搜索结果
找到约 650 项符合
Set 的查询结果
按分类筛选
- 全部分类
- Java编程 (37)
- matlab例程 (36)
- 其他 (35)
- 单片机开发 (34)
- 技术资料 (31)
- 其他书籍 (30)
- 单片机编程 (24)
- Linux/Unix编程 (19)
- 电子书籍 (18)
- 书籍 (18)
- 人工智能/神经网络 (17)
- 数值算法/人工智能 (17)
- Delphi控件源码 (16)
- 微处理器开发 (13)
- 数学计算 (13)
- 通讯编程文档 (12)
- 数据结构 (11)
- VHDL/FPGA/Verilog (11)
- 通讯/手机编程 (10)
- 书籍源码 (9)
- Java书籍 (9)
- 软件设计/软件工程 (9)
- 嵌入式/单片机编程 (8)
- 其他行业 (8)
- 文章/文档 (8)
- 汇编语言 (8)
- 网络 (7)
- VC书籍 (7)
- 系统设计方案 (7)
- 加密解密 (6)
- *行业应用 (6)
- 技术管理 (6)
- 嵌入式Linux (6)
- 文件格式 (6)
- 电源技术 (5)
- 可编程逻辑 (5)
- 压缩解压 (5)
- 数据库系统 (5)
- 行业发展研究 (5)
- 模拟电子 (4)
- J2ME (4)
- 驱动编程 (4)
- VIP专区 (4)
- Internet/网络编程 (3)
- uCOS (3)
- DSP编程 (3)
- SCSI/ASPI (3)
- 游戏 (3)
- 邮电通讯系统 (3)
- SQL Server (3)
- USB编程 (3)
- 其他嵌入式/单片机内容 (3)
- Windows CE (3)
- 手机短信编程 (3)
- 技术书籍 (3)
- 行业应用文档 (3)
- Jsp/Servlet (3)
- 源码 (3)
- 通信网络 (2)
- 嵌入式综合 (2)
- C/C++语言编程 (2)
- 工控技术 (2)
- 并口编程 (2)
- 其他数据库 (2)
- GPS编程 (2)
- Applet (2)
- STL (2)
- 软件工程 (2)
- 家庭/个人应用 (2)
- 笔记 (2)
- 学术论文 (1)
- 教程资料 (1)
- 教程资料 (1)
- 传感与控制 (1)
- 开关电源 (1)
- 开发工具 (1)
- 测试测量 (1)
- 设计相关 (1)
- TAPI编程 (1)
- 串口编程 (1)
- 编译器/解释器 (1)
- 中间件编程 (1)
- VxWorks (1)
- 金融证券系统 (1)
- 教育系统应用 (1)
- JavaScript (1)
- Windows Mobile (1)
- 人物传记/成功经验 (1)
- 并行计算 (1)
- 电子政务应用 (1)
- MySQL数据库 (1)
- 多国语言处理 (1)
- 3G开发 (1)
- 接口技术 (1)
- Windows编程 (1)
- Linux/uClinux/Unix编程 (1)
- 行业应用 (1)
- 手册 (1)
其他 The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmwa
The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for
firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The
W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the
contents of t ...
其他 最小生成树 MST的四种算法实现。 包括普通的Kruskal算法和Prim算法
最小生成树 MST的四种算法实现。
包括普通的Kruskal算法和Prim算法,用Disjoint-Set优化的Kruskal算法和用Heap优化的堆算法。
复杂度分别为O(mn), O(n^2), O(m log n), O(m log n)
其他书籍 Learn how to: * Tokenize a null-terminated string * Create a search and re
Learn how to:
*
Tokenize a null-terminated string
*
Create a search and replace function for strings
*
Implement subtraction for string objects
* Use the vector, deque, and list sequence containers
*
Use the container adaptors stack, queue, and priority_q ...
其他书籍 Want to try a copy of Linux 2.6.29-rc5 in progess with Angstom and Opie? Opie probably isn t good fo
Want to try a copy of Linux 2.6.29-rc5 in progess with Angstom and Opie? Opie probably isn t good for much but testing but it is kind of fun. This has a very slow boot, which is much improved since this NAND image was made.
NAND image of Linux 2.6.9-rc5 with Angstrom and Opie for test.
Download fi ...
数值算法/人工智能 This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian
This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian grids and the staggered arrangement of variables. Variables are stored as 2D arrays. SIMPLE method is used for pressure calculation. UDS and CDS are implemented for the discretization of convective te ...
文章/文档 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
行业发展研究 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
系统设计方案 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
文件格式 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
人物传记/成功经验 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.