搜索结果
找到约 812 项符合
information 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (97)
- 书籍 (70)
- Java编程 (43)
- 其他 (36)
- 单片机编程 (26)
- 电子书籍 (26)
- 单片机开发 (26)
- matlab例程 (22)
- 软件设计/软件工程 (22)
- 技术资料 (22)
- 文章/文档 (21)
- 行业发展研究 (19)
- VC书籍 (17)
- 通讯/手机编程 (17)
- 通讯编程文档 (16)
- 软件工程 (14)
- Linux/Unix编程 (14)
- 可编程逻辑 (12)
- 书籍源码 (12)
- 文件格式 (12)
- Java书籍 (11)
- 教程资料 (10)
- Internet/网络编程 (10)
- SQL Server (9)
- 微处理器开发 (9)
- 系统设计方案 (8)
- 其他嵌入式/单片机内容 (8)
- Delphi控件源码 (8)
- 嵌入式/单片机编程 (8)
- 网络 (7)
- 加密解密 (7)
- 驱动编程 (7)
- 企业管理 (6)
- 操作系统开发 (6)
- 汇编语言 (6)
- *行业应用 (6)
- 无线通信 (5)
- Jsp/Servlet (5)
- 模拟电子 (4)
- 压缩解压 (4)
- 嵌入式Linux (4)
- 人工智能/神经网络 (4)
- J2ME (4)
- 技术管理 (4)
- 数值算法/人工智能 (4)
- VxWorks (4)
- PCB相关 (3)
- DSP编程 (3)
- 接口技术 (3)
- 编译器/解释器 (3)
- RFID编程 (3)
- 教育系统应用 (3)
- 其他数据库 (3)
- 游戏 (3)
- VHDL/FPGA/Verilog (3)
- 编辑器/阅读器 (3)
- 3G开发 (3)
- 其他行业 (3)
- Windows Mobile (3)
- SCSI/ASPI (3)
- C/C++语言编程 (3)
- 源码 (3)
- 论文 (3)
- 学术论文 (2)
- 电源技术 (2)
- 通信网络 (2)
- 嵌入式综合 (2)
- 测试测量 (2)
- 磁盘编程 (2)
- 数学计算 (2)
- 数据库系统 (2)
- Ajax (2)
- MacOS编程 (2)
- 家庭/个人应用 (2)
- JavaScript (2)
- 存储器技术 (2)
- uCOS编程 (1)
- 技术教程 (1)
- 多媒体处理 (1)
- 传感与控制 (1)
- 技术书籍 (1)
- Symbian (1)
- TAPI编程 (1)
- 医药行业 (1)
- Windows CE (1)
- MTK (1)
- 金融证券系统 (1)
- 数据结构 (1)
- 人物传记/成功经验 (1)
- USB编程 (1)
- 百货/超市行业 (1)
- 软件测试 (1)
- 资料/手册 (1)
- 源码/资料 (1)
- 工业控制 (1)
- 其他文档 (1)
- CCS (1)
- 教程 (1)
- 其他 (1)
matlab例程 the text file QMLE contains the quasi maximum likelyhood estimating procedure and performing Infor
the text file QMLE contains the quasi maximum
likelyhood estimating procedure and performing Information Matrix test
for a univariate GARCH(1,1) model
其他 This approach addresses two difficulties simultaneously: 1) the range limitation of mobile robot se
This approach addresses two difficulties simultaneously: 1)
the range limitation of mobile robot sensors and 2) the difficulty of detecting buildings in
monocular aerial images. With the suggested method building outlines can be detected
faster than the mobile robot can explore the area by itself, g ...
matlab例程 PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A componen
PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficients: c_j=mean(b_j)/std ...
其他行业 There are several problems related to the properties of the triangular mesh representation that des
There are several problems related to the properties of
the triangular mesh representation that describes a
surface of an object. Sometimes, the surface is represented
just as a set of triangles without any other
information and the STL file format, which is used for
data exchanges, is a typicalexam ...
软件设计/软件工程 浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf
浅谈VB.NET的密码算法及其在信息安全中的应用
Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity
,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程 ...
教育系统应用 MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统 =======================================================
MICROSOFT FOUNDATION CLASS LIBRARY : 学生管理系统
========================================================================
AppWizard has created this 学生管理系统 application for you. This application
not only demonstrates the basics of using the Microsoft Foundation classes
but is also a starting ...
电子书籍 BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that th
BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse:
Get the most out of the built-in applications
Take control of em ...
其他书籍 The System Management BIOS Reference Specification addresses how motherboard and system vendors pres
The System Management BIOS Reference Specification addresses how motherboard and system vendors present
management information about their products in a standard format by extending the BIOS interface on Intel
architecture systems. The information is intended to allow generic instrumentation to deli ...
其他 Please read this document before attempting to compile and run the libraries and applications! The p
Please read this document before attempting to compile and run the libraries and applications! The projects
must be compiled in a particular order. Standard support questions are about compiler and/or linker errors
that are generated when users try to compile the projects in the wrong order. Other i ...
加密解密 加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encr
加密算法实现
Pegwit is a program for performing public key file encryption
and authentication.
Encryption means that pegwit allows you to keep the information
in files you send by email (or other means) confidential.
Eavesdroppers will not be able to read the email.
Authentication allows you to c ...