You imagine? Right, there s more than one possibility, this time I ll give you tree. One for your private data, one for the common data in order to receive data from other applications like Excel, WinWord etc. and at last, I ll give you a handy-dandy class you can derive ANY MFC object from, to make ...
IDEA v2.2
IDEA encryption for dos.
IDEA stands for International Data Encryption Algorithm
it was invented by Xuejia Lai and James Massey in Switzerland
its a private key block algorithm, and is thought to be
very secure.
class Time
{
public:
Time(int =0,int =0,int =0)
void setTime(int,int,int)
void printMilitary()
void printStandard()
private:
int hour
int minute
int second
}
The Wifidog project is an open source captive portal solution. It was designed primarily for wireless community groups, but caters to various other business models as well. If you have questions about the wifidog project, they may be answered in the FAQ. You may also be interested in seeing some of ...
Siproxd is a proxy/masquerading daemon for the SIP protocol.
It handles registrations of SIP clients on a private IP network
and performs rewriting of the SIP message bodies to make SIP
connections work via an masquerading firewall (NAT).
It allows SIP software clients (like kphone, linphone) or SIP ...
JaNet: Java Neural Network Toolkit
resume: A well documented toolkit for designing and training, and a java library for inclusion in third party programs.
description: jaNet package is a java neural network toolkit, which you can use to design, test, train and optimize an ideal Neural Network for ...
java的一个源代码,、
public class ThunderBoltAct extends Canvas implements Runnable {
private int TIMEOUT = 0
private final static int NUMERIC = 10000 //总分
private final static int INERRGAL = 60 //频率
private final static int MAXBATTLE = 3 //最大飞机数
private final static int MAXBALLNUM = ...
After an introduction to the history of mobile communications, this guide considers the basics of mobile radio, the design of cellular and private radio systems, and issues of interworking with the fixed network. It then looks at the role of the mobile radio operator, the design and operation of mob ...