Hot Search : Source embeded web remote control p2p game More...
Location : Home

Search in result

list
Sort by :
« 1 2 ... .46 .47 .48 .49 .50 30051.52 .53 .54 .55 .56 ... 267454 »
Downloaded:0
C++ Environment Matrix third-party libraries, professional edition, non-Lite version
Date : 2008-10-13 Size : 17.44kb User : LIUYUEBIN

Downloaded:1
Design of a simulated system user security login interface, using MD5 algorithm realize the security of user login password authentication. Requirements of analog interface with user password file for at least the regist
Date : 2008-10-13 Size : 3.48kb User : rose

Downloaded:0
C51 single-chip dot matrix liquid crystal procedures, curriculum design to do, which has found that the system compiler bug, at least I have that this is the case, but can be used Excerpts
Date : 2008-10-13 Size : 92.39kb User : 唐魏

Downloaded:0
sep routing protocols in wireless sensor networks is a typical routing protocol to improve the sub-cluster, the simulation source code for the design of WSN routing design and simulation have a very good reference
Date : 2008-10-13 Size : 2.75kb User : laren

Downloaded:0
Grammar parser, you can manually select the most left-derivation, the most right is derived, the general derivation
Date : 2008-10-13 Size : 12.36kb User : LIUYUEBIN

Downloaded:0
24-point game, enter the number 4, the output from this number by 4 calculation results for the 24
Date : 2008-10-13 Size : 1.26kb User : lyr

Downloaded:0
Realize the frequency of use of VHDL in terms of measurable input pulse frequency, and a simple correction
Date : 2008-10-13 Size : 171.41kb User : 牛家

Downloaded:0
Alternative to passwords, including many types, such as single-table alternative password, multi-letter alternative password. Try programming a typical single-table alternative password- Caesar (Caesar) password. Its enc
Date : 2008-10-13 Size : 873byte User : rose

Downloaded:0
Permutation cipher does not change the principle is expressly characters, only characters in the explicit change in order to achieve explicit information encryption. Password replacement is also called transposition pass
Date : 2008-10-13 Size : 1.28kb User : rose

Downloaded:0
To use a public key system to digitally sign the message, the sender applies the hash function to the message to create a message digest. The sender then encrypts the message digest with its own private key to create the
Date : 2008-10-13 Size : 1.56kb User : laren

Downloaded:0
Examination system to select the type of questions, after the subject can be calculated from results
Date : 2008-10-13 Size : 23.57kb User : lyr

Downloaded:0
GUI interface design school management system, users can join the students to basic information, and to join the information into the modification, find, and delete.
Date : 2008-10-13 Size : 171.87kb User : rose
« 1 2 ... .46 .47 .48 .49 .50 30051.52 .53 .54 .55 .56 ... 267454 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.