-
Python核心编程(第二版)
python核心编程书籍,适合小白入门的一本书强烈推荐(Python core programming books)
- 2020-06-17 08:20:01下载
- 积分:1
-
Wind-power
风电程序可以用来实现随即风电输出功率的生成(wind power)
- 2012-03-31 18:39:17下载
- 积分:1
-
huaweiCPP(CHM)
华为C++培训资料C++语言中级教材讲授C++语言的运用技术,包括:类、对象之间的关系、对象的存储与布局、运算符重载、智能指针、仿函数、泛型编程,C++模式设计基本思想。
(C++ language intermediate materials to teach C++ language use of technology, including: classes, relationships between objects, object storage and layout, operator overloading, smart pointer, functor, generic programming, C++ mode design basic idea.)
- 2013-05-05 16:53:08下载
- 积分:1
-
VCdatabase
说明: 详细介绍了用VC.NET开发城市基础地理数据库的实例,用于城市测绘,城市基础地理系统建设的重要参考。(Described in detail with the development of urban infrastructure VC.NET examples of geographic database for urban mapping, urban infrastructure an important geographic reference system.)
- 2009-08-17 22:36:26下载
- 积分:1
-
brainstormers-rc09-tdp.pdf.tar
Brainstomers 2D TDP 2009
- 2010-01-17 06:20:04下载
- 积分:1
-
2379210752itti_attention
经典的视觉显著性检测的论文,在网站可以找到对应的源码。很有参考价值(The classic visual detection of significant papers on the website can be found in the corresponding source code. Of great reference value)
- 2010-01-19 21:48:16下载
- 积分:1
-
irbookonlinereading
an introduction to information retrieval, great book for search engine in English
- 2009-04-13 07:42:05下载
- 积分:1
-
GPS_INS_matlab
适用于低成本组合导航系统的松组合算法。.(an approach which is suit for the low-cost navigation system.)
- 2017-06-11 15:57:58下载
- 积分:1
-
HackMiji
讲述黑客攻防的各类技巧,内容多而全,细读一遍后你会知道很多黑客知识.(Hackers on the types of offensive and defensive skills, and the entire contents, read on it you will know that a lot of hacking knowledge.)
- 2009-01-04 14:28:31下载
- 积分:1
-
ecc
说明: This paper analyzes the cryptography scheme of the Trust Platform Model(TPM). The focus of the discussion would be the comparison of elliptic curve cryptography and the nowadays widely used 2048-bit RSA in evaluating which would be better suited to be used on TPM. A TPM implementation scheme based on ECC is proposed, which includes encryption and decryption schemes, signature and verification scheme, key agreement scheme. Corresponding examples of TPM commands would also be given.
- 2019-06-13 14:53:45下载
- 积分:1