搜索结果
找到约 833 项符合
Implementation-Virtual 的查询结果
GPS编程 Virtual com port source core
Virtual com port source core
编译器/解释器 UC Library Extensions UnderC comes with a pocket implementation of the standard C++ libraries, wh
UC Library Extensions
UnderC comes with a pocket implementation of the standard C++ libraries, which is a reasonably faithful subset. This documentation describes those UnderC functions and classes which are not part of the C++ standard.
UC Library
Builtin functions:
Most of these are standard C ...
加密解密 The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption sche
The Stanford IBE library is a C implementation of the Boneh-Franklin
identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based
Encryption from the Weil Pairing", CRYPTO 2001.)
There are a few modifications and additions. The Boneh-Franklin scheme is
used as a Key Encapsulation Mech ...
其他书籍 With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator a ...
电子书籍 The Description Logic Handbook The Description Logic Handbook: Theory, Implementation and Applicatio
The Description Logic Handbook The Description Logic Handbook: Theory, Implementation and Applications 【Author】Franz Baader, Diego Calvanese, Deborah McGuinness
The Description Logic Handbook
系统设计方案 Implementation guidelines for Data Broadcasting
Implementation guidelines for Data Broadcasting
Windows CE See Hanoi.cpp for the implementation of this cla
See Hanoi.cpp for the implementation of this cla
人工智能/神经网络 /* This a simple genetic algorithm implementation where the */ /* evaluation function takes positiv
/* This a simple genetic algorithm implementation where the */
/* evaluation function takes positive values only and the */
/* fitness of an individual is the same as the value of the */
/* objective function
Linux/Unix编程 This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through
This a naive implementation of BOOTP/TFTPBOOT, the protocols
to use to bootstrap a computer through a TCP/IP network.
The goal was to design a small footprint implementation
to allow the code to be integrated into a monitor program
stored in a ROM/FLASH, the footprint is about 7 KBytes
for the test ...
加密解密 MD5 Source Code This optimized MD5 implementation conforms to RFC 1321
MD5 Source Code
This optimized MD5 implementation conforms to RFC 1321