搜索资源列表
Digitalclock
- 数字钟:好刻录机大哥和旅客的 得利卡刚和旅客的将离开对方非公开了就噶了空间的快乐记录卡就够了看见了健康的的啊看来固定价格两科噶及的旅客;攻击力看过个 啊的非公开了骄傲的噶的了科技是-Digital clock: a good writer and passenger Delica brother and visitors will just leave the other side closed the space on the Karmapa and the joy of memory car
aiguard
- Torque引擎 怪物 AI 简单实现! 自动守卫 跟踪,攻击!-Simple Implementation of Torque engine monster AI! Automatic guard tracking, attack!
gjmk(vc)
- 攻击模块,VC++源码-Attack module, VC++ Source ,,,,,,,,,,,,
g
- 问题的提出:编写一个长途电话计费程序,计费规则是每6秒钟0.06元,要求能输入发话地、收话地,输出话费。其不能相互攻击,即任意两个皇后不能处于 棋盘的同一行、同一列和同一条对角线上。-Of the problem: write a long-distance telephone billing procedures, billing rules is 0.06 yuan per six seconds, required to enter the speaker, the closing w
1
- 函式庫: Windows API SDK Open GL 1.2 DirectX 9.0 說明: 實作紅白機時代紅及一時的坦克大戰遊戲, 玩家可自由操作坦克攻擊磚塊 或是敵方坦克, 遊戲中隨時間也會自動出現如炸蛋超人一樣的補血, 增加 火力, 病毒, 敵人全滅, 時間暫停等物品, 右方為坦克血量與敵方坦克剩下 的數量.-Library: Windows API SDK Open GL 1.2 DirectX 9
QQzhadan
- qq炸弹,进行简单的qq攻击,非常有意思-qq bomb attack qq simple, very interesting
watermark
- 包含完整的数字水印嵌入,提取,以及攻击算法。-Contains a complete digital watermark embedding, extraction, and attack algorithms.
qq-send-picture
- QQ 发送图片给好友 可设定发送次数--不要攻击别人阿-QQ send pictures to friends can be set to send the number- do not attack others A
AudioWatermarking
- A local extremum of audio watermarking algorithm, matlab software watermark embedding and extraction operation, also gives some common attack method of audio watermarking attacks.
SupperMarketManageSystemDatabase
- 小型超市进销存数据库设计。大量使用存储过程,所以有效得防注入式攻击。但对海量数据的处理和数据库的迁移存储过程就成了弱点-Invoicing database design small supermarket. Extensive use of stored procedures, so effective have anti-injection attack. But for massive data processing and database stored procedure migrat
queue
- 皇后问题 在n×n格的国际象棋上摆放n个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。-N × n queen problem in grid placing n chess queens on, so that it can not attack each other, that any two Queens can not in the same row, same column or on the same diagonal, asked
StackOverRun
- 溢出攻击,通过断点和对内存的查看可看到溢出攻击到底是如何进行攻击的,课通过VS08的管理器查看内存-Overflow attacks, through the breakpoints and memory overflow attacks can be seen in the end view of how to attack
AR
- 这是数字信号处理课程中的AR模型的功率平铺攻击MATLAB编程-This is a digital signal processing courses in the AR model of power tile attack MATLAB Programming
zhishengjidonghua
- 主要实现了基于Opengl,实现了导弹攻击直升机的三维动画,可以从多种视角观察导弹攻击直升机的过程-Mainly implemented based on Opengl, realized three-dimensional animation missile attack helicopters can be observed from multiple perspectives the course of the helicopter missile attack
nqueen
- 在n*n格的棋盘上放置彼此不受攻击的N各皇后,皇后可以攻击与其处在同一行或同一列或同一斜线上的棋子。-Lattice in the n* n chessboard placed on each other from attacks, N the Queen, the Queen can attack with in the same row or column or diagonal on the same piece.
queen
- 八皇后问题是一个古老而著名的问题,是回溯算法的典型例题。该问题是十九世纪著名的数学家高斯1850年提出: 在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上. -Eight queens problem is an old and well-known problem is a typical example backtracking algorithm. The problem is that the famous mathemati
DNF
- 修改了技能。十字该全屏.修改攻击,可以调整攻击倍数-Revised skills. Cross the full screen. Modification attack, an attacker can adjust the multiples
Flood
- Flood attack test C++ long time
Hero
- 人物的移动,属性,碰撞,攻击,移动,对话等所有功能的设定-The movement of people, property, collision, attack, movement, dialogue, setting all the features
ARP
- ARP防攻击的,是一个批处理,网上很多,也没什么技术,很常见的-ARP attack defense, is a batch, online a lot, too little technology, it is common