资源列表
RTD2523-Mode-Detection
- RTD2523 mode detection,主要介绍怎样侦测timing-Of RTD2523 mode detection, describes how to detect the timing
iic
- IIC总线,外设与单片机相连时用IIC进行接口的代码-IIC bus, peripherals and microcontroller is connected with IIC interface code
call-center2-20120920-3P3P2
- 本代码用遗传算法解决多技能呼叫中心问题的排班问题,使用的是基本遗传算法-genetic algorithm to solve staffing problem in multi-skill call centers
new-media-desgin
- Directshow 视频播放 x相关的视频播放暂停配置-Directshow Video Play Code and Configuration aaaaaaaaaaaaaaaaaa
FlighTicketBooking
- 飞机订票系统用vs2005为基础做的。关于飞机的价格 时间等!-Airline reservation system with vs2005. About the time the price of the aircraft, etc.!
Wireless-Communication
- 无线通信基础中英文版以及部分课后答案,包括了MIMO系统的主要技术-Wireless communications infrastructure in English as well as after-school answer
Thinking-in-CPP
- 深入理解c++,本书包括各种c++编程经验的总结和技巧,以及大师的编程思想,是充实编程工作者的葵花宝典-In-depth understanding of c++, book including a summary of the various c++ programming experience and skills, as well as a master' s programming ideas, to enrich the programming holy canon of wor
Matlab
- Matlab经典教程——从入门到精通.pdf-Matlab classic tutorial- from entry to the master. Pdf
cSharp-basic-P2P-Programming-Manual
- C# 语言基础的P2P开发教程,简单,适合有点经验的程序猿,大神别来批斗了!-C# language based P2P development tutorial, simple program ape suit a little experience, do not come to God denounced!
Researchimplemenationofdatarecovery
- 针对由主观或客观因素造成计算机中数据丢失的情况,提出一种Windows NTFS文件系统下数据恢复的实现方案-The data in computer is lost because ofthe subjective and objective reasons,To solve this problem,an implement schemeof data recovery on Windows NTFS file system is proposed
Binary-Patch-Comparison
- 针对软件二进制补丁分析过程,提出一种指令归一化算法,用于判别补丁前后的相应基本块内指令是否发生重排序-Aiming at the analyzing process of software binary patch, this paper proposes an instruction normalization algorithm to distinguish whether the corresponding basic blocks are reordered
Dynamic-Detection-of-Buffer-overflow
- 提出一种在二进制环境下挖掘缓冲区溢出漏洞的方法。结合动态与静态挖掘技术对二进制环境下的程序作进一步的漏洞查找。-】This paper proposes a method to detect buffer-overflow vulnerabilities for executables. Combining dynamic analysis and static analysis,it makes further detection of buffer-overflow vulnerabilit
