搜索结果
找到约 1,987 项符合
asm-all 的查询结果
通讯/手机编程 this file Viterbi_Hard_decision.rar has corder,decorder,noise,have all chinese explain you can easy
this file Viterbi_Hard_decision.rar has corder,decorder,noise,have all chinese explain you can easy understand function
串口编程 AVR USART串口使用的一个范例 编译器:GCC 工具: C && ASM 芯片:ATMEL的ATMEGA系列
AVR USART串口使用的一个范例
编译器:GCC
工具: C && ASM
芯片:ATMEL的ATMEGA系列
其他书籍 This text introduces the spirit and theory of hacking as well as the science behind it all it also p
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大 ...
汇编语言 这个PH10有双接口的ASM程序
这个PH10有双接口的ASM程序,P3。0是第二个时钟,先接在多余的245脚上,然后引到板上就能显示完整的字了
Java编程 JDiff is a Javadoc doclet which generates an HTML report of all the packages, classes, constructors,
JDiff is a Javadoc doclet which generates an HTML report of all the packages, classes, constructors, methods, and fields which have been removed, added or changed in any way, including their documentation, when two APIs are compared. This is very useful for describing exactly what has changed betwee ...
DSP编程 2005 Center for Biological & Computational Learning at MIT and MIT All rights reserved. Permissio
2005
Center for Biological & Computational Learning at MIT and MIT
All rights reserved.
Permission to copy and modify this data, software, and its documentation only
for internal research use in your organization is hereby granted, provided
that this notice is retained thereon and on all copies. Th ...
单片机开发 此是本人调试成功的用ASm汇编写的 IIC EEPROM 的程序
此是本人调试成功的用ASm汇编写的 IIC EEPROM 的程序,不会的可以借鉴一下。
汇编语言 运行于80C196上的浮点运算程序asm
运行于80C196上的浮点运算程序asm
其他 rINTCON=0x5 //Non-vectored,IRQ enable,FIQ disable rINTMOD=0x0 //All=IRQ mode
rINTCON=0x5 //Non-vectored,IRQ enable,FIQ disable
rINTMOD=0x0 //All=IRQ mode
其他 Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi
Intrusion Detection:Host-based Network
Intrusion Detection
• At each host, monitor all incoming and
outgoing network traffic – for each packet:
– Analyze 4-tuple and protocol
– Examine contents