搜索结果
找到约 108 项符合
published 的查询结果
按分类筛选
- 全部分类
- 书籍 (20)
- 其他书籍 (11)
- Linux/Unix编程 (6)
- 其他行业 (6)
- matlab例程 (5)
- VC书籍 (5)
- 嵌入式/单片机编程 (4)
- Java编程 (4)
- Java书籍 (3)
- 电子书籍 (3)
- 软件设计/软件工程 (3)
- Internet/网络编程 (3)
- 系统设计方案 (3)
- 压缩解压 (2)
- 单片机开发 (2)
- 编辑器/阅读器 (2)
- 加密解密 (2)
- 技术资料 (2)
- 模拟电子 (1)
- 电源技术 (1)
- 教程资料 (1)
- 传感与控制 (1)
- 可编程逻辑 (1)
- 游戏 (1)
- 文章/文档 (1)
- 微处理器开发 (1)
- 通讯编程文档 (1)
- 书籍源码 (1)
- 编译器/解释器 (1)
- 嵌入式Linux (1)
- 通讯/手机编程 (1)
- 驱动编程 (1)
- 人工智能/神经网络 (1)
- 其他 (1)
- 语音压缩 (1)
- 软件工程 (1)
- USB编程 (1)
- Symbian (1)
- Delphi控件源码 (1)
- 源码 (1)
单片机开发 These Release Notes describe the functionality of the AudioCodes’ TrunkPack Series Boards and Digit
These Release Notes describe the functionality of the AudioCodes’ TrunkPack Series Boards
and Digital Media Gateways supported by Software Release 4.8. Information contained in this
document is believed to be accurate and reliable at the time of printing. However, due to
ongoing product improvement ...
嵌入式/单片机编程 David Vernon is the Coordinator of the European Network for the Advancement of Artificial Cognitive
David Vernon is the Coordinator of the European Network for the Advancement of Artificial Cognitive Systems and he is a Visiting Professor of Cognitive Systems at the University of Genoa. He is also a member of the management team of the RobotCub integrated working on the development of open-source ...
Delphi控件源码 刚开始准备参考一个IP输入控件来编写
刚开始准备参考一个IP输入控件来编写,感觉有点复杂,因为它是从TWinControl继承的。我的控件还不需要那么复杂,刚开始准备从TEdit来继承,不过看了一下TEdit的源代码,就是把TCustomEdit的所有属性published,没有其它的操作。于是我也决定从TCustomEdit继承。 ...
其他书籍 This book has existed (in one form or another) since the first edition of C# and the .NET Platform
This book has existed (in one form or another) since the first edition of C# and the .NET Platform
was published in conjunction with the release of .NET 1.0 Beta 2, circa the summer of 2001. Since
that point, I have been extremely happy and grateful to see that this text was very well received by
th ...
Java编程 Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
源码 计算声学响度
Computation of loudness (Zwicker model) according to ISO 532B / DIN 45631 norms. 
This model is valid for steady sounds.
Code based on BASIC program published in the following article:
Program for calculating loudness according to DIN 45 631 (ISO 532B)",
E.Zwicker and H.Fastl, J.A.S.J (E) 12, 1 ...
书籍 virtual decomposition control
obot control, a subject aimed at making robots behave as desired, has been
extensively developed for more than two decades. Among many books being
published on this subject, a common feature is to treat a robot as a single
system that is to be controlled by a variety of control algorithms depending ...
书籍 Microwave+Radiometer+Systems
Two important microwave remote sensors are the radar and the radiometer.
There have been a number of books written on various aspects of radar, but
there have been only a few written on microwave radiometers, especially on sub-
jects of how to design and build radiometer systems. This book, which is ...
书籍 Microwave+Radiometer+Systems Design and Analysis
Two important microwave remote sensors are the radar and the radiometer.
There have been a number of books written on various aspects of radar, but
there have been only a few written on microwave radiometers, especially on sub-
jects of how to design and build radiometer systems. This book, which is ...
书籍 EPC and 4G Packet Networks
The telecommunications industry is undoubtedly in a period of radical change with
the advent of mobile broadband radio access and the rapid convergence of Internet
and mobile services. Some of these changes have been enabled by a fundamental
shift in the underlying technologies; mobile networks are ...