虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Bandwidth-control

  • Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

    标签: Programming developers for important

    上传时间: 2015-09-03

    上传用户:gundan

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) the text of Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    标签: L. published Schwartz Edition

    上传时间: 2014-11-29

    上传用户:kr770906

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    标签: L. published Schwartz Edition

    上传时间: 2015-09-03

    上传用户:lifangyuan12

  • This paper addresses the issues relating to the enforcement of robust stability when implementing t

    This paper addresses the issues relating to the enforcement of robust stability when implementing the Adaptive Inverse Control (AIC) scheme. In this scheme, an adaptive FIR filter is added to a closed-loop system in order to reduce the output error caused by external disturbances, enhancing the performance achieved by linear time-invariant controllers alone.

    标签: implementing enforcement addresses the

    上传时间: 2013-12-23

    上传用户:佳期如梦

  • The source code samples for chapter 2, 4, 6, and 8 are contained in the EvenChapters project. Those

    The source code samples for chapter 2, 4, 6, and 8 are contained in the EvenChapters project. Those chapters all reference various aspects of this single project. The source code for the BullsEye control (chapter 10 example) is in the BullEyeCtl project. The source samples for the other chapters are provided in the Chapter XX sub-directories.

    标签: EvenChapters contained chapter samples

    上传时间: 2015-09-07

    上传用户:yuchunhai1990

  • In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts

    In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts with an introduction to Winsock and is specifically geared for the beginning Winsock programmer. This chapter covers all the basics and introduces Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) through simple samples, as well as providing a roadmap to advanced Winsock topics covered in other chapters. For the sake of simplicity, Chapter 1 covers the IPv4 protocol.

    标签: the dedicated covering majority

    上传时间: 2015-09-08

    上传用户:ommshaggar

  • WUSB的运行采用MBOA–MAC架构

    WUSB的运行采用MBOA–MAC架构,同时保留了主从架构,和USB 2.0一样,它也能处理控制、突发、中断和同步(Control、Bulk、Interrupt and Isochronous)所有这四种传输形式。主机和WUSB设备合称WUSB丛集,采用星型拓扑;与USB 2.0. A的树型拓扑不同,WUSB主机能直接连接多达127个设备,因此在WUSB丛集中不需要包含WUSB集线器。而由于WUSB没有缆线,因此,所有的WUSB设备都必须自行供电(self-powered)。

    标签: WUSB MBOA MAC 运行

    上传时间: 2015-09-08

    上传用户:zq70996813

  • VTS(VisuaI Test Shelf) V3.4.7的源代码。VTS是美国国家联邦实验室N.I.S.T.所开发的BACnet协议下的报文的测试工具。BACnet(A Data Communica

    VTS(VisuaI Test Shelf) V3.4.7的源代码。VTS是美国国家联邦实验室N.I.S.T.所开发的BACnet协议下的报文的测试工具。BACnet(A Data Communication Protocol for Building Automation and Control Network)是由美国采暖、制冷和空调工程师协会制定的开放楼宇自动控制网络数据通信协议。

    标签: BACnet N.I.S.T. VTS Communica

    上传时间: 2014-10-12

    上传用户:坏天使kk

  • 用汇编写系统服务程序。Windows NT的服务都是通过一般的可执行程序实现的

    用汇编写系统服务程序。Windows NT的服务都是通过一般的可执行程序实现的,不同的是,它遵循内部的一个特定协议来设计,以便它们能够与服务控制管理器(SCM,Service Control Manager)进行正确的交互。

    标签: Windows 服务 程序 汇编

    上传时间: 2015-09-09

    上传用户:集美慧

  • This m-file simulates MPSK (theoretical and simulated) with Gray coding This m-file simulates MPSK

    This m-file simulates MPSK (theoretical and simulated) with Gray coding This m-file simulates MPSK (BPSK,QPSK,8PSK)with theoretical and simulated results using Gray coding. Numerical examples of a satellite link design are shown using QPSK and/or 8PSK when the bit rate(Rb)is greater than the channel bandwidth Wc (Band-limited channel).

    标签: simulates m-file This MPSK

    上传时间: 2014-01-11

    上传用户:372825274