搜索结果
找到约 62 项符合
stored 的查询结果
按分类筛选
- 全部分类
- 数学计算 (5)
- 书籍 (5)
- 其他书籍 (4)
- 单片机编程 (3)
- 数值算法/人工智能 (3)
- Linux/Unix编程 (3)
- C/C++语言编程 (2)
- SQL Server (2)
- Java书籍 (2)
- 软件设计/软件工程 (2)
- 加密解密 (2)
- 单片机开发 (2)
- VC书籍 (2)
- 其他嵌入式/单片机内容 (2)
- 技术资料 (2)
- 电源技术 (1)
- Internet/网络编程 (1)
- Windows Mobile (1)
- 微处理器开发 (1)
- 人工智能/神经网络 (1)
- 电子书籍 (1)
- matlab例程 (1)
- 汇编语言 (1)
- Java编程 (1)
- 通讯/手机编程 (1)
- 系统设计方案 (1)
- 网络 (1)
- 手机短信编程 (1)
- Jsp/Servlet (1)
- 通讯编程文档 (1)
- STL (1)
- 其他数据库 (1)
- VHDL/FPGA/Verilog (1)
- 其他 (1)
- MySQL数据库 (1)
- 论文 (1)
Jsp/Servlet These files contain all of the code listings in Java 2: The Complete Reference The source cod
These files contain all of the code listings in
Java 2: The Complete Reference
The source code is organized into files by chapter.
Within each chapter file, the listings are stored
in the same order as they appear in the book.
Simply edit the appropriate file to extract the
listing in which you a ...
软件设计/软件工程 A class--the basic building block of an object-oriented language such as Java--is a template that de
A class--the basic building block of an object-oriented language such as Java--is a template that describes the data and behavior associated with instances of that class. When you instantiate a class you create an object that looks and feels like other instances of the same class. The data associate ...
VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
通讯编程文档 MPEG-4 标准文档 access to visual objects in natural and synthetic moving pictures and associated natura
MPEG-4 标准文档
access to visual objects in natural and synthetic moving pictures and associated natural or synthetic sound for
various applications such as digital storage media, internet, various forms of wired or wireless communication etc.
The use of ISO/IEC 14496 means that motion video can be ...
数值算法/人工智能 This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian
This program incorporates the FV method for solving the Navier-Stokes equations using 2D, Cartesian grids and the staggered arrangement of variables. Variables are stored as 2D arrays. SIMPLE method is used for pressure calculation. UDS and CDS are implemented for the discretization of convective te ...
其他数据库 If you have ever wanted to store data temporarily in your Delphi Win32/.Net, C++ Builder or Kylix ap
If you have ever wanted to store data temporarily in your Delphi Win32/.Net, C++ Builder or Kylix application, and you at the same time wanted full access to the data as if they were stored in a database table, you have the right solution here. kbmMemTable is a full TDataset compatible in memory tab ...
数学计算 The code performs a number (ITERS) of iterations of the Bailey s 6-step FFT alg
The code performs a number (ITERS) of iterations of the
Bailey s 6-step FFT algorithm (following the ideas in the
CMU Task parallel suite).
1.- Generates an input signal vector (dgen) with size
n=n1xn2 stored in row major order
...
VHDL/FPGA/Verilog RS_latch using vhdl, When using static gates as building blocks, the most fundamental latch is the
RS_latch using vhdl,
When using static gates as building blocks, the most fundamental latch is the simple SR latch, where S and R stand for set and reset. It can be constructed from a pair of cross-coupled NOR (Not OR) logic gates. The stored bit is present on the output marked Q.
Normally, in stor ...
其他 To write data to the FIFO, present the data to be written and assert the write enable. At the next r
To write data to the FIFO, present the data to be written and assert the write enable. At the next rising edge of the clock, the data will be written. For every rising edge of the clock that the write enable is asserted, a piece of data is written into the FIFO.
If the FIFO has data in it, the value ...