搜索结果

找到约 417 项符合 each 的查询结果

按分类筛选

显示更多分类

软件工程 Design patterns are elegant, adaptable, and reusable solutions to everyday software development prob

Design patterns are elegant, adaptable, and reusable solutions to everyday software development problems. Programmers use design patterns to organize objects in programs, making them easier to write and modify. C# Design Patterns: A Tutorial is a practical guide to writing C# programs using the most ...
https://www.eeworm.com/dl/540/376264.html
下载: 81
查看: 1081

游戏 Press (~,Ctrl, and Alt) to bring up the game console during play and enter the following codes to ac

Press (~,Ctrl, and Alt) to bring up the game console during play and enter the following codes to activate them. Make sure you press "Enter" after you type each code in!
https://www.eeworm.com/dl/625/376275.html
下载: 89
查看: 1077

Java编程 文件说明java模式

文件说明java模式,The CustomerFacade class offers a higher level business service in the form of the saveCustomerData method. Instead of interacting with each of the subsystem components directly, the client AccountManager can make use of the higher level, more simplified interface offered by the Cu ...
https://www.eeworm.com/dl/633/377109.html
下载: 99
查看: 1019

Java编程 本人大二学习汇编语言程序设计时的全部源代码

本人大二学习汇编语言程序设计时的全部源代码,均已经编译通过生成可执行文件,每个目录是一个程序。希望对学习汇编语言的同志有所帮助。-my sophomore year learning assembly language programming at all the source code, have already generated by compiler executable files, each directory is a process. Want to ...
https://www.eeworm.com/dl/633/380528.html
下载: 129
查看: 1026

电子书籍 "The GRAPHICS GEMS Series" was started in 1990 by Andrew Glassner. The vision and purpose of the Ser

"The GRAPHICS GEMS Series" was started in 1990 by Andrew Glassner. The vision and purpose of the Series was - and still is - to provide tips, techniques, and algorithms for graphics programmers. All of the gems are written by programmers who work in the field and are motivated by a common desire to ...
https://www.eeworm.com/dl/cadence/ebook/380621.html
下载: 123
查看: 1048

微处理器开发 The AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I haven t

The AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I haven t tested other versions of GCC, but they should compile without too much difficulty. * The source files for the AVRcam had the author name and copyright information added back into them after the judgin ...
https://www.eeworm.com/dl/655/385533.html
下载: 92
查看: 1091

单片机开发 CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data o

CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 ...
https://www.eeworm.com/dl/648/391753.html
下载: 95
查看: 1066

通讯/手机编程 if an application works with restricted low level system calls, it must obtain a Microsoft Mobile2Ma

if an application works with restricted low level system calls, it must obtain a Microsoft Mobile2Market privileged signature. To get a privileged signature, logo certification is now a requirement, not an option! This article shows how to abstract some of the most common issues a developer will enc ...
https://www.eeworm.com/dl/527/392590.html
下载: 89
查看: 1054

Java书籍 Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Referenc

Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. Within each chapter file, the listings are store ...
https://www.eeworm.com/dl/656/394081.html
下载: 95
查看: 1053

其他书籍 The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some no

The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some nodes of a complete binary tree of height h (the code tree) to n simultaneous connections, such that no two assigned nodes (codes) are on the same root-to-leaf path. Each connection requires a code on a ...
https://www.eeworm.com/dl/542/396313.html
下载: 194
查看: 1049