资源列表
大众软件2005年13期
- 《大众软件》作为行业内的主流媒体,在报道产业发展、透析产业变化、研究产业方向等方面作出了巨大的贡献,《大众软件》电子版的推出,不仅迎合了读者的变化,也顺应了产业、时代的发展。-"public software" industry as the mainstream media, in reports on industrial development, dialysis industry changes, the direction of research to make a
微软研发致胜策略
- 微软研发致胜策略,软件设计,项目管理的经典著作。-Microsoft developed a winning strategy, software design, project management classics.
Tse6034n
- 132*65液晶显示驱动源代码!用51汇编编写,有内有详细的硬件连接方法-132 * 65 LCD driver source code! With 51 compilation prepared, within a detailed hardware connectivity! !
BIGadd
- 实现长度80位内的大数加法~~代码以c来实现,在tc下编译通过,有详细的注释-achieved within 80 lengths of large numbers Adder ~ ~ c code to be achieved under the tc compile a detailed Notes
BIGSUB
- 程序实现80位长度的减法运算,,以tc实现。原理是使用数组来进行运算-program 80 subtraction length of the operation, to achieve tc. The principle is to use the array operator
Game_AI
- 电脑游戏中的人工智能制作的文章收集。 搞游戏设计和编程的人都可以参考一下-computer game produced by the artificial intelligence collection article. Engage in game design and programming people can take a look
2个数之和
- 用于计算2个数之和 还有现试HELOO的代码-used to calculate the sum of two numbers is also test the code HEL
2005_UMLChina_Kao
- (Architecture 是一个系统的基本组织,它蕴含于系统的组件中、组件之间的相互关系中、 组件与环境的相互关系中、以及呈现于其设计和演进的原则中。)-(Architecture is a basic system, it contains the components in the system, the components of the interrelationship between, components and the environment of mutual relat
200552142445687
- 一个很好的学生成绩管理系统,和数据库项链的,读者们反映很好-a good student performance management system, and database necklace, reflecting good readers
ctsb
- 介绍了vhdl设计fpga时仿真和综合的过程,包括软件的应用和一些注意事项,相信会对大家有所帮助-introduced a VHDL design and simulation when they simply integrated process, including software applications and some attention to matters, we believe it will help
看门狗设计
- 一个汇编的看门狗设计,内容比较详细的介绍了看门狗软件的编写注意。并且有详细的例程。-a compilation of the watchdog design, content rather detailed account of a software watchdog prepared attention. And a detailed routines.
330911894
- C语言DES算法,简单实现文件的加密与解密功能-C language DES algorithm, a simple realization document encryption and decryption functions