搜索结果
找到约 225 项符合
HERE 的查询结果
按分类筛选
- 全部分类
- Java编程 (14)
- 书籍 (11)
- matlab例程 (10)
- 技术资料 (9)
- 数值算法/人工智能 (7)
- 其他 (7)
- 其他书籍 (7)
- Linux/Unix编程 (7)
- 网络 (7)
- 单片机开发 (7)
- VC书籍 (6)
- 通讯/手机编程 (5)
- 书籍源码 (5)
- Internet/网络编程 (5)
- 文章/文档 (5)
- Delphi控件源码 (5)
- 软件设计/软件工程 (5)
- 单片机编程 (4)
- 编译器/解释器 (4)
- 嵌入式/单片机编程 (4)
- VHDL/FPGA/Verilog (4)
- 论文 (3)
- 电源技术 (3)
- 加密解密 (3)
- 软件工程 (3)
- 数学计算 (3)
- 汇编语言 (3)
- 通讯编程文档 (3)
- Windows CE (3)
- Symbian (3)
- 源码 (2)
- 通信网络 (2)
- 模拟电子 (2)
- 电子书籍 (2)
- 可编程逻辑 (2)
- 游戏 (2)
- 编辑器/阅读器 (2)
- *行业应用 (2)
- Applet (2)
- 技术管理 (2)
- USB编程 (2)
- 人工智能/神经网络 (2)
- 数据结构 (2)
- 微处理器开发 (2)
- Java书籍 (2)
- 系统设计方案 (2)
- RFID编程 (2)
- 软件 (1)
- DSP编程 (1)
- 嵌入式综合 (1)
- 教程资料 (1)
- allegro (1)
- 压缩解压 (1)
- 驱动编程 (1)
- 其他数据库 (1)
- uCOS (1)
- J2ME (1)
- FlashMX/Flex源码 (1)
- Delphi/CppBuilder (1)
- 家庭/个人应用 (1)
- Windows Mobile (1)
- 医药行业 (1)
- 中间件编程 (1)
- JavaScript (1)
- 其他嵌入式/单片机内容 (1)
- SQL Server (1)
- 邮电通讯系统 (1)
- 行业发展研究 (1)
- GPS编程 (1)
- 认证考试资料 (1)
- Ajax (1)
- 能源行业(电力石油煤炭) (1)
- VIP专区 (1)
书籍 Mobile Broadband Multimedia Networks Techniques
This books presents the research work of COST 273 Towards Mobile Broadband Multimedia
Networks, hence, it reports on the work performed and on the results achieved within the project
by its participants. The material presented here corresponds to the results obtained in four years
of collaborative w ...
VC书籍 To use the ATLTrace tool: Debug an MFC or ATL project select Start from the Debug menu. Selec
To use the ATLTrace tool:
Debug an MFC or ATL project select Start from the Debug menu.
Select MFC/ATL Trace Tool in the Tools menu.
Expand the tree control list in the Trace List window. Here you will see the running application, any modules within that application, and the trace categories fo ...
数学计算 1) Write a function reverse(A) which takes a matrix A of arbitrary dimensions as input and returns a
1) Write a function reverse(A) which takes a matrix A of arbitrary dimensions as input and returns a matrix B consisting of the columns of A in reverse order. Thus for example, if
A = 1 2 3 then B = 3 2 1
4 5 6 6 5 4
7 8 9 9 8 7
Write a main program to call reverse(A) for the matrix A = magic(5 ...
文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
论文 用于锂 - 硫电池的纳米结构金属氧化物和硫化物(1)
Lithium–sulfur (Li–S) batteries with high energy density and long cycle life are considered to be one of the most promising next-generation energy-storage systems beyond routine lithium-ion batteries. Various approaches have been proposed to break down technical barriers in Li–S battery systems. ...
书籍 Web Based Enterprise Energy
HIS IS THE THIRD —and most likely the last—book
in the series on information technology for
energy managers and web based energy infor-
mation and control systems. This book concentrates on
web based enterprise energy and building automation
systems, and serves as a capstone volume in this series. ...
Java书籍 THIS is really two books in one: a tutorial and a reference manual for JDBC, the application program
THIS is really two books in one: a tutorial and a reference manual for JDBC, the application programming interface that makes it possible for programmers to access databases from Java. The goal is to be useful to a wide range of readers, from database novices to database experts. Therefore, we have ...
VC书籍 本文从英文C–FAQ (2004 年7 月3 日修订版) 翻译而来。本文的中文版权为 朱群英和孙云所有。本文的内容可以自由用于个人目的
本文从英文C–FAQ (2004 年7 月3 日修订版) 翻译而来。本文的中文版权为
朱群英和孙云所有。本文的内容可以自由用于个人目的,但是不可以未经许可出
版发行。英文版权为Steve Summit 所有,详情见下面的英文版权说明。
The English version of this FAQ list is Copyright 1990-2004 by Steve Summit.
Content from the boo ...
认证考试资料 What you always wanted to know about networking but were afraid to ask! * How the Internet work
What you always wanted to know about networking but were afraid to ask!
* How the Internet works
* How e-mail, e-learning, and telephony work on the Internet
* What makes a network safe
* How traffic gets from here to there
* Disaster recovery and other ways to keep a network running
* How busines ...
技术资料 SDxCentral-Mega-NFV-Report
The following sections profile many of the vendors in the NFV market. The individual profiles were created
through a collaborative effort between SDNCentral’s Research Team and the Vendor’s product experts.
SDNCentral worked under the assumption the information provided by the vendors was factual, ...