搜索结果

找到约 128 项符合 usage 的查询结果

VHDL/FPGA/Verilog Rs232 tramslator usage

Rs232 tramslator usage
https://www.eeworm.com/dl/663/320038.html
下载: 195
查看: 1017

TAPI编程 Simple usage of TAPI

Simple usage of TAPI
https://www.eeworm.com/dl/680/328742.html
下载: 183
查看: 1020

行业发展研究 A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log

A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain mode1 based on ontology semantic measurement is used to identi. ing which active session a request should belong to.The corn— ...
https://www.eeworm.com/dl/692/329545.html
下载: 33
查看: 1037

文件格式 The usage of devices in a communication network requires configuration of the device parameters and

The usage of devices in a communication network requires configuration of the device parameters and communication facilities. CANopen defines a standardised way to access these parameters
https://www.eeworm.com/dl/639/330121.html
下载: 84
查看: 1037

微处理器开发 usage of graphical LCD in C (assembly)

usage of graphical LCD in C (assembly)
https://www.eeworm.com/dl/655/348156.html
下载: 192
查看: 1073

其他书籍 USB_HID设备报告描述符详解 ,HID实例,HID Usage Tables ,Device Class Definition for Human Interface Devices(HID)

USB_HID设备报告描述符详解 ,HID实例,HID Usage Tables ,Device Class Definition for Human Interface Devices(HID)
https://www.eeworm.com/dl/542/348947.html
下载: 86
查看: 1174

其他书籍 HUT - Hid Usage Table 关于HID的代码表大全

HUT - Hid Usage Table 关于HID的代码表大全
https://www.eeworm.com/dl/542/350771.html
下载: 197
查看: 1013

软件设计/软件工程 浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf

浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity ,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程 ...
https://www.eeworm.com/dl/684/374773.html
下载: 80
查看: 1077

Linux/Unix编程 spoj CCOST . Usage of a 2 dimensional fenwick tree.Querying (log(n)^2) a 2 dimensional matrix for su

spoj CCOST . Usage of a 2 dimensional fenwick tree.Querying (log(n)^2) a 2 dimensional matrix for sub sum and updating a cell in O(logn)
https://www.eeworm.com/dl/619/410627.html
下载: 134
查看: 1040

数值算法/人工智能 spoj dtree. Count the number of distinct elements in a given range. Usage is done using fenwick tree

spoj dtree. Count the number of distinct elements in a given range. Usage is done using fenwick trees. Offline algorithm for queries
https://www.eeworm.com/dl/518/410637.html
下载: 96
查看: 1069