共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
C++指针应用的四大误区 总被引:1,自引:0,他引:1
马宇哲 《电脑编程技巧与维护》2010,(8):134-135
C++语言中,指针应用的误区可以分为操作空指针、内存泄露、重复释放、误用常量指针和常量指针四个方面。本文给出了可能的错误场景,并给出解决方法。 相似文献
4.
《办公自动化》2008,(8):7
IDC总部,2008年6月25日-2008年全球互联网广告开支总额将达652亿美元,占所有媒体广告开支的近10%.根据IDC的互联网与新媒体市场模型和预测,预计在整个预测期内将有15-20%的年增长率,到2011年这一份额将达13.6%,与此同时,全球互联网广告支出将增长至1,066亿美元.与更加成熟的广告类型相比,互联网广告正以惊人的速度增长,"IDC的首席研究官John Gantz说,"不过,互联网广告仍属较新的广告形式,a且正从一个较小的基数增长.截止到预测期,互联网广告将以300多亿美元的开支紧跟直邮一第三大广告形式,而分别花费在电视和平面广告上的支出几乎是在线广告的两倍.…… 相似文献
5.
6.
7.
8.
9.
10.
11.
12.
《Network Security》2003,2003(8):1-2
Recent research on static passwords published in Elsevier's Computer Fraud & Security title shows there are 17 different techniques to compromise passwords.This is a short news story only. Visit www.compseconline.com for the latest computer security industry news. 相似文献
13.
How can you tell if an IT security product (or a product that includes security components) can secure your application? How can you be certain that a product will fully deliver on its claims that it will protect against malice in a deployed environment? Unfortunately, few vendors - and even fewer customers - can make these judgments. The article won't make you a security wizard, but it will give you a feel for what to look for in, and when to be concerned about, a vendor's claims. To ensure that a product has a chance of being secure; customers should check that vendors use adequate approaches in four primary areas. In order of importance (and maturity and availability), they are: quality-control (QC) mechanisms; cryptographic primitives; hardware assist mechanisms; and separation mechanisms. 相似文献
14.
SQL Server6.5的九种性能优化方法 总被引:2,自引:0,他引:2
使用性能优化技术,可以使数据库性能成倍甚至成百倍的提高。SQLServer中性能优化的方法有许多,总结长期的实践并结合部分参考资料,提出了九种性能优化的方法。 相似文献
15.
New Ways to Build Rich Internet Applications 总被引:2,自引:0,他引:2
《Computer》2008,41(8):10-12
Ajax has become a popular open approach for developing rich Internet applications. Now, some vendors are releasing their own Ajax-based development platforms, while others have released proprietary platforms not based on Ajax. 相似文献
16.
提出了五种产生脉冲的方法.分析讨论了各种方法的时效性及出现时间误差的原因.并介绍了用LabVIEW编程语言、DOS编程语言编写脉冲产生程序和通过定时器硬件中断产生脉冲信号等方法的应用场合. 相似文献
17.
周小刊 《数字社区&智能家居》2009,(18)
代理服务器是提供internet服务的常见方式,与此同时局域网用户也受到了一些限制。突破代理服务器上网的局限,利用代理服务器实现更多的功能凸显其必要性。在进行了代理上网的研究并进行软件测试以后,向大家推荐SocksCap32和SOCKS2HTTP两款代理上网软件。 相似文献
18.
Ways to sparse representation: An overview 总被引:1,自引:0,他引:1
Many algorithms have been proposed to find sparse representations over redundant dictionaries or transforms. This paper gives
an overview of these algorithms by classifying them into three categories: greedy pursuit algorithms, l
p
norm regularization based algorithms, and iterative shrinkage algorithms. We summarize their pros and cons as well as their
connections. Based on recent evidence, we conclude that the algorithms of the three categories share the same root: l
p
norm regularized inverse problem. Finally, several topics that deserve further investigation are also discussed.
Supported by the Joint Research Fund for Overseas Chinese Young Scholars of the National Natural Science Foundation of China
(Grant No. 60528004) and the Key Project of the National Natural Science Foundation of China (Grant No. 60528004) 相似文献
19.
20.
随着木马的猖獗,网站挂马现象日益严重。该文从实例出发,分别从服务器安全、网站文件夹安全、数据库安全和程序安全四个方面讲解了加强网站安全的基本步骤。 相似文献