资源列表

« 1 2 ... .95 .96 .97 .98 .99 10500.01 .02 .03 .04 .05 ... 16924 »

[软件工程Wireless-Communication

说明:无线通信基础中英文版以及部分课后答案,包括了MIMO系统的主要技术-Wireless communications infrastructure in English as well as after-school answer
<xiaoying> 在 2026-01-23 上传 | 大小:15.92mb | 下载:0

[软件工程Thinking-in-CPP

说明:深入理解c++,本书包括各种c++编程经验的总结和技巧,以及大师的编程思想,是充实编程工作者的葵花宝典-In-depth understanding of c++, book including a summary of the various c++ programming experience and skills, as well as a master' s programming ideas, to enrich the programming holy canon of wor
<lzm> 在 2026-01-23 上传 | 大小:13.82mb | 下载:0

[软件工程Matlab

说明:Matlab经典教程——从入门到精通.pdf-Matlab classic tutorial- from entry to the master. Pdf
<xu> 在 2026-01-23 上传 | 大小:2.18mb | 下载:0

[编程文档cSharp-basic-P2P-Programming-Manual

说明:C# 语言基础的P2P开发教程,简单,适合有点经验的程序猿,大神别来批斗了!-C# language based P2P development tutorial, simple program ape suit a little experience, do not come to God denounced!
<BIRD> 在 2026-01-23 上传 | 大小:123kb | 下载:0

[软件工程Researchimplemenationofdatarecovery

说明:针对由主观或客观因素造成计算机中数据丢失的情况,提出一种Windows NTFS文件系统下数据恢复的实现方案-The data in computer is lost because ofthe subjective and objective reasons,To solve this problem,an implement schemeof data recovery on Windows NTFS file system is proposed
<lijie> 在 2026-01-23 上传 | 大小:249kb | 下载:0

[行业发展研究Binary-Patch-Comparison

说明:针对软件二进制补丁分析过程,提出一种指令归一化算法,用于判别补丁前后的相应基本块内指令是否发生重排序-Aiming at the analyzing process of software binary patch, this paper proposes an instruction normalization algorithm to distinguish whether the corresponding basic blocks are reordered
<lijie> 在 2026-01-23 上传 | 大小:362kb | 下载:0

[行业发展研究Dynamic-Detection-of-Buffer-overflow

说明:提出一种在二进制环境下挖掘缓冲区溢出漏洞的方法。结合动态与静态挖掘技术对二进制环境下的程序作进一步的漏洞查找。-】This paper proposes a method to detect buffer-overflow vulnerabilities for executables. Combining dynamic analysis and static analysis,it makes further detection of buffer-overflow vulnerabilit
<lijie> 在 2026-01-23 上传 | 大小:73kb | 下载:0

[行业发展研究Taxonomyof-Software-Vulnerabilities

说明:软件漏洞是发生安全事件的根源,当软件漏洞被利用时,会造成严重的后果。-The vulnerabilities of software are the root of most security incident. When these vulnerabilities can be exploited, this has a seriousimpact.
<lijie> 在 2026-01-23 上传 | 大小:72kb | 下载:0

[行业发展研究cengcifengxi

说明:这是层次分析法的相关资料,建模人员可以看一下。-This is the Analytic Hierarchy Process, modelers can look at.
<你大爷> 在 2026-01-23 上传 | 大小:6.58mb | 下载:0

[软件工程Contador-de-Caracteres

说明:This program basically count every character that is in a text. The program opens de text an reads it, stores data in a matrix and count characters that are in Ascii code and writes the results in a new text file
<Yess> 在 2026-01-23 上传 | 大小:5kb | 下载:0

[编程文档信力隆协议

说明:信力隆协议信力隆协议信力隆协议信力隆协议信力隆协议信力隆协议信力隆协议信力隆协议信力隆协议
<lvchangfeng@gmail.com> 在 2013-03-09 上传 | 大小:32kb | 下载:0

[软件工程STM32rymen

说明:主要讲述了STM32的入门知识,会有帮助。-Focuses STM32 introductory knowledge, would be helpful.
<袁泳华> 在 2026-01-23 上传 | 大小:16.06mb | 下载:0
« 1 2 ... .95 .96 .97 .98 .99 10500.01 .02 .03 .04 .05 ... 16924 »

源码中国 www.ymcn.org