搜索结果

找到约 1,400 项符合 ALL 的查询结果

按分类筛选

显示更多分类

其他 with this program you can search your whole driver and list all files in a tree view box.

with this program you can search your whole driver and list all files in a tree view box.
https://www.eeworm.com/dl/534/155402.html
下载: 198
查看: 1128

VHDL/FPGA/Verilog -- Booth Multiplier -- This file contains all the entity-architectures for a complete -- k-bit x k

-- Booth Multiplier -- This file contains all the entity-architectures for a complete -- k-bit x k-bit Booth multiplier. -- the design makes use of the new shift operators available in the VHDL-93 std -- this design passes the Synplify synthesis check -- download from: www.fpga.com.cn & www.pld.com. ...
https://www.eeworm.com/dl/663/170598.html
下载: 186
查看: 1119

其他 Ever wondered how all those COM components that you ve written through the years play along with the

Ever wondered how all those COM components that you ve written through the years play along with the .NET runtime. If you are a diehard COM developer interested in knowing how Classic COM Components are positioned in the .NET world or how COM aware clients could consume .NET components, read on.
https://www.eeworm.com/dl/534/182062.html
下载: 153
查看: 1092

Java书籍 These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition

These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. Within each chapter file, the listings are stored in the same order as they ...
https://www.eeworm.com/dl/656/188783.html
下载: 121
查看: 1125

其他 Intrusion Detection:Host-based Network Intrusion Detection &#8226 At each host, monitor all incomi

Intrusion Detection:Host-based Network Intrusion Detection &#8226 At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – Examine contents
https://www.eeworm.com/dl/534/195854.html
下载: 179
查看: 1066

Linux/Unix编程 Distributed Median,Alice has an array A, and Bob has an array B. All elements in A and B are distinc

Distributed Median,Alice has an array A, and Bob has an array B. All elements in A and B are distinct. Alice and Bob are interested in finding the median element of their combined arrays.
https://www.eeworm.com/dl/619/205689.html
下载: 152
查看: 1064

微处理器开发 This code is used to TCP/IP connection It is developed by PIC18F452 and all this code is successfull

This code is used to TCP/IP connection It is developed by PIC18F452 and all this code is successfully.
https://www.eeworm.com/dl/655/227055.html
下载: 120
查看: 1079

J2ME First of all, the Applet-phone is a SIP User-Agent with audio and text messaging capabilities. But

First of all, the Applet-phone is a SIP User-Agent with audio and text messaging capabilities. But i s also embedded in an applet where you can use it as usual if your firewall allow you to use the UDP transport. If not, you can use TCP to carry your voice in a voice messaging fashion. Your voice is ...
https://www.eeworm.com/dl/660/228299.html
下载: 77
查看: 1104

其他 TFIND searches for one or more strings (boolean AND) in a text file. TFIND reports all lines whe

TFIND searches for one or more strings (boolean AND) in a text file. TFIND reports all lines where the string(s) were found (or NOT found by option). The search can be limited to a field in a fixed field (i.e. column oriented) list. An extended search mode is available, where only letters an ...
https://www.eeworm.com/dl/534/250401.html
下载: 86
查看: 1098

编译器/解释器 // Copyright (c), Philips Semiconductors Gratkorn // (C)PHILIPS Electronics N.V.2000 // All rights

// Copyright (c), Philips Semiconductors Gratkorn // (C)PHILIPS Electronics N.V.2000 // All rights are reserved. // Philips reserves the right to make changes without notice at any time. // Philips makes no warranty, expressed, implied or statutory, including but // not limited to any implied warra ...
https://www.eeworm.com/dl/628/255171.html
下载: 22
查看: 1100