搜索结果
找到约 655 项符合
provides 的查询结果
按分类筛选
- 全部分类
- 技术资料 (181)
- 其他书籍 (46)
- 单片机编程 (33)
- 书籍 (26)
- Linux/Unix编程 (25)
- 单片机开发 (15)
- matlab例程 (15)
- 其他 (13)
- 可编程逻辑 (13)
- 电源技术 (12)
- Java编程 (11)
- 人工智能/神经网络 (10)
- 通讯/手机编程 (9)
- 电子书籍 (9)
- 教程资料 (9)
- Java书籍 (9)
- 软件设计/软件工程 (9)
- 数值算法/人工智能 (8)
- 软件工程 (8)
- 驱动编程 (8)
- 数学计算 (8)
- Delphi控件源码 (8)
- VC书籍 (8)
- 模拟电子 (7)
- 压缩解压 (7)
- 嵌入式/单片机编程 (7)
- VHDL/FPGA/Verilog (6)
- 嵌入式综合 (5)
- Internet/网络编程 (5)
- 网络 (5)
- 通讯编程文档 (5)
- 数据结构 (5)
- 系统设计方案 (5)
- 其他嵌入式/单片机内容 (5)
- SQL Server (5)
- 行业发展研究 (5)
- 无线通信 (4)
- DSP编程 (4)
- VxWorks (4)
- 加密解密 (3)
- 汇编语言 (3)
- 微处理器开发 (3)
- Symbian (3)
- GPS编程 (3)
- 源码 (2)
- 行业应用文档 (2)
- 操作系统开发 (2)
- ARM (2)
- 传感与控制 (2)
- 手机短信编程 (2)
- 编译器/解释器 (2)
- 磁盘编程 (2)
- CA认证 (2)
- 技术管理 (2)
- uCOS (2)
- 文章/文档 (2)
- FlashMX/Flex源码 (2)
- 家庭/个人应用 (2)
- 手机彩信(MMS)编程 (2)
- MySQL数据库 (2)
- VIP专区 (2)
- 教程 (1)
- 电路图 (1)
- 论文 (1)
- PCB相关 (1)
- C/C++语言编程 (1)
- Windows编程 (1)
- 技术书籍 (1)
- 资料/手册 (1)
- 开发工具 (1)
- 实用工具 (1)
- Matlab (1)
- 单片机 (1)
- 通信网络 (1)
- 串口编程 (1)
- 编辑器/阅读器 (1)
- 语音压缩 (1)
- SCSI/ASPI (1)
- 金融证券系统 (1)
- 文件格式 (1)
- 其他数据库 (1)
- BREW编程 (1)
- 其他行业 (1)
- 生物技术 (1)
- Windows CE (1)
- 中间件编程 (1)
- 邮电通讯系统 (1)
- 并行计算 (1)
- 认证考试资料 (1)
- 3G开发 (1)
软件设计/软件工程 In this paper, we present LOADED, an algorithm for outlier detection in evolving data sets containi
In this paper, we present LOADED, an algorithm for outlier
detection in evolving data sets containing both continuous
and categorical attributes. LOADED is a tunable algorithm,
wherein one can trade off computation for accuracy so that
domain-specific response times are achieved. Experimental
result ...
文件格式 An optimal neuron evolution algorithm for the restoration of linearly distorted images is presented
An optimal neuron evolution algorithm for the restoration
of linearly distorted images is presented in this paper. The proposed
algorithm is motivated by the symmetric positive-definite quadratic programming
structure inherent in restoration. Theoretical analysis and experimental
results show that t ...
其他书籍 The Ruby Way takes a "how-to" approach to Ruby programming with the bulk of the material consisting
The Ruby Way takes a "how-to" approach to Ruby programming with the bulk of the material consisting of more than 400 examples arranged by topic. Each example answers the question "How do I do this in Ruby?" Working along with the author, you are presented with the task description and a discussion o ...
网络 A Module-based Wireless Node (MW-Node) is a Node with wireless and mobile capabilities added by mean
A Module-based Wireless Node (MW-Node) is a Node with wireless and mobile capabilities added by means of modules. It is not a new node object derived from Node. Rather it is a new layout of mostly existing components. Rationale for this new design has been presented in [1]. The MW-Node provides a fl ...
其他书籍 Builder uses to integrate a larger system module. Each component consists of a structured set of fi
Builder uses to integrate a larger system module. Each component
consists of a structured set of files within a directory.
The files in a component directory serve the following
The RS232 UART Core implements a method for communication of serial data. The core provides
a simple register-mapped Avalo ...
软件工程 Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely
Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques ...
VC书籍 Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely
Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques ...
嵌入式/单片机编程 An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized
An Overview of Smart Card Security.
The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containment of smart card makes it resistant to attack as it d ...
通讯编程文档 as a message came into prominence with the publication in 1948 of an influential paper by Claude Sha
as a message came into prominence with the publication in 1948 of an influential paper by Claude Shannon, "A Mathematical Theory of Communication." This paper provides the foundations of information theory and endows the word information not only with a technical meaning but also a measure. If the s ...
书籍 The+LTE-SAE+Deployment+Handbook
Long-TermEvolution(LTE)isarguablyoneofthemostimportantstepsinthecurrentphaseof
the development of modern mobile communications. It provides a suitable base for enhanced
services due to increased data throughput and lower latency figures, and also gives extra
impetus to the modernization of telecom a ...