搜索结果
找到约 1,093 项符合
teleCommunication Systems 的查询结果
Applet Fingerprint Verification System an easy to use library that allows programmers to integrate fingerp
Fingerprint Verification System an easy to use library that allows programmers to integrate fingerprint technology into their software without specific know-how. Fast, easy to use, and small great for embedded systems.
邮电通讯系统 This is GMS down upper converter and down converter in simulink. you may understand the structure in
This is GMS down upper converter and down converter in simulink. you may understand the structure in here, believe is useful to those who interested in telecommunication
软件设计/软件工程 Java technology is both a programming language and a platform. The Java programming language origina
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time o ...
软件设计/软件工程 This contains the following topics and more ADA versus C and Cplus plus Ada_training ADA 2005 for
This contains the following topics and more
ADA versus C and Cplus plus
Ada_training
ADA 2005 for High Integrity Systems
ada_language_notes
Sample programs
微处理器开发 Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.
Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any
of the resource kits. It has proved to be an extremely versatile tool on
the unix platform. So why should NT always be unix s poor cousin when it
comes to tcp/ip testing and exploration? I bet many NT admins out there
ke ...
系统设计方案 Embedded System Design using 8031 microcontroller defines many steps in development of embedded sys
Embedded System Design using 8031 microcontroller defines many steps in development of embedded systems using the most popular 8-bit microcontroller using various examples. I hope this would be useful to everyone.
其他书籍 The second edition of WiMax Operator鈥檚 Manual includes most of the material from the first edition
The second edition of WiMax Operator鈥檚 Manual includes most of the material from the first
edition, plus new discussions of
鈥?The ultra-high-speed mobile telephone standard, HSDPA
鈥?Ultrawideband (UWB)
鈥?Changes to DSL technologies
鈥?Mobile voice
鈥?Mobile entertainment
鈥?New backup systems ...
行业发展研究 In computer vision, sets of data acquired by sampling the same scene or object at different times, o
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessa ...
Linux/Unix编程 在网络安全中经常会遇到rootkit
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor in ...
软件工程 Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely
Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques ...