CONTENTS
共 123 篇文章
CONTENTS 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 123 篇文章,持续更新中。
un the configuration script ---------------------------- In the CGIs directory there is a config
un the configuration script
----------------------------
In the CGIs directory there is a configure.s and a configure.bat file.
Run this file after you ve moved the CGIs directory to it s desir
Some time during my development works I had the need of printing the contents of a ListView control.
Some time during my development works I had the need of printing the contents of a ListView control. So I wrote down the code for a custom control, named PrintableListView, that solved the following t
File: fw.c Contents: Firmware frameworks task dispatcher and device request parser File: FX2.h Co
File: fw.c
Contents: Firmware frameworks task dispatcher and device request parser
File: FX2.h
Contents: EZ-USB FX2 constants, macros, datatypes, globals, and library
function prototypes.
File: F
Using ROM Contents on TMS320C672x
Using ROM Contents on TMS320C672x
数据分析仪说明书
<P>User Manual<BR>Rev. 1.2<BR>SmartRF® CC2420DK: Packet Sniffer for IEEE 802.15.4 and ZigBee</P>
<P>Table of contents<BR>1 INTRODUCTION.............................................................
Technical report on c++ performance.contents:1.introduction 2.language features 3.creating efficient
Technical report on c++ performance.contents:1.introduction 2.language features 3.creating efficient librarites 4. using c++ in embedded systems 5.hardware addressing interface
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi
Intrusion Detection:Host-based Network
Intrusion Detection
• At each host, monitor all incoming and
outgoing network traffic – for each packet:
– Analyze 4-tuple and protocol
– Examine conte
a good document that introduces support vector machine in detail and covers almost all of contents
a good document that introduces support vector machine in detail
and covers almost all of contents
we need generally
File Encryption Encrypting contents of file
File Encryption
Encrypting contents of file
Some of the contents of this paper are adapted from the author’s book Real-Time UML: Developing Eff
Some of the contents of this paper are adapted from the author’s book Real-Time UML:
Developing Efficient Objects for Embedded Systems published by Addison-Wesley, 1998.
Compression using lempel-ziv -for a dictionary size of 2k -provide dictionary
Compression using lempel-ziv
-for a dictionary size of 2k
-provide dictionary
Lempel ziv algorithm is a dictionary based algorithm that addresses byte sequences from former con
Use the links below to download a source distribution of Ant from one of our mirrors. It is good pra
Use the links below to download a source distribution of Ant from one of our mirrors. It is good practice to verify the integrity of the distribution files, especially if you are using one of our mirr
本书是英文版
本书是英文版,但内容非常不错,本书目录如下:
Table of Contents
SIP—Understanding the Session Initiation Protocol, Second Edition
Foreword to the First Edition
Preface to - the Second Edition
Preface to - the First Edi
Thinking in Java Annotated Solutions Guide, Revision 1.0 - Contents
Thinking in Java Annotated Solutions Guide, Revision 1.0 - Contents
DESCRIPTION - Provides the functionality to display the contents of sysPhysMemeDesc array.
DESCRIPTION -
Provides the functionality to display the contents of sysPhysMemeDesc
array.
Schifra Reed-Solomon Error Correcting Code Library http://www.schifra.com Copyright (c) 2000-2007
Schifra
Reed-Solomon Error Correcting Code Library
http://www.schifra.com
Copyright (c) 2000-2007 Arash Partow, All Rights Reserved.
The Schifra Reed-Solomon Error Correcting Code Library and al
marte为用ada语言开发的嵌入式操作系统 ada语言是美国国防部指定的军用语言
marte为用ada语言开发的嵌入式操作系统
ada语言是美国国防部指定的军用语言,用它开发操作系统有独到之处。marte的功能较全面,是一个功能完备的操作系统。具体内容可以登录其主页 http://marte.unican.es/contents.html
Contents at a Glance Introduction 1 PART I INSTALLATION AND CONFIGURATION 5 Hour 1 Preparing to I
Contents at a Glance
Introduction 1
PART I INSTALLATION AND CONFIGURATION 5
Hour 1 Preparing to Install Linux 7
2 Installing Linux 23
3 Post-Installation Issues 41
PART II LEARNING LINUX BASICS
Massively Multiplayer Online game development of this book contents of the CD-ROM. Including some sc
Massively Multiplayer Online game development of this book contents of the CD-ROM. Including some script code and pictures
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same techn