搜索结果
找到约 680 项符合
second-Level 的查询结果
软件工程 This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only b
This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of tech ...
软件设计/软件工程 ImpulseC Codeveloper fft code. This file implements the hardware portion of a 256 sample FFT using a
ImpulseC Codeveloper fft code. This file implements the hardware portion of a 256 sample FFT using a radix-4 algorithm. This implementation demonstrates that results similar to hand-coded HDL can be achieved
using the C language, and without using a low-level style of C code.
Linux/Unix编程 linux book, this book is about linux programing. i hope it will help you. i am glad to share my fil
linux book, this book is about linux programing. i hope it will help you. i am glad to share my files. thanks :) Moving to Linux Second Edition
电子书籍 The code for this article was written for version 1.0 of the Active Template Library (ATL). The cu
The code for this article was written for version 1.0 of the
Active Template Library (ATL). The current version of the code
(in SieveATL) was built with Visual C++ 6.0 and the ATL provided
with that compiler. It may be slightly different than the code
shown in the article.
The directory SieveMF ...
单片机开发 This software is developed to provide ease with controller design. For PID control, options are give
This software is developed to provide ease with controller design. For PID control, options are given
to design and analyse the compensated and uncompensated system. You are free to choice among Proportional
PI, PD and PID mode of control. Both frequency and time domain characteristics can be ob ...
能源行业(电力石油煤炭) Those who are working on power system optimisatio, for them here is all the load flow programs from
Those who are working on power system optimisatio, for them here is all the load flow programs from book hadi sadat. It i the 1st part.
Second part is also uploaded in this site by me
其他书籍 When trying to extract information from SAR images, we need to distinguish two types of image prope
When trying to extract information from SAR images, we need to distinguish
two types of image property. The more important is where properties of the
scene (e.g., its dielectric constant, its geometry, its motion, etc.) produce effects
in the image measurements or examination of the image then can ...
J2ME simple clock display clock Dimensions,Draw the circle and numbers,Formats the date ,Font for number
simple clock
display clock Dimensions,Draw the circle and numbers,Formats the date ,Font for number ,Color of main hands and dial,Color of second hand and numbers
加密解密 The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfi ...
VHDL/FPGA/Verilog This short paper will give you some VHDL code examples that will help you design synchronous circuit
This short paper will give you some VHDL code examples that will help you design synchronous circuits that work first time.The philosophy behind Ten-Commandment code is that synthesizers are not to be trusted too much. Most of the code you will see is close to the structural level some more overtly ...