Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Other
Other list
Sort by :
« 1 2 ... .71 .72 .73 .74 .75 13676.77 .78 .79 .80 .81 ... 14954 »
Downloaded:0
Delphi three-tier development, utilization for the development of MIDAS. Very practical
Date : 2008-10-13 Size : 2.13mb User : your name

Downloaded:0
Reading and writing of AD5933 and some calculations (assembly language)
Date : 2008-10-13 Size : 3.61kb User : cbl

Accept an external file drag and drop, the file name is no longer garbled, copyright hke, hope that the exchange of programming technology.
Date : 2008-10-13 Size : 25.51kb User : cuixinyan

Downloaded:0
Their own step by step, the source operating system structure, the source document for understanding the operating system, and construction of the operating system has very important significance.
Date : 2008-10-13 Size : 47.77mb User : DerekLouie

Downloaded:0
This is the speech recognition using MFCC feature parameters instituted procedures for voice
Date : 2008-10-13 Size : 3.69kb User : 李观海

Downloaded:0

Date : 2008-10-13 Size : 878byte User : 朱力群

Downloaded:0
Simple application of.net remoting Simple application of.net remoting Simple application of.net remoting
Date : 2008-10-13 Size : 19.89kb User : 颜景波

Downloaded:0
Good access to the hard disk control information, from www.torry.net
Date : 2008-10-13 Size : 13.83kb User : hottey

Downloaded:0
Paperback version of the perfect introduction to uninstall: uninstall the perfect Swiss Army knife is a system maintenance, independent paperback version of the perfect uninstall software uninstall isolated specialized f
Date : 2008-10-13 Size : 3.75mb User : panweigood

Downloaded:0
Infected file to look for opportunities to carry out the overall network communication
Date : 2008-10-13 Size : 891byte User : coolor

Downloaded:0
For the compilation of the field, applied to the MAIN function OS. Based on the hardware-based source code
Date : 2008-10-13 Size : 688.87kb User : dolphin

Downloaded:0
This code implements in C++ a basic left-right hidden Markov model and corresponding Baum-Welch (ML) training algorithm. It is meant as an example of the HMM algorithms described by L.Rabiner (1) and others. Serious stud
Date : 2008-10-13 Size : 15.26kb User : aaaaaaa
« 1 2 ... .71 .72 .73 .74 .75 13676.77 .78 .79 .80 .81 ... 14954 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.