搜索结果
找到约 660 项符合
IMPLEMENTation 的查询结果
按分类筛选
- 全部分类
- matlab例程 (52)
- 其他 (41)
- Java编程 (37)
- VHDL/FPGA/Verilog (37)
- 其他书籍 (36)
- 数学计算 (26)
- 加密解密 (26)
- 人工智能/神经网络 (24)
- 压缩解压 (23)
- 数据结构 (18)
- 单片机编程 (17)
- 系统设计方案 (17)
- Linux/Unix编程 (16)
- 电子书籍 (16)
- 书籍 (16)
- 通讯编程文档 (15)
- 网络 (14)
- 文章/文档 (12)
- 软件设计/软件工程 (11)
- 通讯/手机编程 (11)
- 数值算法/人工智能 (10)
- 编译器/解释器 (10)
- 行业发展研究 (10)
- 技术资料 (9)
- 可编程逻辑 (8)
- 微处理器开发 (8)
- Java书籍 (8)
- 教程资料 (7)
- VC书籍 (7)
- 单片机开发 (6)
- 中间件编程 (6)
- 嵌入式/单片机编程 (5)
- 串口编程 (5)
- 3G开发 (5)
- 技术管理 (5)
- 汇编语言 (4)
- 文件格式 (4)
- 其他嵌入式/单片机内容 (4)
- 其他行业 (4)
- 软件工程 (3)
- 驱动编程 (3)
- Internet/网络编程 (3)
- 语音压缩 (3)
- 模拟电子 (2)
- 手机WAP编程 (2)
- 手机短信编程 (2)
- GPS编程 (2)
- USB编程 (2)
- Applet (2)
- CA认证 (2)
- Windows CE (2)
- Jsp/Servlet (2)
- 金融证券系统 (2)
- 认证考试资料 (2)
- JavaScript (2)
- 游戏 (2)
- DSP编程 (2)
- *行业应用 (2)
- 数据库系统 (2)
- BREW编程 (2)
- 源码 (2)
- VIP专区 (2)
- 实用工具 (1)
- 学术论文 (1)
- 资料/手册 (1)
- 教程资料 (1)
- Mentor (1)
- PCB相关 (1)
- 电源技术 (1)
- 无线通信 (1)
- 工控技术 (1)
- 教育系统应用 (1)
- J2ME (1)
- 书籍源码 (1)
- 编辑器/阅读器 (1)
- 邮电通讯系统 (1)
- SCSI/ASPI (1)
- Delphi控件源码 (1)
- 并行计算 (1)
- 其他数据库 (1)
- Ajax (1)
- 技术教程 (1)
编译器/解释器 this a pack include source code for quartus 2. It is an implementation of the LC2. The LC-2 compu
this a pack include source code for quartus 2.
It is an implementation of the LC2. The LC-2 computer is described in Introduction to Computing Systems from Bits & Gates to C & Beyond by Yale Patt and Sanjay Patel, McGraw Hill, 2001. The LC2 model can be run as a simulation or downloaded to the UP3 ...
编译器/解释器 UC Library Extensions UnderC comes with a pocket implementation of the standard C++ libraries, wh
UC Library Extensions
UnderC comes with a pocket implementation of the standard C++ libraries, which is a reasonably faithful subset. This documentation describes those UnderC functions and classes which are not part of the C++ standard.
UC Library
Builtin functions:
Most of these are standard C ...
加密解密 The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption sche
The Stanford IBE library is a C implementation of the Boneh-Franklin
identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based
Encryption from the Weil Pairing", CRYPTO 2001.)
There are a few modifications and additions. The Boneh-Franklin scheme is
used as a Key Encapsulation Mech ...
电子书籍 The Description Logic Handbook The Description Logic Handbook: Theory, Implementation and Applicatio
The Description Logic Handbook The Description Logic Handbook: Theory, Implementation and Applications 【Author】Franz Baader, Diego Calvanese, Deborah McGuinness
The Description Logic Handbook
系统设计方案 Implementation guidelines for Data Broadcasting
Implementation guidelines for Data Broadcasting
Windows CE See Hanoi.cpp for the implementation of this cla
See Hanoi.cpp for the implementation of this cla
邮电通讯系统 radius协议源码÷The Radius Stack will connect to a Radius Server. This stack implementation is built upo
radius协议源码÷The Radius Stack will connect to a Radius Server. This stack
implementation is built upon the UdpStack which is available
in the radius{version}/util directory. A minimal set of VSAs (Vendor
Specific Attributes are supported by this stack). The Radius
Stack should be used as a base c ...
人工智能/神经网络 /* This a simple genetic algorithm implementation where the */ /* evaluation function takes positiv
/* This a simple genetic algorithm implementation where the */
/* evaluation function takes positive values only and the */
/* fitness of an individual is the same as the value of the */
/* objective function
Linux/Unix编程 This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through
This a naive implementation of BOOTP/TFTPBOOT, the protocols
to use to bootstrap a computer through a TCP/IP network.
The goal was to design a small footprint implementation
to allow the code to be integrated into a monitor program
stored in a ROM/FLASH, the footprint is about 7 KBytes
for the test ...
加密解密 MD5 Source Code This optimized MD5 implementation conforms to RFC 1321
MD5 Source Code
This optimized MD5 implementation conforms to RFC 1321