资源列表

排序选择:

« 1 2 ... .51 .52 .53 .54 .55 100956.57 .58 .59 .60 .61 ... 267454 »

[Windows编程3DLine

说明:chart example to fr a mework 4.0
<Andre> 在 2025-06-29 上传 | 大小:4kb | 下载:0

[其他嵌入式/单片机内容EV2440A_Test

说明:YC2440测试程序,希望能够帮得到大家-arm YC2440 test program
<周跃海> 在 2025-06-29 上传 | 大小:3.25mb | 下载:0

[Windows编程1

说明:“Sealed in a depleted uranium sphere at the bottom of the ocean.” That’s the oft-quoted descr iption of what it takes to make a computer reasonably secure. Obviously, in the Internet age or any other, such a machine would be fairly useless as
<oulding> 在 2025-06-29 上传 | 大小:8.91mb | 下载:1

[软件工程2

说明:People have difficulty remembering multiple passwords. This results in reduced security as users reuse the same password for different systems or reveal other passwords as they try to log in. It can also lead to reduced privacy, as users may
<oulding> 在 2025-06-29 上传 | 大小:1.16mb | 下载:0

[游戏wuziqi

说明:VC源码描述的五子棋人机及网络 一个既能够人机对战,又能够进行网络对战的五子棋系统-wu zi qi
<赵志鹏> 在 2025-06-29 上传 | 大小:7.92mb | 下载:0

[软件工程3

说明:Discretization is used in click-based graphical passwords so that approximately correct entries can be accepted by the system. We show that the existing discretization scheme of Birget et al. (2006) allows for false accepts and false rejects beca
<oulding> 在 2025-06-29 上传 | 大小:252kb | 下载:0

[语音合成与识别Speech_recognition_with_DTW

说明:A source code of a speech recognition system based on DTW
<Anderson> 在 2025-06-29 上传 | 大小:6kb | 下载:0

[软件工程4

说明:Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simp
<oulding> 在 2025-06-29 上传 | 大小:2.62mb | 下载:0

[matlab例程FBG

说明:program on BAR TRANSMISSION,CROSS TRANSMISSION, FBG SPECTRUM
<astik> 在 2025-06-29 上传 | 大小:2kb | 下载:0

[软件工程5

说明:Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malw
<oulding> 在 2025-06-29 上传 | 大小:332kb | 下载:0

[软件工程allinone

说明:fir filter design using mathlab
<tuan> 在 2025-06-29 上传 | 大小:5kb | 下载:0

[软件工程6

说明:The use of computers in public places i ncreasingly common in everyday life. In using one of these computers, a user is trusting it to correctly carry out her orders. For many transactions, particularly banking operations, blind trust in a publ
<oulding> 在 2025-06-29 上传 | 大小:90kb | 下载:0
« 1 2 ... .51 .52 .53 .54 .55 100956.57 .58 .59 .60 .61 ... 267454 »

源码中国 www.ymcn.org