*博客头图：

RGB颜色，例如：#AFAFAF

Hover：

RGB颜色，例如：#AFAFAF

RGB颜色，例如：#AFAFAF

# Jans的专栏

• 博客(1)
• 资源 (19)
• 论坛 (23)
• 收藏
• 关注

#### 原创 淘宝自动客服(旺旺机器人)

Technorati 标签: 自动客服,旺旺机器人,自动回复,淘宝客服,机器人可以自动回答客户的提问,可以自动学习，手动培训和维护对话数据库。支持基于正则表达式的匹配模板，更灵活更强大。支持最新的旺旺2009。下载地址:http://files.cnblogs.com/jans2002/AliChatBot.rar

2009-09-02 16:38:00 6304

2008-05-09

2008-03-20

#### LEDA算法库

LEDA是一个商业化的算法函数库，LEDA就是Library of Efficient Data structure and Algorithm一个常用ADT的C++实现，推荐下载。简介：LEDA is a library of the data types and algorithms of combinatorial computing. The main features are: LEDA provides a sizable collection of data types and algorithms in a form which allows them to be used by non-experts. In the current version, this collection includes most of the data types and algorithms described in the text books of the area. LEDA gives a precise and readable specification for each of the data types and algorithms mentioned above. The specifications are short (typically, not more than a page), general (so as to allow several implementations), and abstract (so as to hide all details of the implementation). For many efficient data structures access by position is important. In LEDA, we use an item concept to cast positions into an abstract form. We mention that most of the specifications given in the LEDA manual use this concept, i.e., the concept is adequate for the description of many data types. LEDA contains efficient implementations for each of the data types, e.g., Fibonacci heaps for priority queues, red-black trees and dynamic perfect hashing for dictionaries, ... LEDA contains a comfortable data type graph. It offers the standard iterations such as for all nodes v of a graph G do'' or for all neighbors w of v do'', it allows to add and delete vertices and edges, it offers arrays and matrices indexed by nodes and edges,... The data type graph allows to write programs for graph problems in a form close to the typical text book presentation. LEDA is implemented by a C++ class library. It can be used with almost any C++ compiler (g++, CC, xlC, cxx, Borland, MSVC++, Watcom). LEDA is not in the public domain, but can be used freely for academic research and teaching. A commercial license is also available.

2008-05-08

2013-10-10

#### Windows SDK编程

Windows SDK编程(chm格式)全中文并附配书源代码Charles Petzold经典中的经典

2008-05-09

2016-11-28

#### APress Pro JavaScript Design Patterns.zip

JavaScript is at a turning point. The language and those who program with it have matured.<br>People are starting to realize that it is a complex subject, worthy of further study.<br>Design patterns have been used in programming for years. They were first formally documented<br>in Design Patterns by Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides<br>(affectionately known as the Gang of Four) and have been applied to countless object-oriented<br>languages. Part of the appeal of design patterns is that they can be used uniformly over many<br>different languages and syntaxes. The basic structure stays the same; only the details change.<br>It is fairly easy, for instance, to take a pattern implemented in Java and convert it to C++.<br>The same cannot be said of JavaScript. While all of the same capabilities exist, they are<br>often not official parts of the language and must be emulated through obscure tricks and<br>unintuitive techniques. Over the years, people have discovered ways of using the language to<br>accomplish tasks never imagined by its creators. We must do likewise to implement common<br>object-oriented features.<br>This book collects and documents those tricks and techniques. In the first part, we create<br>a base of object-oriented features that we can build upon to implement specific design patterns.<br>The second part deals with specific design patterns and how they can be used in the JavaScript<br>language.<br>We took great pains to make the examples in each chapter as practical as possible. We<br>tried to list some of the most common tasks performed by JavaScript programmers, and then<br>used design patterns to make them more modular, efficient, and easily maintained. When we<br>do venture into more theoretical examples, it is done to illustrate a specific point. We know<br>that at the end of the day, the value of this book will be judged by its relevance to your everyday<br>tasks and projects.

2008-03-20

#### Detours 2.1

Detours是微软开发的一个函数库,用于修改运行中的程序在内存中的影像,从而即使没有源代码也能改变程序的行为。<br>具体用途是： <br><br>拦截WIN32 API调用，将其引导到自己的子程序，从而实现WIN32 API的定制。 <br>为一个已在运行的进程创建一新线程，装入自己的代码并运行。 <br>---- 本文将简介Detours的原理，Detours库函数的用法， 并利用Detours库函数在Windows NT上编写了一个程序，该程序能使有“调试程序”的用户权限的用户成为系统管理员，可利用Detours库函数修改该程序使普通用户即可成为系统管理员

2008-03-20

#### MSDN WebCast教学视频下载工具

MSDN教学视频下载工具<br>对MSDN上所有中文教学视频分类列出，可以下载视频，PPT，还有代码，非常方便。<br>

2008-05-09

2008-05-09

2008-03-20

2008-05-09

#### Windows.Internals第6版(英文)

Windows.Internals 6th Mark Russinovich

2012-09-12

#### C# 5.0 in a Nutshell The Definitive Reference

C#.5.0.in.a.Nutshell.The.Definitive.Reference,.Joseph.Albahari,.Ben.Albahari,.5ed

2012-09-12

#### Oracle PL/SQL 最佳实践

Oracle PL/SQL 最佳实践

2008-05-09

#### C++ 编码规范:101条规则，指导和最佳实践

C++ 编码规范:101条规则，指导和最佳实践

2008-05-09

<br>The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network devices, including routers, switches, hosts, and servers Covers PIX 7.0 and the most recent version of PDMAll networks need a strong security solution to prevent against the devastation of worms, viruses, and malicious intruders, but the reality is that small and medium businesses do not have the resources to invest in adequate security training. These businesses need a security solution that is simple to learn and easy to implement. Cisco PIX Device Manager (PDM) is a feature-rich, graphical management system that provides administrators with an easy-to-use interface for Cisco PIX security devices. PDM simplifies the configuration, operation, and monitoring of Cisco PIX security appliances.Securing Your Business Using PIX Device Manager helps readers secure small and medium-sized networks from network intrusions using PDM, the PIX Firewall, and Cisco Security Agent. Aimed at the beginner network security administrator, it is written in simple language and avoids technical jargon. The book starts by explaining how hackers operate and discusses how to protect against hacking attacks. Step-by-step instructions for entering commands into the graphical interface are interlaced with explanations of what attacks and network threats are mitigated with the commands. Upon reading this book, users will understand in simple terms the threats to their networks, the tools and commands used to mitigate such threats, and any exposures that may be outstanding when features are not in use. <br>

2008-05-09

Technical analysis indicators are widely used by traders in financial and<br>commodity markets to predict future price levels and enhance trading<br>profitability. We have previously shown a number of popular indicator-based<br>trading rules to be loss-making when applied individually in a systematic<br>manner. However, technical traders typically use combinations of a broad<br>range of technical indicators. Moreover, successful traders tend to adapt to<br>market conditions by ‘dropping’ trading rules as soon as they become<br>loss-making or when more profitable rules are found. In this paper we try to<br>emulate such traders by developing a trading system consisting of rules based<br>on combinations of different indicators at different frequencies and lags. An<br>initial portfolio of such rules is selected by a genetic algorithm applied to a<br>number of indicators calculated on a set of US Dollar/British Pound spot<br>foreign exchange tick data from 1994 to 1997 aggregated to various intraday<br>frequencies. The genetic algorithm is subsequently used at regular intervals<br>on out-of-sample data to provide new rules and a feedback system is utilized<br>to rebalance the rule portfolio, thus creating two levels of adaptivity. Despite<br>the individual indicators being generally loss-making over the data period,<br>the best rule found by the developed system is found to be modestly, but<br>significantly, profitable in the presence of realistic transaction costs.

2008-03-20

#### Whole Tomato Visual Assist 1912

Whole.Tomato.Visual.Assist.X.v10.7.1912.0.Cr-BRD

2012-09-14

#### 请问如何在菜单根及Pupop属性的菜单子项上加入图标？

###### 空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人