搜索结果

找到约 474 项符合 MACHINE 的查询结果

按分类筛选

显示更多分类

Java书籍 A Java virtual machine instruction consists of an opcode specifying the operation to be performed, f

A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
https://www.eeworm.com/dl/656/147598.html
下载: 31
查看: 1125

Java书籍 A Java virtual machine instruction consists of an opcode specifying the operation to be performed, f

A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
https://www.eeworm.com/dl/656/147599.html
下载: 38
查看: 1115

Java书籍 A Java virtual machine instruction consists of an opcode specifying the operation to be performed, f

A Java virtual machine instruction consists of an opcode specifying the operation to be performed, followed by zero or more operands embodying values to be operated upon. This chapter gives details about the format of each Java virtual machine instruction and the operation it performs.
https://www.eeworm.com/dl/656/147600.html
下载: 84
查看: 1089

数值算法/人工智能 The program simulates a Nondeterministic Multitape Turing Machine. It works as ordinary (Determinist

The program simulates a Nondeterministic Multitape Turing Machine. It works as ordinary (Deterministic) Turing Machine as well.
https://www.eeworm.com/dl/518/178176.html
下载: 165
查看: 1118

数据库系统 form sqlserve to sybase my msn is machine_jak@hotmail.com

form sqlserve to sybase my msn is machine_jak@hotmail.com
https://www.eeworm.com/dl/523/193540.html
下载: 129
查看: 1073

Internet/网络编程 The tool presented below tries to detect from remote if the target machine was compromised with the

The tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender rootkit. The tool connect to the remote host, and compares the reply to several known replies. The rootkits that can be detected by the tool are: HACKER Defender v1.0.0 and below.
https://www.eeworm.com/dl/620/262175.html
下载: 115
查看: 1072

人工智能/神经网络 新神经网络 Extreme Learning Machine 比SVM快

新神经网络 Extreme Learning Machine 比SVM快,附4个例子
https://www.eeworm.com/dl/650/265507.html
下载: 158
查看: 1070

单片机开发 uPSD3354D piece machine principle as well as correspondence using

uPSD3354D piece machine principle as well as correspondence using
https://www.eeworm.com/dl/648/319601.html
下载: 100
查看: 1035

Linux/Unix编程 Sample C source code for USD $10 Linux answering machine.

Sample C source code for USD $10 Linux answering machine.
https://www.eeworm.com/dl/619/350105.html
下载: 136
查看: 1098

单片机开发 Very a useful monolithic machine source program , range are broad , the pragmatism is strong

Very a useful monolithic machine source program , range are broad , the pragmatism is strong
https://www.eeworm.com/dl/648/359918.html
下载: 66
查看: 1062