搜索结果
找到约 232 项符合
OVERVIEW 的查询结果
按分类筛选
- 全部分类
- 技术资料 (76)
- 其他书籍 (22)
- 书籍 (15)
- 通讯编程文档 (10)
- 电子书籍 (9)
- 单片机编程 (8)
- 其他 (8)
- 文章/文档 (6)
- Java书籍 (6)
- Java编程 (5)
- 文件格式 (5)
- DSP编程 (3)
- 模拟电子 (3)
- 可编程逻辑 (3)
- 技术管理 (3)
- 嵌入式/单片机编程 (3)
- Windows Mobile (3)
- 行业发展研究 (3)
- 通讯/手机编程 (2)
- 软件工程 (2)
- 教程资料 (2)
- Linux/Unix编程 (2)
- matlab例程 (2)
- 系统设计方案 (2)
- 源码 (1)
- 论文 (1)
- PCB相关 (1)
- 电源技术 (1)
- 加密解密 (1)
- 数据库系统 (1)
- 书籍源码 (1)
- 技术书籍 (1)
- 资料/手册 (1)
- 测试测量 (1)
- 嵌入式综合 (1)
- 压缩解压 (1)
- 编译器/解释器 (1)
- 网络 (1)
- 数学计算 (1)
- USB编程 (1)
- 单片机开发 (1)
- 人工智能/神经网络 (1)
- 微处理器开发 (1)
- VxWorks (1)
- VHDL/FPGA/Verilog (1)
- Delphi/CppBuilder (1)
- Delphi控件源码 (1)
- 软件设计/软件工程 (1)
- VC书籍 (1)
- 其他嵌入式/单片机内容 (1)
- RFID编程 (1)
- MTK (1)
- 3G开发 (1)
Windows Mobile SDP Search and Record generator OVERVIEW: Recognizing the difficulty in creating an SDP service
SDP Search and Record generator
OVERVIEW:
Recognizing the difficulty in creating an SDP service description and search
from scratch, Microsoft is providing a sample utility in bthnscreate.cxx to
automatically create a service or record. This utility can be run to create
an SDP record or to setup ...
其他书籍 Attributes, Constraints, and Carry Logic Overview Information for Mentor Customers Schematic S
Attributes,
Constraints,
and Carry Logic
Overview
Information for Mentor
Customers
Schematic Syntax
UCF/NCF File Syntax
Attributes/Logical
Constraints
Placement Constraints
Relative Location (RLOC)
Constraints
Timing Constraints
Physical Constraints
Relationally Placed Macros
(RPM)
Carry Logic in XC ...
Java书籍 IBM MQ  Introduction and overview This chapter describes the scope of this book and int
IBM MQ
 Introduction and overview
This chapter describes the scope of this book and introduces WebSphere
Business Integration Message Broker, WebSphere Business Integration Event
Broker, and their main components.
其他书籍 In this paper, we provide an overview of the security concerns introduced by wireless LANs, current
In this paper, we provide an overview of the security concerns introduced by wireless LANs, current approaches to wireless LAN security, their limitations, and the weaknesses of various “band aid” security solutions. We conclude by describing how the ReefEdge Connect System provides a comprehensiv ...
文件格式 In this article, we present an overview of methods for sequential simulation from posterior distribu
In this article, we present an overview of methods for sequential simulation from posterior distributions.
These methods are of particular interest in Bayesian filtering for discrete time dynamic models
that are typically nonlinear and non-Gaussian. A general importance sampling framework is develop ...
通讯编程文档 AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO REDUCTION TECHNIQUES FOR MULTICARRIER TRANSMISSION
AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO REDUCTION TECHNIQUES FOR MULTICARRIER TRANSMISSION
行业发展研究 This thesis presents a comprehensive overview of the problem of facial recognition. A survey of avai
This thesis presents a comprehensive overview of the problem of facial recognition. A survey of available facial detection algorithms as well as implementation and tests of di铿€erent feature extraction and dimensionality reduction methods and light normalization methods are presented.
通讯编程文档 This paper presents an overview of mobile WiMAX technology and discusses the key role of spectrum a
This paper presents an overview of mobile WiMAX technology
and discusses the key role of spectrum analysis for ensuring reliable
systems’ operation and deployment
技术资料 COFDM高清数字无线图传开发套件Overview
基于ADI AD9361/AD9363的COFDM高清数字无线图传开发套件介绍
其他 In this report we provide an overview of several closely related methods developed during the last
In this report
we provide an overview of several closely related methods developed during the last few yers, to smooth, denoise,
edit, compress, transmit, and animate very large polygonal models.