搜索结果
找到约 166 项符合
within 的查询结果
按分类筛选
- 全部分类
- 书籍 (26)
- matlab例程 (9)
- 其他书籍 (9)
- 单片机开发 (8)
- Java编程 (8)
- 单片机编程 (7)
- 可编程逻辑 (6)
- 软件工程 (5)
- 技术资料 (5)
- 模拟电子 (4)
- 数学计算 (4)
- Java书籍 (4)
- 文章/文档 (4)
- Linux/Unix编程 (4)
- 通讯/手机编程 (4)
- VC书籍 (4)
- 电源技术 (3)
- 教程资料 (3)
- 其他 (3)
- 人工智能/神经网络 (3)
- 软件设计/软件工程 (3)
- 游戏 (3)
- 通信网络 (2)
- 电子书籍 (2)
- Jsp/Servlet (2)
- 技术书籍 (2)
- Linux/uClinux/Unix编程 (2)
- PCB相关 (1)
- 无线通信 (1)
- 开发工具 (1)
- 设计相关 (1)
- Applet (1)
- 汇编语言 (1)
- GPS编程 (1)
- 操作系统开发 (1)
- 邮电通讯系统 (1)
- 编译器/解释器 (1)
- Windows CE (1)
- 数值算法/人工智能 (1)
- Delphi控件源码 (1)
- 网络 (1)
- 家庭/个人应用 (1)
- 压缩解压 (1)
- 驱动编程 (1)
- VHDL/FPGA/Verilog (1)
- 通讯编程文档 (1)
- 百货/超市行业 (1)
- 行业发展研究 (1)
- SQL Server (1)
- 电工电气 (1)
- 笔记 (1)
- 电路图 (1)
- 论文 (1)
- 教程 (1)
Java书籍 Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Referenc
Eclipse+Web开发从入门到精通
These files contain all of the code listings in
Java: The Complete Reference, J2SE 5 Edition
The source code is organized into files by chapter.
For example, the file Chap7.code contains the
programs shown in Chapter 7.
Within each chapter file, the listings are store ...
Jsp/Servlet These files contain all of the code listings in Java 2: The Complete Reference The source cod
These files contain all of the code listings in
Java 2: The Complete Reference
The source code is organized into files by chapter.
Within each chapter file, the listings are stored
in the same order as they appear in the book.
Simply edit the appropriate file to extract the
listing in which you a ...
Linux/Unix编程 Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux
Main Features:
* Creates a virtual encrypted disk within a file and mounts it as a real disk.
* Encrypts an entire partition or storage device such as USB flash drive or hard drive.
* Encrypts a partition or dr ...
其他书籍 Builder uses to integrate a larger system module. Each component consists of a structured set of fi
Builder uses to integrate a larger system module. Each component
consists of a structured set of files within a directory.
The files in a component directory serve the following
The RS232 UART Core implements a method for communication of serial data. The core provides
a simple register-mapped Avalo ...
文章/文档 In an electromagnetic cloak based on a transformation approach, reduced sets of material properties
In an electromagnetic cloak based on a transformation approach, reduced sets of
material properties are generally favored due to their easier implementation in reality,
although a seemingly inevitable drawback of undesired reflection exists in such cloaks.
Here we suggest using high-order transforma ...
文章/文档 We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicit
We obtained the energy transport velocity distribution for a three dimensional ideal cloak
explicitly. Near the operation frequency, the energy transport velocity has rather peculiar
distribution. The velocity along a line joining the origin of the cloak is a constant, while
the velocity approaches ...
软件工程 This book is for systems architects who are interested in building security into their application
This book is for systems architects
who are interested in building security into their applications. The book is designed to
be useful to architects in three ways: as an introduction to security architecture, as a
handbook on security issues for architecture review, and as a catalog of designs to ...
Java书籍 Java Media APIs: Cross-Platform Imaging, Media, and Visualization presents integrated Java media sol
Java Media APIs: Cross-Platform Imaging, Media, and Visualization presents integrated Java media solutions that demonstrate the best practices for using this diverse collection. According to Sun MicroSystems, "This set of APIs supports the integration of audio and video clips, animated presentations ...
软件工程 Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 throu
Fortran 90 versions of all the Numerical Recipes routines appear in the following
Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20
in Volume 1. Within each chapter, the routines appear in the same order as in Volume
1, but not broken out separately by section number wit ...
数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...