搜索结果

找到约 788 项符合 Some 的查询结果

按分类筛选

显示更多分类

嵌入式/单片机编程 The major functionality added in this release includes: - Rootless mode in X11 - Widget Templt

The major functionality added in this release includes: - Rootless mode in X11 - Widget Templtes [both compiled and XML] As always, this isn t meant to be a stable release, it is only provided so people can more easily experiment with PicoGUI and possibly help in its development. Some of the ...
https://www.eeworm.com/dl/647/414969.html
下载: 34
查看: 1076

RFID编程 RFID is an area of automatic identi&#64257 cation that is gaining momentum and is considered by som

RFID is an area of automatic identi&#64257 cation that is gaining momentum and is considered by some to emerge as one of the most pervasive computing technologies in history. In its simplest form, RFID is a similar concept to bar coding. It is seen as a means of enhancing data processes and is compl ...
https://www.eeworm.com/dl/697/417025.html
下载: 160
查看: 1063

matlab例程 Introduction Matlab is an ideal tool for simulating digital communications systems, thanks to its

Introduction Matlab is an ideal tool for simulating digital communications systems, thanks to its easy scripting language and excellent data visualization capabilities. One of the most frequent simulation tasks in the field of digital communications is bit-error- rate testing of modems. The bit-erro ...
https://www.eeworm.com/dl/665/417356.html
下载: 191
查看: 1059

软件工程 Written by Microsoft software legend Juval Lowy, Programming WCF Services is the authoritative intro

Written by Microsoft software legend Juval Lowy, Programming WCF Services is the authoritative introduction to Microsoft s new, and some say revolutionary, unified platform for developing service-oriented applications [SOA] on Windows. Relentlessly practical, the book delivers insight, not documenta ...
https://www.eeworm.com/dl/540/417529.html
下载: 104
查看: 1031

软件设计/软件工程 This book manage to show you how you can methodically apply different techniques to your own algor

This book manage to show you how you can methodically apply different techniques to your own algorithms to make them more efficient. While this book mostly highlights general techniques, some well-known algorithms are also looked at in depth.
https://www.eeworm.com/dl/684/418212.html
下载: 164
查看: 1046

其他书籍 .NET Remoting is very important in distributed environments. This book essentially deals with the co

.NET Remoting is very important in distributed environments. This book essentially deals with the core concepts of .NET remoting along with some working examples. A must read.
https://www.eeworm.com/dl/542/418241.html
下载: 134
查看: 1053

文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
https://www.eeworm.com/dl/652/421399.html
下载: 42
查看: 1073

Java编程 In the bank all the activities are being done manually .As the bank widens its services & it finds d

In the bank all the activities are being done manually .As the bank widens its services & it finds difficult to manage its operations manually and hence this leads to the automation of some of its operations. Banking Information system is a windows based applications. This project mainly deal ...
https://www.eeworm.com/dl/633/422493.html
下载: 105
查看: 1024

行业发展研究 The double-density DWT is an improvement upon the critically sampled DWT with important additional p

The double-density DWT is an improvement upon the critically sampled DWT with important additional properties: (1) It employs one scaling function and two distinct wavelets, which are designed to be offset from one another by one half, (2) The double-density DWT is overcomplete by a factor of two, a ...
https://www.eeworm.com/dl/692/422786.html
下载: 37
查看: 1058

Delphi控件源码 Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite

Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite handy with INI files which you can use to get and set data for you applications. You can also check out some dates related to passwords and expiry dates. Send emails using Microsoft Email client. No n ...
https://www.eeworm.com/dl/666/423252.html
下载: 101
查看: 1050