters and a linearphase FIR filter. One major advantage of this structure is that the allpass filters are functions of zM which implies that the maximal sample frequency is M times higher for this structure than for the corresponding conventional structures.
標(biāo)簽: structure filtering consists proposed
上傳時(shí)間: 2014-01-21
上傳用戶:weixiao99
This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secret image is in LSB of 1st 32 pixels of 1st row of the cover image.This helps in the recovery of secret image. The secret image must be smaller than cover image.A message box will appear with a number ,that number is the maximum product of width and height of secret image that can be successfully embedded in the cover image. The final png image will appear in workspace with random name.This image contains the secret image.One such png image is in the zip file with name 4447.png it contains an image of res 100x122.
標(biāo)簽: image jpeg png another
上傳時(shí)間: 2017-07-25
上傳用戶:gououo
LIBSVM 是臺(tái)灣大學(xué)林智仁(Chih-Jen Lin)博士等開發(fā)設(shè)計(jì)的一個(gè)操作簡單、易于使用、快速有效的通用SVM 軟件包,可以解決分類問題(包括C- SVC、n - SVC )、回歸問題(包括e - SVR、n - SVR )以及分布估計(jì)(one-class-SVM )等問題,提供了線性、多項(xiàng)式、徑向基和S形函數(shù)四種常用的核函數(shù)供選擇,可以有效地解決多類問題、交叉驗(yàn)證選擇參數(shù)、對不平衡樣本加權(quán)、多類問題的概率估計(jì)等。 2.89版本是09年剛更新的一個(gè)版本。
標(biāo)簽: Chih-Jen LIBSVM Lin SVM
上傳時(shí)間: 2014-01-18
上傳用戶:baitouyu
This article discusses some issues that a typical Windows C++ programmer will encounter when approaching Symbian OS for the first time. Our experience in developing for three successive versions of Symbian OS has given us considerable perspective on what can be difficult when working in this otherwise rich and stable environment. While one reason for Symbian s success may be the desire of many mobile phone manufacturers not to be tied to Microsoft, the other reason is that Symbian has put together a lightweight, elegant system that succeeds in providing a very impressive range of functionality. Here are some pointers to help ease the transition to successful Symbian OS application development.
標(biāo)簽: programmer discusses encounter article
上傳時(shí)間: 2017-07-30
上傳用戶:zhaiyanzhong
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.
標(biāo)簽: Infrastructure cryptographic entities physical
上傳時(shí)間: 2017-07-31
上傳用戶:561596
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1