资源列表
bcbxml
- bcb中通过递归方式将xml导入到树形列表(Treeview)中-bcb way through recursive xml tree into a list (Treeview) Medium
DFA_2
- NFA转换为DFA,包括确定化和最小化。-NFA into DFA, including the identification of and minimized.
cdf_2007-07-13
- This is tracking source code based on "MCMC Particle Filter for Real-Time Visual Tracking of Vehicles".
Matlab
- FIR滤波器设计中的凯撒窗函数设计,最后有对应系数产生-FIR filter design in the design of the Kaiser window function, and finally there are the corresponding coefficients have
getipaddress
- 从www.apnic.net获取ip地址段 并通过程序自动整理成ros用的路由脚本-Www.apnic.net get ip address from the segment and through automatically organized into ros used in the routing scr ipt
myauto
- vc6+vs2005环境,股票自动交易软件。目前支持通达信版本交易,凡交易平台使用通达信的券商都可使用。实现为使用窗口句柄抓取交易界面窗口完成。使用时需要先打开交易软件,否则无法找到。-vc6+vs2005 environment, stock automated trading software. Currently supports accessible letter version of the transaction, where the trading platform accessi
winpooch
- Winpooch是一款病毒木马安全监控软件。属于HIPS类型安全软件。它可以根据用户制定的规则对系统进行监控,控制文件的读,写及执行,监控注册表项,键的添加及键值的修改,监视网络连接等等;和其它同类软件比较:winpooch的设置比system safety moniter(SSM)要简单,而且更具有人性化,比Winpatrol的反应速度要快,更适合实时监控,而且winpooch还具有同类软件所欠缺的网络连接控制功能.-Winpooch is a Trojan horse virus secur
2007318225990
- PB编写的程序一般界面都不好看,下面这例便是专门解决界面的问题而做的。 这是一个仿Vista窗口的皮肤 非常漂亮 请使用 PB 9.0以上的版本打开 细节请查看里面的说明 -PB programs written in general are not good-looking interface, following the case of the interface is dedicated to solve problems to do. This is an imita
tcp-client
- Simple TCP Client code for use in windows. I think that this code is readable and helpful. I fully intend others to take advantage of it and to find it useful.
ACPI
- 读取ACPI table,bios开发学习必须写的小程序!!功能类似RU-Read ACPI table, bios develop small programs to learn to write! ! Function similar to the RU
levinson-Durbin
- 数字信号处理Leviinson-Durbin方程求解非常重要,本文给出了Leviinson-Durbin方程的求解,希望能与大家共享-Digital signal processing Leviinson-Durbin equation is very important, this article gives Leviinson-Durbin equations, hoping to share with you
data
- 三维激光点云数据,对构网时需要大量数据的人应该会很有用-Three-dimensional laser point cloud data, network configuration requires large amounts of data should be useful for people who