搜索结果

找到约 856 项符合 APPlications 的查询结果

按分类筛选

显示更多分类

其他书籍 With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s

With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator a ...
https://www.eeworm.com/dl/542/238506.html
下载: 148
查看: 1057

电子书籍 The LabVIEW Development Guidelines describe many of the issues that arise when developing large app

The LabVIEW Development Guidelines describe many of the issues that arise when developing large applications. The guidelines are based on the advice of LabVIEW developers, and provide a basic survey of software engineering techniques you might find useful when developing your own projects. There is ...
https://www.eeworm.com/dl/cadence/ebook/238789.html
下载: 60
查看: 1055

电子书籍 The Description Logic Handbook The Description Logic Handbook: Theory, Implementation and Applicatio

The Description Logic Handbook The Description Logic Handbook: Theory, Implementation and Applications 【Author】Franz Baader, Diego Calvanese, Deborah McGuinness The Description Logic Handbook
https://www.eeworm.com/dl/cadence/ebook/240573.html
下载: 26
查看: 1026

Java书籍 《JavaServer Faces》 In JavaServer Faces, developers learn how to use the new JavaServer Faces framew

《JavaServer Faces》 In JavaServer Faces, developers learn how to use the new JavaServer Faces framework to build real-world web applications. The book contains everything you ll need: how to construct the HTML on the front end how to create the user interface components that connect the front end t ...
https://www.eeworm.com/dl/656/241391.html
下载: 59
查看: 1065

文件格式 Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit condi

Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit conditional dependencies between parts of the state to estimate. By doing so, RBPFs can improve the estimation quality while also reducing the overall computational load in comparison to original PFs. Howev ...
https://www.eeworm.com/dl/639/241532.html
下载: 52
查看: 1058

系统设计方案 Challenges Building Scalable and Distributed Underwater Wireless Sensor Networks (UWSNs) for Aquatic

Challenges Building Scalable and Distributed Underwater Wireless Sensor Networks (UWSNs) for Aquatic Applications.pdf
https://www.eeworm.com/dl/678/241852.html
下载: 168
查看: 1054

Windows CE This book is an in-depth exploration into eVB s inherent features, and how to use them to solve like

This book is an in-depth exploration into eVB s inherent features, and how to use them to solve likely mobile application programming tasks. After reading the book the reader will be able to write applications tackling a wide array of business problems for Windows CE-powered devices, both customized ...
https://www.eeworm.com/dl/674/242394.html
下载: 159
查看: 1052

FlashMX/Flex源码 Swfdec is a decoder/renderer for Macromedia Flash animations. The decoding and rendering engine is

Swfdec is a decoder/renderer for Macromedia Flash animations. The decoding and rendering engine is provided in a library that can be used by other applications
https://www.eeworm.com/dl/661/243950.html
下载: 40
查看: 1113

Java编程 Abstract The Lucene Server project is an attempt to extend the Jakarta Lucene tool with server ca

Abstract The Lucene Server project is an attempt to extend the Jakarta Lucene tool with server capabilities. Lucene is a robust Java API that enables you creating indexes from text sources and perform powerful searches on these indexes. With Lucene, creating an index must be done programmatically ...
https://www.eeworm.com/dl/633/244853.html
下载: 52
查看: 1042

其他书籍 CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2

CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DO ...
https://www.eeworm.com/dl/542/246854.html
下载: 25
查看: 1419