搜索结果

找到约 151 项符合 DEScribe 的查询结果

其他书籍 Please read your package and describe it at least 40 bytes. System will automatically delete the di

Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these two directory.
https://www.eeworm.com/dl/542/435343.html
下载: 87
查看: 1015

行业发展研究 a ppt file describe privacy protected visual surveillance , a survey of all existed methods on prova

a ppt file describe privacy protected visual surveillance , a survey of all existed methods on provacy preserving visual surveillance
https://www.eeworm.com/dl/692/437535.html
下载: 164
查看: 1086

行业发展研究 a file describe virtual reality of ancient Japanese Capital , digital restore of Nana

a file describe virtual reality of ancient Japanese Capital , digital restore of Nana
https://www.eeworm.com/dl/692/437571.html
下载: 76
查看: 1034

软件设计/软件工程 To introduce software process models To describe three generic process models and when they may be

To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software development, testing and evolution To explain the Rational Unified Process model To introduce CASE technology to support s ...
https://www.eeworm.com/dl/684/437821.html
下载: 53
查看: 1058

其他书籍 describe the canny theory

describe the canny theory
https://www.eeworm.com/dl/542/438024.html
下载: 197
查看: 1044

文章/文档 Videp describe how to creat a masterpage

Videp describe how to creat a masterpage
https://www.eeworm.com/dl/652/442698.html
下载: 120
查看: 1011

文件格式 Please read your package and describe it at least 40 bytes. System will automatically delete the di

Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these two directory.
https://www.eeworm.com/dl/639/445255.html
下载: 186
查看: 1013

其他书籍 Jpeg Steganography Please read your package and describe it at least 40 bytes. System will automat

Jpeg Steganography Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these two directory.
https://www.eeworm.com/dl/542/445284.html
下载: 59
查看: 1026

Linux/Unix编程 sphit algorithm is used in this code to describe image compression

sphit algorithm is used in this code to describe image compression
https://www.eeworm.com/dl/619/447743.html
下载: 178
查看: 1044

其他 this document describe how davicom ic dm9000 can be programmed and controlled. this ic can be used i

this document describe how davicom ic dm9000 can be programmed and controlled. this ic can be used in the embedded systems and network lan cards. its is 10/100Mpbs ic.
https://www.eeworm.com/dl/534/447768.html
下载: 95
查看: 1053