搜索结果
找到约 328 项符合
USERS 的查询结果
按分类筛选
- 全部分类
- 技术资料 (48)
- 书籍 (41)
- 其他书籍 (24)
- Linux/Unix编程 (18)
- Java编程 (14)
- 其他 (12)
- 单片机开发 (11)
- 电子书籍 (10)
- 网络 (9)
- 单片机编程 (7)
- Delphi控件源码 (7)
- matlab例程 (6)
- 软件工程 (5)
- 可编程逻辑 (5)
- 软件设计/软件工程 (5)
- 行业发展研究 (5)
- 源码 (4)
- 模拟电子 (4)
- 教程资料 (4)
- Internet/网络编程 (4)
- 其他 (3)
- 电源技术 (3)
- 压缩解压 (3)
- 嵌入式/单片机编程 (3)
- 人工智能/神经网络 (3)
- 系统设计方案 (3)
- VC书籍 (3)
- 笔记 (2)
- 无线通信 (2)
- 数值算法/人工智能 (2)
- 加密解密 (2)
- 通讯/手机编程 (2)
- 驱动编程 (2)
- 教育系统应用 (2)
- 串口编程 (2)
- 技术管理 (2)
- 文章/文档 (2)
- 微处理器开发 (2)
- Jsp/Servlet (2)
- 软件 (1)
- 手册 (1)
- 经验 (1)
- 习题答案 (1)
- 开发板 (1)
- PCB相关 (1)
- C/C++语言编程 (1)
- DSP编程 (1)
- 驱动程序 (1)
- 仿真技术 (1)
- 操作系统开发 (1)
- 书籍源码 (1)
- 测试测量 (1)
- Matlab (1)
- 教程资料 (1)
- 手机短信编程 (1)
- Modem编程 (1)
- 游戏 (1)
- 编译器/解释器 (1)
- *行业应用 (1)
- 金融证券系统 (1)
- 数学计算 (1)
- 汇编语言 (1)
- 通讯编程文档 (1)
- 嵌入式Linux (1)
- 数据结构 (1)
- Java书籍 (1)
- BREW编程 (1)
- VxWorks (1)
- VHDL/FPGA/Verilog (1)
- 家庭/个人应用 (1)
- 其他行业 (1)
- Windows CE (1)
- Oracle数据库 (1)
- 其他嵌入式/单片机内容 (1)
- SQL Server (1)
- 电子政务应用 (1)
- GPS编程 (1)
- 软件测试 (1)
- VIP专区 (1)
其他书籍 Learn to model various modern communication systems with this book from one of the world s leading a
Learn to model various modern communication systems with this book from one of the world s leading authors in communications, John G. Proakis. A very helpful reference to MATLAB users of various levels
其他 Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted computing"
initiatives propose to solve some of today s security problems through hardware changes
to the personal computer. ...
Linux/Unix编程 An easy, yet highly-configurable iptables-based firewall solution designed for everybody from home u
An easy, yet highly-configurable iptables-based firewall solution designed for everybody from home users to network admins. Functionality for IPv6, tunneling, IPSec, and advanced routing is planned.
书籍 The 3G IP Multimedia Subsystem (IMS)
When 3GPP started standardizing the IMS a few years ago, most analysts expected the
number of IMS deploymentsto grow dramatically as soon the initial IMS specifications were
ready (3GPP Release 5 was functionallyfrozenin the first half of 2002and completedshortly
after that). While those predictions ...
技术资料 03 calgary PhD Development of an Ionosphere Monitoring Technique Using GPS Measurements for High Lat
资料->【E】光盘论文->【E1】斯坦福博士论文->03 calgary PhD Development of an Ionosphere Monitoring Technique Using GPS Measurements for High Latitude GPS Users.pdf
VC书籍 有效使用STL迭代器ITERATOR的三条基本原则
有效使用STL迭代器ITERATOR的三条基本原则,是C/C++ Users Journal摘录的Effective STL的三个独立条款
Linux/Unix编程 This book was written to provide a single reference for network administration in a Linux environmen
This book was written to provide a single reference for network administration in a Linux environment.
Beginners and experienced users alike should find the information they need to cover nearly all important
administration activities required to manage a Linux network configuration.
Linux/Unix编程 Hammerhead2 is a stress testing tool designed to test out your web server and web site. It can init
Hammerhead2 is a stress testing tool designed to test out
your web server and web site. It can initiate multiple
connections from IP aliases and simulated numerous (256+)
users at any given time
网络 In the next generation of wireless communication systems, there will be a need for the rapid deploy
In the next generation of wireless communication systems, there will be a need for the rapid
deployment of independent mobile users. Significant examples include establishing survivable, efficient,
dynamic communication for emergency operations, disaster relief efforts, and military networks. Such
n ...
书籍 Opportunistic+Spectrum+Sharing
Rapid growth of wireless communication services in recent decades has created
a huge demand of radio spectrum. Spectrum scarcity and utilization inefficiency
limit the development of wireless networks. Cognitive radio is a promising tech-
nology that allows secondary users to reuse the underutilized ...