CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Documents
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Sub Category
Network Marketing
Management
E-commerce
Business guide
Business plan
Successful incentive
Human Resources
Report papers
Marketing materials
Consulting and training
Website
Software Engineering
File Format
Technology Management
Industry research
Program doc
Other
Search in result
Search
Documents list
Sort by :
«
1
2
...
.96
.97
.98
.99
.00
16601
.02
.03
.04
.05
.06
...
16924
»
1233
Downloaded:1
Handheld wireless terminals to monitor the design and implementation- in Linux under ffmpeg, a pretty good master s thesis on the relevant projects helpful.
Date
: 2008-10-13
Size
: 2.66mb
User
:
郑生朋
ASsystem-Anglist-Example
Downloaded:0
ANSYS engineering analysis Advanced example - Hu Jia, Wang- the source code to see documents it. Not much to say.
Date
: 2008-10-13
Size
: 280.27kb
User
:
lovephppig
face-recognition-technogy
Downloaded:0
A synthesis of several commonly used methods of face recognition
Date
: 2008-10-13
Size
: 221.34kb
User
:
lijin
GSRS
Downloaded:0
Very carefully the GS algorithm, for the RS decoding process. KV algorithm is the foundation. Contains many examples. Invaluable information on the RS code
Date
: 2008-10-13
Size
: 311.97kb
User
:
牛群山
MPEG2_CHS
Downloaded:1
MPEG2 the basis of theoretical knowledge (Chinese) Part I: System Part II: Video Compression Part III: Audio Compression
Date
: 2008-10-13
Size
: 16.16mb
User
:
liyali
Matlabnn
Downloaded:0
Date
: 2008-10-13
Size
: 598byte
User
:
zhdzhang
trian2
Downloaded:0
This is a train inquiries is only limited in the Heilongjiang province肩窝machine Oh degrees十斤Dividing cents
Date
: 2008-10-13
Size
: 1.89kb
User
:
许配内
CMD
Downloaded:0
CMD under the network security configuration. Relevant network order
Date
: 2008-10-13
Size
: 9.08kb
User
:
别来无恙
234234223
Downloaded:0
Technology stack buffer overflow attacks overflow attacks technology specific description of how the stack overflow attacks
Date
: 2008-10-13
Size
: 437.21kb
User
:
aijdf
23432423070410
Downloaded:0
Security of information security products developed and introduced the practice of introducing Libnet how to structure packet
Date
: 2008-10-13
Size
: 64.4kb
User
:
aijdf
managesystermppt
Downloaded:0
Simulation of the operating system partition management subsystem is divided into the first-fit algorithm, the best adaptation algorithm, the worst-fit algorithm.
Date
: 2008-10-13
Size
: 118.64kb
User
:
liuli
select_course_system
Downloaded:0
Graduation Project- a student elective system design and realization, we are interested in on the look
Date
: 2008-10-13
Size
: 258.23kb
User
:
lanfei_1234
«
1
2
...
.96
.97
.98
.99
.00
16601
.02
.03
.04
.05
.06
...
16924
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.