搜索结果
找到约 2,211 项符合
Use 的查询结果
按分类筛选
- 全部分类
- 技术资料 (350)
- 单片机开发 (125)
- 其他 (113)
- 其他书籍 (113)
- Java编程 (104)
- 书籍 (86)
- matlab例程 (69)
- Linux/Unix编程 (58)
- VC书籍 (48)
- 软件设计/软件工程 (46)
- 单片机编程 (45)
- VHDL/FPGA/Verilog (45)
- 微处理器开发 (44)
- 汇编语言 (42)
- Delphi控件源码 (42)
- 加密解密 (40)
- Java书籍 (34)
- 电子书籍 (33)
- 人工智能/神经网络 (33)
- 嵌入式/单片机编程 (32)
- 压缩解压 (26)
- 其他嵌入式/单片机内容 (26)
- 电源技术 (25)
- 数学计算 (24)
- 通讯编程文档 (24)
- 系统设计方案 (24)
- 通讯/手机编程 (20)
- 软件工程 (19)
- 可编程逻辑 (19)
- 编译器/解释器 (18)
- 驱动编程 (17)
- Internet/网络编程 (17)
- 数值算法/人工智能 (16)
- 书籍源码 (16)
- Windows CE (16)
- 网络 (15)
- 文章/文档 (15)
- DSP编程 (14)
- 模拟电子 (14)
- 教程资料 (13)
- 游戏 (13)
- VIP专区 (13)
- 其他行业 (12)
- 嵌入式Linux (11)
- 数据结构 (11)
- Windows Mobile (10)
- SQL Server (10)
- 操作系统开发 (9)
- 文件格式 (9)
- uCOS (9)
- 行业发展研究 (9)
- Jsp/Servlet (9)
- USB编程 (8)
- J2ME (8)
- JavaScript (8)
- 嵌入式综合 (7)
- 其他数据库 (7)
- 无线通信 (6)
- 串口编程 (6)
- 技术管理 (6)
- MySQL数据库 (6)
- 多媒体处理 (5)
- FlashMX/Flex源码 (5)
- VxWorks (5)
- 技术书籍 (4)
- 手机短信编程 (4)
- 磁盘编程 (4)
- *行业应用 (4)
- Applet (4)
- Delphi/CppBuilder (4)
- 邮电通讯系统 (4)
- GPS编程 (4)
- MacOS编程 (4)
- 源码 (3)
- PCB相关 (3)
- 开关电源 (3)
- 数据库系统 (3)
- 其他文档 (3)
- Modem编程 (3)
- 金融证券系统 (3)
- 中间件编程 (3)
- 并行计算 (3)
- 人物传记/成功经验 (3)
- RFID编程 (3)
- 笔记 (2)
- C/C++语言编程 (2)
- 仿真技术 (2)
- 技术教程 (2)
- 开发工具 (2)
- 实用工具 (2)
- 通信网络 (2)
- allegro (2)
- 教育系统应用 (2)
- 企业管理 (2)
- 多国语言处理 (2)
- CA认证 (2)
- 家庭/个人应用 (2)
- Symbian (2)
- Oracle数据库 (2)
- 3G开发 (2)
其他 his paper provides a tutorial and survey of methods for parameterizing surfaces with a view to appl
his paper provides a tutorial and survey of methods for parameterizing
surfaces with a view to applications in geometric modelling and computer graphics.
We gather various concepts from di&reg erential geometry which are relevant to surface
mapping and use them to understand the strengths and weakne ...
微处理器开发 Hey. This some pid code for the atmega88 that I once used to control a heater. It s purpose is pre
Hey. This some pid code for the atmega88 that I once used to control a heater. It s purpose
is pretty specific, and I only wrote it to work on the mega88, so the code itself won t be too useful. It is
a good place to start if you re trying to use or figure out pid though.
驱动编程 This the fourth edition of the Writing Device Drivers articles. This article will introduce the idea
This the fourth edition of the Writing Device Drivers articles. This article will introduce the idea of device stacks and how devices interact with each other. We will use the previously created example device driver to demonstrate this topic. To do this we will introduce the idea of a “filter” dr ...
数据结构 我用C编写的汉诺塔算法的源程序
我用C编写的汉诺塔算法的源程序,自认为写的不错,呵呵- I use the Chinese which C compiles to promise the tower algorithm the source program, confessed for writes is good, ha-ha ,C-C++,控制台编程/Console
书籍源码 This source code has been tested under OpenWindows 2.0, Sun s X11/NeWS server. For Xlib programs th
This source code has been tested under OpenWindows 2.0, Sun s X11/NeWS
server. For Xlib programs that use KeyPress events you should either
(1) set the FocusLenience resource to `True , or (2) specifically notify
the window manager that you want to receive KeyPress/KeyRelease events
(but only in pro ...
Java书籍 SSD3: Object-Oriented Programming and Design Introduction This course introduces students to prob
SSD3: Object-Oriented Programming and Design
Introduction
This course introduces students to problem solving by means of object-oriented design and implementation. Emphasis is on problem analysis and solution design, documentation and implementation. Students use commercial software libraries, and ...
数学计算 非线性有限元程序
非线性有限元程序,NONSAP is a general finite element program for the nonlinear static and dynamic analysis of complex structures. The program is very flexible and was designed to be extended and modified by the user. In particular the program can easily be modified to use a different formulation of ...
其他 The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: , in zip file under C:
The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: \, in zip file under C:\WINNT , C:\WINNT\system32 , these three catalogues ,. The worm will falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically, the worm will open th ...
加密解密 a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asym ...
仿真技术 fft analysis
Use fft to analyse signal by
plotting the original signal and its spectrum.