搜索结果

找到约 170 项符合 ADDRESS 的查询结果

书籍源码 The code, images and designs for this book are released under a Creative Commons Attribution-NonComm

The code, images and designs for this book are released under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 License. http://creativecommons.org/licenses/by-nc-sa/2.5/ You are free: * to copy, distribute, display, and perform the work * to make derivative works Under the following c ...
https://www.eeworm.com/dl/532/188924.html
下载: 58
查看: 1088

Java编程 Overview Provides a way to store very large collections of email addresses (100,000+ addresses) and

Overview Provides a way to store very large collections of email addresses (100,000+ addresses) and efficiently check whether a specific address is contained in a collection. The collection can be created programmatically, or through a pluggable persistence mechanism. Functionality Maintains lar ...
https://www.eeworm.com/dl/633/192602.html
下载: 114
查看: 1034

VxWorks tServer task executes functions at low priority (254). serverSend funtion is used to send a requ

tServer task executes functions at low priority (254). serverSend funtion is used to send a request to the tServer to execute a function at the tServer s priority. First tServer task executes the i() system call to print the summary of tShell task. Next an address exception is caused i ...
https://www.eeworm.com/dl/662/199892.html
下载: 192
查看: 1043

Delphi控件源码 Magenta Systems Internet Packet Monitoring Components are a set of Delphi components designed to cap

Magenta Systems Internet Packet Monitoring Components are a set of Delphi components designed to capture and monitor internet packets using either raw sockets or the WinPcap device driver. Hardware permitting, ethernet packets may be captured and interpreted, and statistics maintained about the traf ...
https://www.eeworm.com/dl/666/215649.html
下载: 142
查看: 1074

网络 xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which en

xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which enables the IPsec stacks to support multiple l2tp clients behind the same NAT router and multiple l2tp clients on the same internal IP address. It is a fork of "l2tpd". Release focus: Minor feature enh ...
https://www.eeworm.com/dl/635/225253.html
下载: 48
查看: 1151

VHDL/FPGA/Verilog This leon3 design is tailored to the Altera NiosII Startix2 Development board, with 16-bit DDR SDR

This leon3 design is tailored to the Altera NiosII Startix2 Development board, with 16-bit DDR SDRAM and 2 Mbyte of SSRAM. As of this time, the DDR interface only works up to 120 MHz. At 130, DDR data can be read but not written. NOTE: the test bench cannot be simulated with DDR enabled because ...
https://www.eeworm.com/dl/663/226442.html
下载: 45
查看: 1062

微处理器开发 This a simple bootloader for AT91SAM7{S,X}{64,128,256} processors. It permits you to download new c

This a simple bootloader for AT91SAM7{S,X}{64,128,256} processors. It permits you to download new code to the device over USB. This bootrom is installed at address 0x00000000 in the ARM, which means that it is the first piece of code to execute after reset. At startup, it waits for a few seconds to ...
https://www.eeworm.com/dl/655/228323.html
下载: 155
查看: 1058

Internet/网络编程 P2P 之 UDP穿透NAT的原理与实现(附源代码) 原创:shootingstars 参考:http://midcom-p2p.sourceforge.net/draft-ford-midcom

P2P 之 UDP穿透NAT的原理与实现(附源代码) 原创:shootingstars 参考:http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt baidu 论坛上经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。呵呵,在这里我就用自己实现的一个源代码来说明UDP穿越NAT的原理。 首先先介绍一些基本概 ...
https://www.eeworm.com/dl/620/231636.html
下载: 42
查看: 1170

其他 Avalon Interface Specification,The Avalon interface specification is designed to accommodate periphe

Avalon Interface Specification,The Avalon interface specification is designed to accommodate peripheral development for the system-on-a-programmable-chip (SOPC) environment. The specification provides peripheral designers with a basis for describing the address-based read/write interface found on ma ...
https://www.eeworm.com/dl/534/231910.html
下载: 154
查看: 1052

CA认证 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中

雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能 ...
https://www.eeworm.com/dl/640/246389.html
下载: 23
查看: 1029