您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Springer - Genetic Programming Theory And Practice 2.pdf

  2. This volume explores the emerging interaction between theory and practice in the cutting-edge, machine learning method of Genetic Programming (GP). The contributions developed from a second workshop at the University of Michigan's Center for the Stu
  3. 所属分类:Java

    • 发布日期:2009-07-12
    • 文件大小:12582912
    • 提供者:ziyuang
  1. Springer - Genetic Programming Theory and Practice 3.part1.rar

  2. Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and practice by exploring the emerging interaction between theory and practice in the cutting-edge, machi
  3. 所属分类:Java

    • 发布日期:2009-07-12
    • 文件大小:10485760
    • 提供者:ziyuang
  1. Springer - Genetic Programming Theory and Practice 3.part2.rar

  2. Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and practice by exploring the emerging interaction between theory and practice in the cutting-edge, machi
  3. 所属分类:Java

    • 发布日期:2009-07-12
    • 文件大小:10485760
    • 提供者:ziyuang
  1. Springer - Genetic Programming Theory and Practice 3.part3.rar

  2. Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and practice by exploring the emerging interaction between theory and practice in the cutting-edge, machi
  3. 所属分类:Java

    • 发布日期:2009-07-12
    • 文件大小:10485760
    • 提供者:ziyuang
  1. avi视频格式详细说明

  2. Even though the AVI le format has been around for more than 10 years, there is no docu- mentation available which does not only describe the format itself, but which also informs about issues that come from awed demuxers and awed decoders, and ho
  3. 所属分类:其它

    • 发布日期:2009-12-16
    • 文件大小:212992
    • 提供者:binyushopping
  1. Metasploit

  2. Overview: Why Is Metasploit Here? Metasploit came about primarily to provide a framework for penetration testers to develop exploits.The typical life cycle of a vulnerability and its exploitation is as follows: 1. Discovery A security researcher or
  3. 所属分类:C#

    • 发布日期:2010-01-07
    • 文件大小:4194304
    • 提供者:xiqobai
  1. ssd3 项目代码 蓝天航空预定系统 Blue Skies Airline Reservation

  2. Blue Skies Airline Reservation System Background Blue Skies Airline, a new airline, offers services between any two of the following U.S. cities: Denver; Washington, D.C.; Los Angeles; New York City; Atlanta; and Cleveland. When a customer calls Blu
  3. 所属分类:硬件开发

    • 发布日期:2010-01-22
    • 文件大小:89088
    • 提供者:jwdlh918
  1. Understanding the digital market

  2. This book contains work presented at a conference held by executive branch agencies in May 1999 at the Department of Commerce. The goals of the conference were to assess current research on the digital economy, to engage the private sector in develo
  3. 所属分类:Access

    • 发布日期:2010-05-23
    • 文件大小:617472
    • 提供者:dzsw620
  1. Sosoo 1.0网络爬虫程序.doc

  2. Sosoo 1.0网络爬虫程序 ---用户开发手册 编写人:王建华(rimen/jerry) 编写目的:基于sosoo定制web spider程序的编程人员。 目录 一:安装sosoo 2 二:功能定制 2 1.基本功能参数的设置。 2 2.配置机器人对url的检查 3 3:实现文件管理。 4 4.定制html文档下载规则。 4 5.设置对下载后http文档的过滤处理 5 6.启用机器人运行期监控。 5 7.启用对http协议分析的监控。 5 三:sosoo描述 6 四:应用开发指南 6 1.
  3. 所属分类:Web开发

    • 发布日期:2010-12-18
    • 文件大小:39936
    • 提供者:mfr625
  1. ShellBrowser v3.2 for Delphi BCB

  2. The ShellBrowser component set gives a Delphi programmer easy access to the Win32 shell functionality. The TJamShellList, TJamShellTree and TJamShellCombo components look and behave exactly like the corresponding parts of the Explorer. The invisible
  3. 所属分类:Delphi

    • 发布日期:2006-02-23
    • 文件大小:3145728
    • 提供者:chenxh
  1. ShellBrowser Full Sources For Delphi BCB

  2. The ShellBrowser component set gives a Delphiprogrammer easy access to the Win32 shellfunctionality. The TJamShellList,TJamShellTree and TJamShellCombo componentslook and behave exactly like the correspondingparts of the Explorer. The invisibleTShel
  3. 所属分类:Delphi

    • 发布日期:2006-02-23
    • 文件大小:3145728
    • 提供者:chenxh
  1. ShellBrowser.v2.5.For.Delphi4567.BCB456

  2. The ShellBrowser component set gives a Delphi programmer easy access to theWin32 shell functionality. The TJamShellList, TJamShellTree and TJamShellCombocomponents look and behave exactly like the corresponding parts of theExplorer. The invisible TS
  3. 所属分类:Delphi

    • 发布日期:2006-02-23
    • 文件大小:3145728
    • 提供者:chenxh
  1. 2011年国际数模C题informas奖论文

  2. 2011年国际数模C题informas奖论文
  3. 所属分类:C/C++

    • 发布日期:2011-12-17
    • 文件大小:1048576
    • 提供者:fanchangjun
  1. The Web Designer’s Roadmap

  2. This book comprises the following seven chapters. Chapter 1: Beauty, Creativity, and Inspiration By way of an introduction, I’ll explain the book’s broader concepts and establish the general terminology we’ll be using. The book’s ongoing project, Sp
  3. 所属分类:Web服务器

    • 发布日期:2012-10-15
    • 文件大小:15728640
    • 提供者:monmouthbird
  1. Shellbrowser Component Suite v7.3

  2. The TJamShellList, TJamShellTree and TJamShellCombo components look and behave exactly like the corresponding parts of the Explorer. The non-visible TShellBrowser component provides an easy interface to the Windows Shell API. All components support
  3. 所属分类:Delphi

    • 发布日期:2012-10-29
    • 文件大小:1048576
    • 提供者:chenchengjung
  1. Jam.ShellBrowser.8.1.2.2013-03-06

  2. The ShellBrowser component set gives a Delphi programmer easy access to the Windows Shell functionality. The TJamShellList, TJamShellTree and TJamShellCombo components look and behave exactly like the corresponding parts of the Explorer. The non-vis
  3. 所属分类:Delphi

    • 发布日期:2013-05-13
    • 文件大小:2097152
    • 提供者:jingcuo
  1. CCNA专业术语表

  2. access layer The layer that feeds traffic into the network and performs network entry control. End users access the network via the access layer. access VPN A VPN that provides remote access to a corporate intranet or extranet over a shared infrastr
  3. 所属分类:网络基础

    • 发布日期:2013-07-06
    • 文件大小:1029120
    • 提供者:ronalhua
  1. september music

  2. ical Management Science, 2nd edition, Thomson Learning, 2001. Hillier, F.S., and Hillier, M.S., Introduction to Management Science: A Modeling and Case Studies Approach with Spreadsheets, 2nd edition, McGraw-Hill, 2003. Readings for Interest: Daily
  3. 所属分类:其它

    • 发布日期:2013-09-02
    • 文件大小:750592
    • 提供者:u011928726
  1. RFC3036-LDP Specification

  2. The architecture for Multi Protocol Label Switching (MPLS) is described in RFC 3031. A fundamental concept in MPLS is that two Label Switching Routers (LSRs) must agree on the meaning of the labels used to forward traffic between and through them. T
  3. 所属分类:其它

    • 发布日期:2008-10-07
    • 文件大小:274432
    • 提供者:xue_ligang
  1. Y Bengio在CORS/INFORMS’2015上的深度学习教程

  2. Y Bengio在CORS/INFORMS’2015上的深度学习教程。
  3. 所属分类:讲义

    • 发布日期:2015-07-01
    • 文件大小:54525952
    • 提供者:happytofly
« 12 3 »