The code, images and designs for this book are released under a Creative Commons Attribution-NonComm
The code, images and designs for this book are released under a Creative Commons Attribution-NonComm...
The code, images and designs for this book are released under a Creative Commons Attribution-NonComm...
Overview Provides a way to store very large collections of email addresses (100,000+ addresses) and...
tServer task executes functions at low priority (254). serverSend funtion is used to send a requ...
Magenta Systems Internet Packet Monitoring Components are a set of Delphi components designed to cap...
xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which en...
This leon3 design is tailored to the Altera NiosII Startix2 Development board, with 16-bit DDR SDR...
This a simple bootloader for AT91SAM7{S,X}{64,128,256} processors. It permits you to download new c...
P2P 之 UDP穿透NAT的原理与实现(附源代码) 原创:shootingstars 参考:http://midcom-p2p.sourceforge.net/draft-ford-midcom...
Avalon Interface Specification,The Avalon interface specification is designed to accommodate periphe...
雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得...