搜索结果
找到约 1,070 项符合
First-out 的查询结果
Java编程 SOME BACKGROUND ON DESIGN PATTERNS The term “design patterns” sounds a bit formal to the uninitiate
SOME BACKGROUND ON DESIGN PATTERNS
The term “design patterns” sounds a bit formal to the uninitiated and
can be somewhat off-putting when you first encounter it. But, in fact, design
patterns are just convenient ways of reusing object-oriented code between
projects and between programmers. The ide ...
单片机开发 Electronics Design Checklist C) 2003 Hank Wallace This is a checklist for electronics designers. T
Electronics Design Checklist
C) 2003 Hank Wallace
This is a checklist for electronics designers. The idea is for engineers and technicians to
share experiences and create a detailed checklist, which the individual designer can pare down to meet his or her specific needs. There are many details that ...
Delphi控件源码 unit ScardCL {**************************************************************************} {
unit ScardCL
{**************************************************************************}
{ }
{ This C DLL header file first (automatic) conversion generated by: }
{ HeadConv 4.0 (c) 2000 by Bob Swart (aka Dr.Bob - w ...
操作系统开发 A user-space device driver can do many of the things that kernel drivers can t, such as perform a lo
A user-space device driver can do many of the things that kernel drivers can t, such as perform a long-running computation, block while waiting for an event, or read files from the file system. Unlike kernel drivers, a user-space device driver can use other device drivers--that is, access the networ ...
其他书籍 CDMA has been quite successful as a second-generation cellular system,having achieved widespread use
CDMA has been quite successful as a second-generation cellular system,having achieved widespread use in particular in North America and Korea by the turn of the twenty-first century.
加密解密 VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipeline ...
matlab例程 Specch Recognition system using MATLAB. It includes Viterbi Forwarding and backtracking Algorithm .
Specch Recognition system using MATLAB. It includes Viterbi Forwarding and backtracking Algorithm . First it includes Feature Extraction and then Feature Matching
GPS编程 This code outputs various NMEA strings to a com port. The code was originally used to test naviati
This code outputs various NMEA strings to a com port. The code was
originally used to test naviation programmes.
First select the required com port and the required NMEA message string.
There is a default starting position but this can be changed to suit just by typing
in a new position.
Click on ...
其他 Enter the Matrix MS-DOS screensaver. Sample of using bios functions (by int 10h) for text data out
Enter the Matrix MS-DOS screensaver.
Sample of using bios functions (by int 10h) for text data output (monitor in the text mode) and keyboard input. Requires: Borland C++ 3.1 for DOS.
Java书籍 Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each rec
Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each recipe also includes explanations of how and why the approach works, so you can adapt the techniques to similar situations. One of the biggest challenges facing developers today is sorting through the wi ...