搜索结果
找到约 35 项符合
verify 的查询结果
按分类筛选
其他 Texas Instruments Incorporated and its subsidiaries (TI) reserve the right to make corrections, modi
Texas Instruments Incorporated and its subsidiaries (TI) reserve the right to make corrections, modifications,
enhancements, improvements, and other changes to its products and services at any time and to discontinue
any product or service without notice. Customers should obtain the latest relevant ...
加密解密 SharpPrivacy - OpenPGP for C#: SharpPrivacy is an OpenPGP implementation in C#. It can be used to
SharpPrivacy - OpenPGP for C#:
SharpPrivacy is an OpenPGP implementation in C#. It can be used to encrypt and sign data, created OpenPGP compatible keys, and a lot more. This article explains how to use the library in your own .NET application or webpage to encrypt, sign, decrypt or verify OpenPGP ...
软件设计/软件工程 In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl
In a preemptive priority based RTOS, priority inversion
problem is among the major sources of deadline
violations. Priority inheritance protocol is one of the
approaches to reduce priority inversion. Unfortunately,
RTOS like uC/OS can’t support priority inheritance
protocol since it does not allow ...
数值算法/人工智能 北京大学ACM比赛题目 In 1742, Christian Goldbach, a German amateur mathematician, sent a letter to Leonhard
北京大学ACM比赛题目
In 1742, Christian Goldbach, a German amateur mathematician, sent a letter to Leonhard Euler in which he made the following conjecture:
Every even number greater than 4 can be
written as the sum of two odd prime numbers.
For example:
8 = 3 + 5. Both 3 and 5 are odd prime n ...
加密解密 It is an experimental testing for python M2Crypto module. M2Crypto is not well document. User may no
It is an experimental testing for python M2Crypto module. M2Crypto is not well document. User may not know how to use SHA256 when signing and verify with RSA. It also have not enough document to show how to use DES to encrypt and decrypt. Here also includes source codes for performance evaluation of ...
通讯/手机编程 ldpc的11个程序 encode decode extract make-gen make-ldpc make-pchk print-gen print-pchk rand-src transm
ldpc的11个程序 encode decode extract
make-gen make-ldpc make-pchk print-gen
print-pchk rand-src transmit verify
共十一个程序,学习ldpc编码的重要资料
Jsp/Servlet Use the links below to download a source distribution of Ant from one of our mirrors. It is good pra
Use the links below to download a source distribution of Ant from one of our mirrors. It is good practice to verify the integrity of the distribution files, especially if you are using one of our mirror sites. In order to do this you must use the signatures from our main distribution directory.
Ant ...
单片机开发 LXI Standards Documents are developed within the LXI Consortium and LXI Technical Working Groups sp
LXI Standards Documents are developed within the LXI Consortium and LXI Technical Working
Groups sponsored by the LXI Consortium Board of Directors. The LXI Consortium develops its
standards through a consensus development process modeled after the American National Standards
Institute, which brings ...
微处理器开发 In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to
In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to practice the design flow in SoC. We divide the project into three
parts, and the goal of each part is described as follow.
Part I: Design a baseline JPEG software codec in C/C++ and port it to ARM cor ...
其他书籍 This paper shows the development of a 1024-point radix-4 FFT VHDL core for applications in hardware
This paper shows the development of a 1024-point
radix-4 FFT VHDL core for applications in hardware signal processing, targeting low-cost FPGA technologies. The developed core is targeted into a Xilinx庐 Spartan鈩?3 XC3S200 FPGA with the inclusion of a VGA display interface and an external 16-bit da ...