Welcome![Sign In][Sign Up]
Location:
Search - strategy

Search list

[Communication-MobileMMS01_4

Description: 微软亚洲研究院论文:无线Internet中媒体代理的放置策略-Microsoft Asia Research Institute Papers : Wireless Internet media strategy for the placement agent
Platform: | Size: 90338 | Author: 李刚 | Hits:

[Windows Developstrategy_cs

Description: 策略模式vc源码实例。-example vc code of strategy
Platform: | Size: 2196 | Author: 陈其 | Hits:

[WinSock-NDIS局域网扫描空密码主机和ftp共享资源

Description: 本安全评估系统通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。-assessment of the security system of network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Platform: | Size: 165763 | Author: 石林 | Hits:

[GUI Developv323_mychat

Description: 《布县系统性能介绍》《密码攻防策略》《Interent入门教程》《跟我学刻录》《硬件基本知识》名著《水浒后传》名著《七剑十三侠》等-"cloth County on system performance", "Password offensive and defensive strategy," "Directory of Internet portal," "follow me burners," "hardware basic knowledge" masterpiece "Water Margin - after" masterpiece "Seven Swords 13-xia"
Platform: | Size: 214804 | Author: 吕鹏 | Hits:

[Otheraspvarhelp

Description:   很多ASP代码编写着都会遇到,当提交表单或URL中的信息太多,写Request.Form等语句会很麻烦。有时甚至要写几十个之多。如果可以直接输入变量就自动的写出Rs(),Request.Form(),Request.Querystring()等语句。将大大减轻编写着的负担!   还有时候可能需要这些格式语句中的变量,一个个的选中再复制也同样非常烦人。如果可以自动把这些Rs(),Request.Form(),Request.Querystring()等格式语句中的变量提取出来,那是多么领ASP代码编写着兴奋啊! ASP变量助手 可以满足这些要求,支持 【变量】->『格式』 和 『格式』->【变量】双向转换。不但预设了常用的5种转换格式,还支持自定义转换格式!绿色免费软件,不写注册表,不用安装!-many ASP code will be prepared to encounter when submitting a form or a URL that too much information, write Request.Form such phrases will be very troublesome. Sometimes even write as many as several dozen. If direct input variables can automatically write the Rs (), Request.Form (), Request.Querystring () statement. Be prepared to significantly reduce the burden! There may be times when they need to form statements variables, a further 000 copies of selected also very annoying. If these can be automatically Rs (), Request.Form (), Request.Querystring () formats statements extracted variables, it is how prepared from ASP code with excitement ah! ASP variable aides meet these requirements, support variables -- [-gt; Format] and format Strategy-gt; Variables -- two-way conversion. Not only
Platform: | Size: 18135 | Author: zmop | Hits:

[Game ProgramVB游戏

Description: vb游戏编程文档(html),包括如何实现键盘控制对象的“即放即停”,射击游戏的实现,即时战略游戏-vb files (html), including how to achieve the targets keyboard control, "that is, take that job", the realization of shooting games, real-time strategy game
Platform: | Size: 17468 | Author: 许文广 | Hits:

[Other resource图搜索策略

Description: 一个使用Java实现的人工智能的图搜索策略程序——酒九宫图问题 人工智能-图搜索策略-演示程序-使用说明 程序简介 在人工智能领域,对隐式图的搜索是求解问题的一种基本方法,本程序通过使用多种图搜索策略,对 重排九宫问题进行求解,演示了“广度优先搜索”、“深度优先搜索”、“有界深度优先搜索”、 “最好优先搜索”和“局部择优搜索”五种基本的图图搜索策略。 整个程序使用了动画技术,界面设计美观友好,使用方便。-use a Java artificial intelligence plans Search Strategy -- Liquor JiuGongTu problems of artificial intelligence-map search strategy - Demonstration Program-use guide in the field of artificial intelligence, the implicit search of the plan to solve the problem is one of the basic methods, the procedures through the use of multiple map search strategy, the rearrangement JiuGongTu problem solving, presentation of the "breadth - first search," "depth-first search", "bounded depth-first search", "best-first search" and "partial selection of the best search" five basic map search strategy. The whole process of using animation, interface design aesthetic friendly, easy to use.
Platform: | Size: 29635 | Author: 陈凯 | Hits:

[Other resourcejava安全源码

Description: 介绍一些非常流行的java安全设计模式和安全策略,并且含有源代码,对java开发者来说,是有非常好的借鉴作用-introduced some very popular java security design patterns and security strategy and contains the source code for Java developers, there is very good reference
Platform: | Size: 62549 | Author: 谢平 | Hits:

[Develop Tools最新引进美国计算机系列图书 用DirectX6_0开发_1

Description: 最新引进美国计算机系列图书<用DirectX6_0开发及时战略游戏> 网上很推崇的书,我分三部分上船,这是第一部分-to introduce the latest computer book series lt; DirectX6_0 timely with the development of the strategy game gt; The Internet is very respected book, I boarded the vessel in three parts, this is the first part! !
Platform: | Size: 904799 | Author: 林强 | Hits:

[TCP/IP stack流量控制

Description: 这是本人跟通寝室同学做的毕业设计课题,该课题主要任务是在分析Linux内核的基础上,熟悉和掌握Linux流量控制的机理。并进一步实现可针对IP地址进行流量控制的应用软件。该软件采用C/S结构。客户端负责用户管理,流量控制策略管理和人机交互部分。服务器端负责带宽分配,流量控制的具体实现。在课题的具体分工上,本子课题负责客户端的实现。-this is my bedroom with Qualcomm graduate students to do design issues, the main topic was the analysis of the Linux kernel, on the basis of familiar and master Linux flow control mechanism. And further to target IP address flow control applications. The software using C / S structure. The client is responsible for user management, traffic management and control strategy HCI part. Server for bandwidth allocation and flow control of the specific realization. Specific topics in the division, the book topics for the client to achieve.
Platform: | Size: 361054 | Author: 王作 | Hits:

[Other resourcetanxin

Description: 这是一个贪心算法的c程序。贪心算法(也叫贪婪算法)不是某种特定的算法,而是一类抽象的算法,或者说只是一种思想,它的具体表现在,对解空间进行搜索时,不是机械地搜索,而是对局部进行择优选取,贪心算法的目的不是为了找到全部解,也当然找不出最优解,而只是找出一种可行解,这样就会得到惊人的高效性。因此,贪心算法也叫启发式搜索,这种启发就是所谓的“贪心策略”。-This is a greedy algorithm c procedures. Greedy algorithm (also known as the greedy algorithm) is not a specific algorithm, but a kind of abstract algorithm, or just a thought, it is specifically manifested in the solution space search, the search is not mechanical, but the partial merit selection, greedy algorithm not for the purpose of to find all the solutions are, of course, unable to find the optimal solution, but only to find out a feasible solution, and this can be alarming efficiency. Therefore, the greedy algorithm is called heuristic search, which inspired the so-called "greedy strategy."
Platform: | Size: 1170 | Author: 王卫红 | Hits:

[Mathimatics-Numerical algorithms孟庆洋 分治

Description: 是著名的骑士巡游问题的改进,采用了分治策略,同样也是我的个人作品,向往大家给予批评指正-Cleveland is the famous parade of improvement, adopted a divide and conquer strategy, but it's also my personal work, and yearning for everyone criticized correction
Platform: | Size: 5697 | Author: 孟庆洋 | Hits:

[Crack HackQQ2004sp1_decrypt

Description: 完全解析QQ2004 sp1的本地加密策略,解密QQ本地存储文件的密码 -completely analytic AIM sp1 local strategy encryption, decryption QQ local storage document passwords
Platform: | Size: 2286 | Author: zz | Hits:

[xml-soap-webservicexacmldemo

Description: 这是一个xacml的实现demo,可以实现简单的访问控制策略,使用者可以在其基础上进行扩展-xacml This is the realization of a demo, can achieve a simple access control strategy, the user can on the basis of its expansion
Platform: | Size: 502156 | Author: 高岩宇 | Hits:

[Other resourceEJB 2.0企业级应用程序开发

Description: 本书是介绍构建EJB类和接口机制,EJB设计和性能的策略,构建Web层等- This book is the introduction constructs EJB kind and the connection mechanism, the EJB design and the performance strategy, constructs the Web level and so on
Platform: | Size: 1966895 | Author: wangjj77 | Hits:

[Software EngineeringH[1].264AVC video for wireless transmission

Description: 关于H.264在无线网络上应用的文章,主要介绍了网络承接H.264业务的架构与策略- About H.264 in the wireless network the application article, mainly introduced the network continues the H.264 service the overhead construction and the strategy
Platform: | Size: 140763 | Author: 王宁 | Hits:

[WinSock-NDIS网络评估系统

Description: 该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技 术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测, 去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同 时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安 全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project through the network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Platform: | Size: 1170077 | Author: 大大 | Hits:

[Other resource关于营销战略的思考(ppt)

Description: 关于营销战略的思考 关于营销战略的思考 -on marketing strategy on the marketing of strategic thoughts on the marketing strategies of marketing for strategic thoughts on the marketing strategy of the marketing strategy of thinking
Platform: | Size: 50304 | Author: 王昂 | Hits:

[Other resource大型设计中FPGA的多时钟设计策略

Description: 大型设计中FPGA的多时钟设计策略,很详细的描述了在FPGA设计中时钟设计的方法-FPGA design large multi-clock design strategy, a very detailed description of the FPGA design clock design method
Platform: | Size: 101967 | Author: han | Hits:

[Other resource网络与信息安全2

Description: 北京大学信息安全学科讲义,该讲义详细的介绍了目前世界上信息安全方面的问题,以及一些加密算法和安全策略,这是其中的第二部分-Beijing University information security disciplines lectures, the lectures detailed account of the world's information security problems, and some encryption algorithms and security strategy, which is the second part
Platform: | Size: 969837 | Author: 于跃 | Hits:
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 50 »

CodeBus www.codebus.net