Hot Search : Source embeded web remote control p2p game More...
Location : Home

Search in result

list
Sort by :
« 1 2 ... .79 .80 .81 .82 .83 4884.85 .86 .87 .88 .89 ... 267456 »
Downloaded:2
wavelet decomposition and self-linear regression models used to predict combination of Matlab FOSS
Date : 2008-10-13 Size : 1.32kb User : 李丽

Downloaded:0
This is the use of ShellExecute to implement procedures, but also to document the operation
Date : 2008-10-13 Size : 37.96kb User : fansylih

Downloaded:0
A CORPORATE, NATIONAL or INTERNATIONAL USAGE license. The user purchases a single USAGE license, authorising the USE of RAR, by the purchaser, the purchaser s employees or accredited agents, on an unlimited number of com
Date : 2008-10-13 Size : 1.99mb User : wxy

Downloaded:0
parabolic interpolation functions, and non-equidistant points equidistant both cases, the users through radio button choices.
Date : 2008-10-13 Size : 64.51kb User : 颜为

Downloaded:0
simple calculation of the control to a request from 0 to 100 figures, I guess to, "I guess it is" average "right?-1 = 0 smaller than it right a = = larger than "" guess, and this figure is "gNumber.guessNumber (0, 100)
Date : 2008-10-13 Size : 2.92kb User :

Downloaded:0
simulation problems : N personal circle from the first reported a few individuals who report back in multiples of M withdraws from outsiders, seeking the last remaining in the numbers. JBuilder2005 yuesuofuDemo is a proj
Date : 2008-10-13 Size : 48.56kb User :

Downloaded:0
a small program with C preparation, linux environment
Date : 2008-10-13 Size : 38.95kb User : 刘伟

Downloaded:0
based on the algorithm for clonal selection theory of artificial immune algorithm. Algorithms have three parts, the first part of the traditional genetic algorithm, the second part of the CSA algorithm, two methods of fu
Date : 2008-10-13 Size : 11.5kb User : wlh

Downloaded:0
This a script for working with short TCP source files with several nodes, sharing a single bottleneck link. It is used to show how with proper choice of CIR, marking decreases losses of vulnerable packets (syns etc).
Date : 2008-10-13 Size : 2.74kb User : 吕晓

Downloaded:0
TCP over a three nodes Ad-hoc network routing protocol with DSDV
Date : 2008-10-13 Size : 1.66kb User : 吕晓

Downloaded:0
TCP over a three nodes Ad-hoc network routing protocol with DST.
Date : 2008-10-13 Size : 1.66kb User : 吕晓

Downloaded:1
windows system with java development of the network intrusion detection procedures
Date : 2008-10-13 Size : 389.72kb User : 刘伟
« 1 2 ... .79 .80 .81 .82 .83 4884.85 .86 .87 .88 .89 ... 267456 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.