您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Consistent Labeling of Tracked Objects in Multiple Cameras with Overlapping Fields of View

  2. In this paper, we address the issue of tracking moving objects in an environment covered by multiple uncalibrated cameras with overlapping fields of view, typical of most surveillance setups. In such a scenario, it is essential to establish correspo
  3. 所属分类:其它

    • 发布日期:2009-05-07
    • 文件大小:578560
    • 提供者:juneryoung
  1. Hamming Codes MATLAB仿真程序

  2. HOW TO RUN : 1. Open MATLAB. 2. Open main.m. 3. Change the MATLAB working directory to the directory where main.m is. 4. Run main.m The first sound that plays is the original recording. The second one is the recording after corruption. The last play
  3. 所属分类:其它

    • 发布日期:2010-05-17
    • 文件大小:33792
    • 提供者:kaveykw
  1. DS26503 datasheet

  2. DS26503 datasheet The DS26503 is a building-integrated timing- supply (BITS) clock-recovery element. It also functions as a basic T1/E1 transceiver. The receiver portion can recover a clock from T1, E1, and 6312kHz synchronization timing interfaces.
  3. 所属分类:专业指导

    • 发布日期:2010-08-06
    • 文件大小:5242880
    • 提供者:xionganyue
  1. Acronis True Image Home 2010 v13.5055

  2. Acronis True Image Home 2011 assures that all your important data, including photos, videos, music, documents and applications, are fully protected and can be recovered quickly in the event of any disaster. Use our intuitive graphical user interface
  3. 所属分类:专业指导

    • 发布日期:2010-11-20
    • 文件大小:101
    • 提供者:Russellyeo
  1. 硬盘恢复工具 recorver my file

  2. 恢复磁盘数据,绿色,无需安装,注册 Professional data recovery software for: Deleted Files; Lost Files; Formatted Disks; RAW Disks; Missing Drive Letters; Windows Reinstalls. Safe, secure and reliable. Designed specifically to allow home and business users to quickly
  3. 所属分类:其它

    • 发布日期:2011-01-26
    • 文件大小:8388608
    • 提供者:redtoys
  1. Recover 4 all Pro V2.26

  2. mmediately after deletion the data of deleted files is still invisibly on the disk. This fact makes it possible to recover deleted files. But in the course of disk usage by users, programs or the operating system, deleted files will be overwritten w
  3. 所属分类:其它

    • 发布日期:2008-03-24
    • 文件大小:384000
    • 提供者:yyfyydqsc
  1. Cooperative Fusion of Stereo and Motion

  2. Cooperative Fusion of Stereo and Motion This paper presents a new matching algorithm based on cooperative fusion of stereo and motion cues. In this algorithm, stereo disparity and image flow values are recovered from two successive pairs of stereo i
  3. 所属分类:Access

    • 发布日期:2011-03-09
    • 文件大小:291840
    • 提供者:zhangjunhit
  1. 最强数据恢复.O&O.DiskRecovery.v6.0.6298+注册码

  2. O&O DiskRecovery是一款独具特色的存贮设备数据恢复软件,能直接恢复硬盘、存储卡、数码相机中的文件,只要没有被重复填写数据,即时已经进行了格式化,O&O DiskRecovery也能救你于水火。能辨别修复包括Word 文档、Excel表格、Access数据库和各种常用图形、图像、电影、音乐(JPEG, AVI, MPEG,MP3, WAV, BMP, TIFF, Corel Draw, Photoshop, Framemaker,Adobe Illustrator, and man
  3. 所属分类:其它

    • 发布日期:2011-04-07
    • 文件大小:17825792
    • 提供者:liu2555670
  1. Stellar.Phoenix.SQL.Database.Recovery.v.2.0

  2. Stellar Phoenix SQL Database Recovery 2.0 | 6 Mb An MS SQL database recovery software that repairs corrupt SQL databases created in MS SQL Server 7.0, 2000, 2005, and 2008. Repairs and restores MS SQL Server MDF files Restores various database objec
  3. 所属分类:SQLServer

    • 发布日期:2011-10-05
    • 文件大小:5242880
    • 提供者:leewintomorrow
  1. File Delete Absolutely Brief introductionn

  2. Edison Chen's Sex photo scandal may be avoided if File Delete Absolute was used. Nowadays, people are afraid of the leaking of their secrets result from deleted file recovery more and more because they depend on computers more and more. Today, Netwo
  3. 所属分类:其它

    • 发布日期:2012-04-18
    • 文件大小:191488
    • 提供者:magenfeng
  1. File Delete Absolutely Brief introduction

  2. Nowadays, people are afraid of the leaking of their secrets result from deleted file recovery more and more because they depend on computers more and more. Today, Network and Internet bring more convenient to us in life and in work. But on the other
  3. 所属分类:其它

    • 发布日期:2012-04-19
    • 文件大小:191488
    • 提供者:magenfeng
  1. Recover Cart Sales

  2. 此插件可以查询客户未结账购物车状态,也就是已经放入购物车而没结账付款的客户。 安装说明: 1.工具 > 安装SQL脚本 > 复制文件夹下install.sql里面内容,粘贴进去 > 提交 2. 上传admin目录下文件到你网站管理目录下 3.完毕,后台管理有三个菜单,分别是:A:商店设置 > Recover Cart Sale.B:工具 > Recover Cart Sales.C: 分析系统 > Recovered Sales Results
  3. 所属分类:其它

    • 发布日期:2012-10-18
    • 文件大小:26624
    • 提供者:yandangshuangyu
  1. t328t的recovered

  2. t328t的recovered压缩文件,手机连接电脑安装驱动,运行recovered的解压出来 的可执行文件。
  3. 所属分类:Android

    • 发布日期:2013-01-21
    • 文件大小:4194304
    • 提供者:sexingshenghuo
  1. recovery.img

  2. recovery.img2.5.07是一款安卓的第三方刷机工具,使用前先进hroot刷入recovered,刷机时先进re,然后。。。你懂得,,,建议刷机前先备份,
  3. 所属分类:Android

    • 发布日期:2013-03-06
    • 文件大小:2097152
    • 提供者:weiyidewo12321
  1. AD630锁相放大资料

  2. a AD630 Information furnished by Analog Devices is believed to be accurate and reliable. However, no responsibility is assumed by Analog Devices for its use, nor for any infringements of patents or other rights of third parties that may result from
  3. 所属分类:硬件开发

    • 发布日期:2013-04-08
    • 文件大小:318464
    • 提供者:u010205090
  1. ost转换的工具

  2. 2012年6月28日 – 使用方法很简单: 先选择要恢复的OST文件:Select OST file to be recovered 选择恢复后的文件输出路径:Output recovered file as 点击start recover
  3. 所属分类:网管软件

    • 发布日期:2013-04-11
    • 文件大小:2097152
    • 提供者:u010254223
  1. n880e第三方recovered

  2. 第三方recovered
  3. 所属分类:其它

    • 发布日期:2013-06-19
    • 文件大小:5242880
    • 提供者:u011134931
  1. InstallShield PackageForTheWeb Password Cracker

  2. InstallShield PackageForTheWeb Password Cracker (C)thewd@hotmail.com ------------------------------------------------------------------------------ Usage: ISpftw [/longPassword] [/ignoreLength] [/dumpHeaders] target installation that has been dist
  3. 所属分类:系统安全

    • 发布日期:2013-08-26
    • 文件大小:41984
    • 提供者:tianshanet
  1. xmempool 内存池

  2. C语言版简单内存池的实现。 X Memo Pool A memory pool implemented by C. Usage Create Pool At first you should create a pool handler for your data (or structure). xmem_pool_handler xmem_create_pool(unsigned int block_size); xmem_pool_hander is only a pointer which
  3. 所属分类:C++

    • 发布日期:2014-12-15
    • 文件大小:14336
    • 提供者:xadillax
  1. reaver-1.4源码

  2. Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured. 穷举pin,可以才linux下编译,命令行控制。
  3. 所属分类:网络设备

    • 发布日期:2015-04-28
    • 文件大小:929792
    • 提供者:antiapple
« 12 3 4 »