Essential C# 2.0 is a clear, concise guide to C#—including the features new to C# 2.0. The book clearly presents material for beginners and experts and provides contrasts and comparisons between C# and other languages. The C# language is covered com
Hangover Time Limit: 1000MS Memory Limit: 10000K Total Submissions: 44187 Accepted: 20574 Descr iption How far can you make a stack of cards overhang a table? If you have one card, you can create a maximum overhang of half a card length. (We're assu
I Think I Need a Houseboat Time Limit: 1000MS Memory Limit: 10000K Total Submissions: 41126 Accepted: 16537 Descr iption Fred Mapper is considering purchasing some land in Louisiana to build his house on. In the process of investigating the land, he
At present, Resource Descr iption Framework (RDF) documents and schemas (RDFS) are used to describe information in the semantic web. Many research works regard the RDF/RDFS documents as databases and proposed data manipulations for them. This resear
TCP/IP Illustrated, Volume 1 is a complete and detailed guide to the entire TCP/IP protocol suite - with an important difference from other books on the subject. Rather than just describing what the RFCs say the protocol suite should do, this unique
Network Programming with Perl is a comprehensive, example-rich guide to creating network-based applications using the Perl programming language. Among its many capabilities, modern Perl provides a straightforward and powerful interface to TCP/IP, an
6.1 MS shared protection rings MS shared protection rings can be categorized into two types: two-fibre and four-fibre. The ring APS protocol accommodates both types. For MS shared protection rings, the working channels carry the normal traffic signa
Exceptionally comprehensive, this text covers both basic and advanced techniques in image processing and mathematical morphology. It goes beyond the technical to instruct readers on the fundamental theoretical framework required to understand as wel
Servlets are great when your application requires a lot of real programming to accomplish its task. As illustrated earlier in this book, servlets can manipulate HTTP status codes and headers, use cookies, track sessions, save information between req
"The Java landscape is littered with libraries, tools, and specifications. What's been lacking is the expertise to fuse them into solutions to real-world problems. These patterns are the intellectual mortar for J2EE software construction."-John Vlis
Numerical Methods in Engineering with Python is a text for engineering students and a reference for practicing engineers, especially those who wish to explore the power and efficiency of Python. The choice of numerical methods was based on their rel
不多说了,经典的书TCP/IP Illustrated, Volume 1 The Protocols W. Richard Stevens This book describes the TCP/IP protocol suite, but from a different perspective than other texts on TCP/IP. Instead of just describing the protocols and what they do, we'll use a