利用java实现文件的AES加密功能
This Java AES Crypt package contains the Java class es.vocali.util.AESCrypt, which provides file encryption and decryption using aescrypt file format.
Requirements
The Java AES Crypt package only works in Java 6, but can be easily adapted to Java 5 by replacing the cal ...
This file contains board-specific information for the Motorola cpv3060
target board. Specifically, this file contains information on any BSP
interface changes from previous software or hardware versions, and
contains caveats that the user must be aware of before using this BSP.
Additionally, the tar ...
This file contains board-specific information for the Motorola LoPEC in
support of the lopec BSP. Specifically, this file contains information on
any BSP interface changes from previous software or hardware versions, and
contains caveats that the user must be aware of before using this BSP.
Addition ...
Instead of finding the longest common
subsequence, let us try to determine the
length of the LCS.
􀂄 Then tracking back to find the LCS.
􀂄 Consider a1a2…am and b1b2…bn.
􀂄 Case 1: am=bn. The LCS must contain am,
we have to find the LCS of a1a2…am-1 and
b1b2…bn-1.
􀂄 ...
The CSS Cookbook cuts straight through the theory to provide hundreds of useful examples and CSS code recipes you can use immediately to format your web pages. Reflecting CSS2 and including topics that range from basic web typography and page layout to techniques for formatting lists, forms, and tab ...
.NET Remoting is very important in distributed environments. This book essentially deals with the core concepts of .NET remoting along with some working examples. A must read.
Shortest Paths with Multiplicative Cost. In a given undirected graph, the path cost is measured as a product of all the edges in the path. The weights are rational numbers (e.g., 0.25, 0.75, 3.75 etc) or integers (2, 3). There are no negative edges. Given such a graph as input, you are to output the ...
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...
The Fat Fs module is a middleware that written in ANSI C. There is no platform dependence, so long as the compiler is in compliance with ANSI C. However it handles the system portable FAT structures. You must take the endian into consideration. It must be changed for your platform first or the compi ...
This file is distributed in the hope that it will be useful, but WITHOUT
WARRANTY OF ANY KIND.
Author(s): Ole Saether
DESCRIPTION:
This example should be used together with ex2a-tx433.asm. One nRF9E5
evaluation board (receiver) should be programmed with the hex-file generated
...