Hot Search : Source embeded web remote control p2p game More...
Location : Home Documents
Documents list
Sort by :
« 1 2 ... .00 .01 .02 .03 .04 16605.06 .07 .08 .09 .10 ... 16928 »
Downloaded:1
MATLAB to 11 in comparison scheduling algorithm, including the min-min, max-min, genetic algorithms and so on.
Update : 2008-10-13 Size : 286.29kb Publisher : gourd

Downloaded:0
Mainly based on the weblogic server j2ee architecture, database connections, using images of the ways of complex issues, simplify the
Update : 2008-10-13 Size : 35.02kb Publisher : hetengfei

Detailed introduction of the java stored procedure in the concept and its use. Java programming in order to improve efficiency, it is necessary to find out.
Update : 2008-10-13 Size : 10.27kb Publisher : hetengfei

Downloaded:1
Handheld wireless terminals to monitor the design and implementation- in Linux under ffmpeg, a pretty good master s thesis on the relevant projects helpful.
Update : 2008-10-13 Size : 2.66mb Publisher : 郑生朋

Downloaded:0
ANSYS engineering analysis Advanced example - Hu Jia, Wang- the source code to see documents it. Not much to say.
Update : 2008-10-13 Size : 280.27kb Publisher : lovephppig

A synthesis of several commonly used methods of face recognition
Update : 2008-10-13 Size : 221.34kb Publisher : lijin

Downloaded:0
Very carefully the GS algorithm, for the RS decoding process. KV algorithm is the foundation. Contains many examples. Invaluable information on the RS code
Update : 2008-10-13 Size : 311.97kb Publisher : 牛群山

Downloaded:1
MPEG2 the basis of theoretical knowledge (Chinese) Part I: System Part II: Video Compression Part III: Audio Compression
Update : 2008-10-13 Size : 16.16mb Publisher : liyali

Downloaded:0

Update : 2008-10-13 Size : 598byte Publisher : zhdzhang

Downloaded:0
This is a train inquiries is only limited in the Heilongjiang province肩窝machine Oh degrees十斤Dividing cents
Update : 2008-10-13 Size : 1.89kb Publisher : 许配内

Downloaded:0
CMD under the network security configuration. Relevant network order
Update : 2008-10-13 Size : 9.08kb Publisher : 别来无恙

Downloaded:0
Technology stack buffer overflow attacks overflow attacks technology specific description of how the stack overflow attacks
Update : 2008-10-13 Size : 437.21kb Publisher : aijdf
« 1 2 ... .00 .01 .02 .03 .04 16605.06 .07 .08 .09 .10 ... 16928 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.