搜索资源列表
btbrbtr
- zhe ge shi haodongxi nimen kan le meiyou yong
20040910163044
- CHENG XU XIA ZAI , BU XU YAO MI MA , JIU KE YI XIA ZAI VB CHENG XU LE 。-Cheng Xu shaped ZAI, BU XU loses MI MA, JIU KE YI shaped ZAI VB Cheng Xu LE.
传奇3光通版启动端
- 传奇3光通版启动端 传奇3光通版启动端 传奇3光通版启动端-legendary three-start version of luminous flux le gendary three-start version of luminous flux legendary three-start version of Optical Communication
office2003menuscomponent009
- vb outlook 操作 outlook outlook_vb bu shuo le -vb outlook operation outlook outlook_vb le shuo bu
HA-InnoSetup515-moming
- mei sm ke yi shuo de zi ji kan kan jiu zhidao le han hua bao-mei sm ke yi zi ji shuo de kan kan le JIU zhidao han bao hua
Server_Client_Sockets_src
- The reason why I decided to write this article is because, I was learning myself how to use sockets with under windows, I could not find one place that had a tutorial which included every thing i was looking for, or if it did it was way to complicate
英语四级考试大纲词汇
- mages mages\\black.bmp mages\\black_Old.bmp mages\\cross.bmp mages\\down.bmp mages\\left.bmp mages\\leftdown.bmp mages\\lefttop.bmp mages\\right.bmp mages\\rightdown.bmp-mages \\ black.bmp mages \\ black_Old. bmp mages \\ c
达芬奇密码1
- mages mages\\black.bmp mages\\black_Old.bmp mages\\cross.bmp mages\\down.bmp mages\\left.bmp mages\\leftdown.bmp mages\\lefttop.bmp mages\\right.bmp mages\\rightdown.bmp-mages \\ black.bmp mages \\ black_Old. bmp mages \\ c
AdRestoreSource
- Server 2003 introduces the ability to restore deleted (\"tombstoned\") objects. This simple command-line utility enumerates the deleted objects in a domain and gives you the option of restoring each one. Source code, which is included, is based on sa
cryptograph
- 文件加密与解密 文件加密与解密-file encryption and decryption of the fi le encryption and decryption of the file encryption and decryption
yigejiandandetuxiangchuliruanjian
- 一个简单的图像处理软件 一个简单的图像处理软件-a simple image processing software a simp le image processing software
TribeFloodNet2k
- Tribe FloodNet 2k Distributed Denial Of Service Network 分布式拒绝服务工具的源代码,下面为英文说明: TFN can be seen as the yet most functional DoS attack tool with the best performance that is now almost impossible to detect. What is my point in releasing th
DYNSPLIT
- keyidakaiwenjian jieshao le caidan d zhizuofangfa-keyidakaiwenjian jieshao le d zhiz caidan uofangfa
ArielBrowseFolder
- A user control resembling a combobox. When the dropdown button is clicked, a browse through a folder treeview to select a directory is displayed. Uses the SHBrowseForFolder function, amongst other APIs. A call back procedure is implemented showing t
LE-30-232-ASCIIdatasheet
- LE-30是双轴倾角传感器,通过测量静态重力加速度变化,转换成倾角变化。测量输出传感器相对于水平面的倾斜和俯仰角度。内置温度补偿自动修正传感器温度漂移。-LE-30 is a dual-axis tilt sensor by measuring the static acceleration of gravity changes into angle changes. Measuring output of the sensor relative to the horizontal tilt a
LE-60-232datasheet
- LE-60是双轴倾角传感器,通过测量静态重力加速度变化,转换成倾角变化。测量输出传感器相对于水平面的倾斜和俯仰角度。内置温度补偿自动修正传感器温度漂移。-LE-60 is a dual-axis tilt sensor by measuring the static acceleration of gravity changes into angle changes. Measuring output of the sensor relative to the horizontal tilt a
InstallShield-LE
- 利用VS2010内置的InstallShield LE发布、打包安装程序生成Setup等文件的方法-Use VS2010 built-in InstallShield LE publishing, packaging and other documents generated by the installer Setup method
le_cable_replacement_client
- BT121 LE client application
le_cable_replacement_server
- BT121 LE server application based on Bluegiga
L2_distance
- 流形学习最常用的算法LE算法,可在此基础上进行修改或和其他算法相结合,实现更优的聚类效果。(Manifold learning, the most commonly used algorithm, LE algorithm, which can be modified on this basis, or combined with other algorithms to achieve better clustering results.)