Réalisées par des traducteurs professionnels, des entreprises, des pages web ou traductions disponibles gratuitement.
source code:____________________________________________
name:_______________________________source code: 63108
Dernière mise à jour : 2018-02-13
Fréquence d'utilisation : 1
Qualité :
the source code is included in the download.
the source code is included in the download.
Dernière mise à jour : 2018-02-13
Fréquence d'utilisation : 1
Qualité :
the source code of the program is as follows:
the source code of the program is as follows:
Dernière mise à jour : 2018-02-13
Fréquence d'utilisation : 1
Qualité :
: basic source code of an early version of the game.
: basic source code of an early version of the game.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
622 mb)** colossus software source code listing, for command module guidance computer.
622 mb)**colossus software source code listing, for command module guidance computer.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
actually, writing out the expanded source code can be done from any section or subsection (i.e.
actually, writing out the expanded source code can be done from any section or subsection (i.e.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
the snippets of the literate codice_1 above show how an explanation of the program and its source code are interwoven.
the snippets of the literate codice_1 above show how an explanation of the program and its source code are interwoven.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
* evolving biological clocks using genetic regulatory networks - information page with model source code and java applet.
* evolving biological clocks using genetic regulatory networks - information page with model source code and java applet.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
* source code for command module code (comanche054) and lunar module code (luminary099) as text.
*source code for command module code (comanche054) and lunar module code (luminary099) as text.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
a finales del 2014 se celebró en el gelredome de arnhem una nueva edición del festival qlimax “the source code of creation”.
at the end of 2014, a new edition of the qlimax festival, ‘the source code of creation’, took place at the gelredome in arnhem.
Dernière mise à jour : 2018-02-13
Fréquence d'utilisation : 1
Qualité :
* patrick-gilles maillot provides free fortran and c source code for manipulating quaternions and rotations / position in space.
* patrick-gilles maillot provides free fortran and c source code for manipulating quaternions and rotations / position in space.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
* "donkey.bas" executable, a compiled version of the above source code that can be executed on windows pcs without an interpreter.
* "donkey.bas" executable, a compiled version of the above source code that can be executed on windows pcs without an interpreter.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
Avertissement : un formatage HTML invisible est présent
for more examples on using require_once() and include_once(), look at the pear code included in the latest php source code distributions.
windows versions of php prior to php 4.3 do not support accessing remote files via this function, even if allow_url_fopen is enabled.
Dernière mise à jour : 2011-10-24
Fréquence d'utilisation : 1
Qualité :
instead of comments provided as side notes to source code a literate program contains the explanation of concepts on each level, with lower level concepts deferred to their appropriate place, which allows for better communication of thought.
instead of comments provided as side notes to source code a literate program contains the explanation of concepts on each level, with lower level concepts deferred to their appropriate place, which allows for better communication of thought.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
a piece of code designated as "codice_6", with the equal sign), so one literate program file can contain several files with machine source code.
a piece of code designated as "codice_6", with the equal sign), so one literate program file can contain several files with machine source code.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
Avertissement : un formatage HTML invisible est présent
este fue el preámbulo a la publicación de un libro, autoría de brown, titulado "samizdat: and other issues regarding the 'source' of open source code".
this was a prelude to the pending publication of a book by brown titled "samizdat: and other issues regarding the 'source' of open source code".
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
Avertissement : un formatage HTML invisible est présent
when aiming for tex output, one writes a plain latex file where source code is marked by a given surrounding environment; latex can be set up to handle that environment, while the haskell compiler looks for the right markers to identify haskell statements to compile, removing the tex documentation as if they were comments.
when aiming for tex output, one writes a plain latex file where source code is marked by a given surrounding environment; latex can be set up to handle that environment, while the haskell compiler looks for the right markers to identify haskell statements to compile, removing the tex documentation as if they were comments.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
para infectar otros sistemas de las redes peer-to-peer, realiza las siguientes operaciones: - busca directorios que contengan una de las siguientes subseries de caracteres: • share • microsof al tener éxito, crea los siguientes ficheros: • land attack(source and files).exe • ddos bot(src)..scr • forum hack.txt.scr • winamp 6(plugins).exe • crack collection.scr • nlp.scr • hack unix server(info).scr • screensaver for hackers.scr • windows 2000(source code).scr • hack chat.exe • kaspersy antivirus key(ver.5.xx,pro,personal).exe estos ficheros son copias del programa malicioso.
in order to infect other systems in the peer to peer network community the following action is performed: - it searches for directories that contain one of the following substrings: • share • microsof if successful, the following files are created: • land attack(source and files).exe • ddos bot(src)..scr • forum hack.txt.scr • winamp 6(plugins).exe • crack collection.scr • nlp.scr • hack unix server(info).scr • screensaver for hackers.scr • windows 2000(source code).scr • hack chat.exe • kaspersy antivirus key(ver.5.xx,pro,personal).exe these files are copies of the malware itself.
Dernière mise à jour : 2017-01-02
Fréquence d'utilisation : 2
Qualité :