您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. .Net框架程序设计英文版PDF

  2. APPLIED MICROSOFT.NET FRAMEWORK PROGRAMMING
  3. 所属分类:C#

    • 发布日期:2008-07-18
    • 文件大小:4194304
    • 提供者:qzzhenglong
  1. Fractional discreteq -Fourier transforms

  2. The discrete Fourier transform (DFT) matrix has a manifold of fractionalizations that depend on the choice of its eigenbases. One prominent basis is that of Mehta functions; here we examine a family of fractionalizations of the DFT stemming from q-e
  3. 所属分类:专业指导

    • 发布日期:2012-10-08
    • 文件大小:1048576
    • 提供者:cookey520
  1. MIT-BIH-ECG信号的读取

  2. 读取MIT-BIH数据库中的ECG信号 created on Feb. 27, 2003 by Robert Tratnig (Vorarlberg University of Applied Sciences)(email: rtratnig@gmx.at),
  3. 所属分类:其它

    • 发布日期:2012-10-15
    • 文件大小:5120
    • 提供者:negative_sc
  1. shankar quantumn

  2. Reviews from the First Edition: "An excellent text ... The postulates of quantum mechanics and the mathematical underpinnings are discussed in a clear, succinct manner." (American Scientist) "No matter how gently one introduces students to the conce
  3. 所属分类:专业指导

    • 发布日期:2012-10-18
    • 文件大小:14680064
    • 提供者:eray0206
  1. Matrix Computations for Signal Processing (X.L.Ma)

  2. 英文书,非常清晰的pdf版本,可做为信号处理领域的基础用书,介绍了信号处理领域一些常用的矩阵分解理论。 This collection of ten chapters of notes will give the reader an introduction to the fundamental principles of linear algebra for application in many disciplines of modern engineering and science,
  3. 所属分类:专业指导

    • 发布日期:2012-10-19
    • 文件大小:3145728
    • 提供者:xuejiayin
  1. Applied Microsoft .NET Framework Programming

  2. To create rich applications like these, businesses must offer a programmaticinterface to their business logic services. This programmatic interface mustbe callable remotely using a network, like the Internet. This is what theMicrosoft .NET initiativ
  3. 所属分类:C#

    • 发布日期:2008-07-24
    • 文件大小:4194304
    • 提供者:tomzfdy
  1. UML Distilled

  2. Derived Properties: can be calculated based on other values. (These values are linked, so we can think of the length as being derived from other values) You can see derivation to indicate the difference between a calculated value and a store value.
  3. 所属分类:专业指导

    • 发布日期:2012-10-26
    • 文件大小:1048576
    • 提供者:susan200893171
  1. 敏捷开发教程

  2. Apress - Agile Development with ICONIX Process.chm Microsoft.Press.Agile.Project.Management.with.Scrum.chm productive_programmer_minibook_infoq.pdf User Stories Applied.chm
  3. 所属分类:Java

    • 发布日期:2012-11-07
    • 文件大小:18874368
    • 提供者:xiaobinhuang
  1. EPIDATA 3.1版本

  2. epidata 用来输入问卷什么的。1. Read below go through the Introduction to EpiData found in the help menu of EpiData, including whats new in v3 2. Find the extended help file for easy printing at www.epidata.dk/documentation.php as well as international languag
  3. 所属分类:网络基础

    • 发布日期:2012-11-11
    • 文件大小:1048576
    • 提供者:jy03001742
  1. Lucene_in_Action

  2. PART 1 CORE LUCENE...............................................................1 1 ■ Meet Lucene 3 2 ■ Indexing 28 3 ■ Adding search to your application 68 4 ■ Analysis 102 5 ■ Advanced search techniques 149 6 ■ Extending search 194 PART 2 APPLIED
  3. 所属分类:Java

    • 发布日期:2012-11-15
    • 文件大小:9437184
    • 提供者:wangyuanjian
  1. r软件数据分析 数据(forestfires)

  2. In [Cortez and Morais, 2007], the output 'area' was first transformed with a ln(x+1) function. Then, several Data Mining methods were applied. After fitting the models, the outputs were post-processed with the inverse of the ln(x+1) transform. Four
  3. 所属分类:管理软件

    • 发布日期:2012-11-22
    • 文件大小:25600
    • 提供者:jessicachuan
  1. Handbook of Applied Cryptography

  2. Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many application
  3. 所属分类:专业指导

    • 发布日期:2012-11-23
    • 文件大小:5242880
    • 提供者:fetag
  1. Applied Cryptanalysis: Breaking Ciphers in the Real World

  2. The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cr
  3. 所属分类:专业指导

    • 发布日期:2012-11-23
    • 文件大小:18874368
    • 提供者:fetag
  1. UML 2.0 in a Nutshell

  2. Welcome to UML 2.0 in a Nutshell. The Unified Modeling Language (UML) has expanded quite a bit since its inception and can be applied to many different domains, however it still has its roots in software development. We have tried to make this book
  3. 所属分类:其它

    • 发布日期:2008-07-31
    • 文件大小:2097152
    • 提供者:ytzhsh
  1. 文件查找工具--快搜王

  2. 快搜王 快速找到你电脑上的东东 Everything is a search engine for Windows. Everything can quickly locate files and/or folders by name. Basic file operations can be applied to the results.
  3. 所属分类:其它

    • 发布日期:2012-11-24
    • 文件大小:5242880
    • 提供者:springfallwrc
  1. Numerical study of dynamic behavior of concrete by meso-scale particle element

  2. 离散元应用论文 Based on the Particle Element Method, a meso-scale dynamic model is developed for numerical study of the dynamic failure behavior of three-phase concrete i.e., aggregate, mortar, and interface, under different strain rates. First, a pre-proc
  3. 所属分类:教育

    • 发布日期:2012-11-30
    • 文件大小:3145728
    • 提供者:yuiop2012
  1. 数字信号作业

  2. Duobinary signaling is applied to the data sequence Dk = 1011001010, determine the precoded sequence (pk), transmitted sequence (ak), and received sequence (bk). Verify that Dk can be obtained from bk.
  3. 所属分类:专业指导

  1. Barcode Generator for ASP.NET

  2. Barcode for ASP.NET has been used since 2003 and it is widely applied into ASP.NET web application, Console application, and some reporting projects, including .NET Reporting Services, Crystal Reports and RDLC Client Reports.
  3. 所属分类:Web开发

    • 发布日期:2012-12-07
    • 文件大小:865280
    • 提供者:susannamoore
  1. CLR via C# fourth editon (English)

  2. In this new edition of Jeffrey Richter’s popular APPLIED MICROSOFT .NET FRAMEWORK PROGRAMMING, you get focused, pragmatic guidance on how to exploit the common language runtime (CLR) functionality in .NET Framework 2.0 for applications of all types—
  3. 所属分类:C#

    • 发布日期:2012-12-10
    • 文件大小:6291456
    • 提供者:zamesking
  1. 信息安全顶级会议

  2. 信息安全顶级会议: Rank 1 S&P (Oakland) IEEE Symposium on Security and Privacy CCS ACM Conference on Computer and Communications Security Crypto International Cryptology Conference Eurocrypt European Cryptology Conference Security Usenix Security Symposium N
  3. 所属分类:网络安全

    • 发布日期:2012-12-10
    • 文件大小:29696
    • 提供者:mkun1986
« 1 2 ... 42 43 44 45 46 4748 49 50 »