搜索:specifies
找到约 31 项符合「specifies」的查询结果
结果 31
按分类筛选
https://www.eeworm.com/dl/542/253843.html
其他书籍
This ECMA Standard specifies the form and establishes the interpretation of programs written in the
This ECMA Standard specifies the form and establishes the interpretation of programs written in the C# programming language. It specifies
The representation of C# programs
The syntax and constraints of the C# language
The semantic rules for interpreting C# programs
The restri ...
https://www.eeworm.com/dl/682/267944.html
中间件编程
csp application specifiescsp app lication specifiescsp app lication specifies
csp application specifiescsp app lication specifiescsp app lication specifies
https://www.eeworm.com/dl/684/432313.html
软件设计/软件工程
This document specifies a subset of the C programming language which is intended to be suitable for
This document specifies a subset of the C programming language which is intended to be suitable
for embedded automotive systems up to and including safety integrity level 3 (as defined in the
MISRA Guidelines). It contains a list of rules concerning the use of the C programming l ...
https://www.eeworm.com/dl/542/476465.html
其他书籍
This document specifies a collection of compiler directives, library routines, and environment vari
This document specifies a collection of compiler directives, library routines, and
environment variables that can be used to specify shared-memory parallelism in C, C++
and Fortran programs. This functionality collectively defines the specification of the
OpenMP Application Progr ...
https://www.eeworm.com/dl/646/237978.html
通讯编程文档
The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the n
The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the network feature Customized Applications for Mobile network Enhanced Logic. CAP is based on a sub-set of the ETSI Core INAP CS-2 as specified by ETSI EN 301 140 1 [26]. Descriptions ...
https://www.eeworm.com/dl/542/440172.html
其他书籍
SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384,
SHA Hash algorithm.
This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA-
512.
https://www.eeworm.com/dl/886706.html
技术资料
Universal Serial Bus(USB) Still Image Capture Device Definition
This document specifies the behavior of USB Still Image Capture Devices. Thedocument was designe
https://www.eeworm.com/dl/912910.html
技术资料
Universal Serial Bus(USB) IrDA Bridge Device Definition
Universal Serial Bus IrDA Bridge Device Definition
This document specifies the behavior o
https://www.eeworm.com/dl/652/269182.html
文章/文档
javascript中文教程 <INPUT TYPE="button" NAME="objectName" VALUE="buttonText" [onClick="hand
javascript中文教程
<INPUT
TYPE="button"
NAME="objectName"
VALUE="buttonText"
[onClick="handlerText"]>
NAME specifies the name of the button object as a property of the enclosing form object and can be accessed using the name property. VALUE specifies the label to display on ...
https://www.eeworm.com/dl/696/292116.html
Jsp/Servlet
an application that finds the smallest of several integers. Assume that the first value read specif
an application that finds the smallest of several integers. Assume that the first value
read specifies the number of values to input from the user