Hot Search : Source embeded web remote control p2p game More...
Location : Home Documents Software Engineering

Search in result

Software Engineering list
Sort by :
« 1 2 ... .93 .94 .95 .96 .97 7898.99 .00 .01 .02 .03 ... 8587 »
Downloaded:0
Digital video sequences of moving targets detection and tracking of technical studies, Northwestern University, the article discussed the problem of multi-target tracking
Date : 2025-06-23 Size : 3.63mb User : 泫泉

Inertial high dynamic algorithm, a master
Date : 2025-06-23 Size : 3.24mb User : zhanghui

Downloaded:0
Sales management system- have graduated from the design code and papers, can be designed to do graduate
Date : 2025-06-23 Size : 6.73mb User : 微微

Downloaded:0
atmelppt_9_DBGU document, very useful are welcome to download
Date : 2025-06-23 Size : 82kb User :

Downloaded:0
wo rkflow document workflow document wo rkflow document wo rkflow document wo rkflow document
Date : 2025-06-23 Size : 520kb User :

Downloaded:0
Design title and requirements 1. Program design topic: student achievement management program design Ii. Program design functions and requirements: 1. Show the students' achievements, total points and average peace. 2. A
Date : 2025-06-23 Size : 19kb User : huangfeng

Downloaded:0
at89c51+ isp1581 control procedures (c language source code). contains fast mode and high-speed mode
Date : 2025-06-23 Size : 286kb User : chaley

Downloaded:0
Loaded to start a full screen type for your helpful
Date : 2025-06-23 Size : 2kb User : zhangliang

Downloaded:0
Ascii code reference
Date : 2025-06-23 Size : 4kb User : 朱润

Downloaded:0
Will the use of matching, this paper, a ring of identity-based signcryption program, given a specific algorithm. The program will enable the sender information in a completely anonymous way to send messages, and at the s
Date : 2025-06-23 Size : 96kb User : 张莹

Downloaded:0
: Signcryption is a logical step to be completed at the same time the digital signature and encryption functions of the two, than the traditional
Date : 2025-06-23 Size : 306kb User : 张莹

Downloaded:0
In view of the security flaws in the non-repudiation of l-l-c-z threshold agents, an improved threshold agent is proposed For the password analysis of l-l-c-z threshold agent, the method of changing public key is used to
Date : 2025-06-23 Size : 349kb User : 张莹
« 1 2 ... .93 .94 .95 .96 .97 7898.99 .00 .01 .02 .03 ... 8587 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.