虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

How-to

  • This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND.

    This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND. Author(s): Ole Saether DESCRIPTION: nRF9E5 Hello World program. Please note that this program runs the internal 8051 on the default power up frequency of 4MHz. See ex3a.asm for an example on how to switch to 16MHz. The functionality is the same as in ex1c.c. ASSEMBLER: You need as31.exe to assemble this program. It can be downloaded from this web page: http://www.pjrc.com/tech/8051/ $Revision: 4 $

    标签: distributed WARRANTY WITHOUT useful

    上传时间: 2017-05-17

    上传用户:wuyuying

  • Altera® provides various tools for development of hardware and software for embedded systems. T

    Altera® provides various tools for development of hardware and software for embedded systems. This handbook complements the primary documentation for these tools by describing how to most effectively use the tools. It recommends design styles and practices for developing, debugging, and optimizing embedded systems using Altera-provided tools. The handbook introduces concepts to new users of Altera’s embedded solutions, and helps to increase the design efficiency of the experienced user.

    标签: development for provides embedded

    上传时间: 2017-06-15

    上传用户:haoxiyizhong

  • I upload Suffix Array Pdf file. This is a really good tutorial for guys who are curious about suffix

    I upload Suffix Array Pdf file. This is a really good tutorial for guys who are curious about suffix array. It described the meaning of suffix array and also how to built it. Hope this really help guys improving skills about string searching, string matching, etc

    标签: tutorial curious upload Suffix

    上传时间: 2013-12-11

    上传用户:清风冷雨

  • QuickSteps books are recipe books for computer users. They answer the question 揌ow do I...??by prov

    QuickSteps books are recipe books for computer users. They answer the question 揌ow do I...??by providing a quick set of steps to accomplish the most common tasks with a particular program. The sets of steps are the central focus of the book. Sidebar QuickSteps provide information on how to do quickly many small functions or tasks that are in support of the primary functions. Sidebar QuickFacts supply information that you need to know about a subject. Notes, Tips, and Cautions augment the steps, but they are presented in a separate column to not interrupt the fl ow. Brief introductions are present, but there is minimal narrative otherwise. Many illustrations and fi gures, a number with callouts, are also included where they support the steps.

    标签: books QuickSteps computer question

    上传时间: 2013-12-11

    上传用户:ljt101007

  • The book consists of three sections. The first, foundations, provides a tutorial overview of the pri

    The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.

    标签: foundations The consists sections

    上传时间: 2017-06-22

    上传用户:lps11188

  • A user-space device driver can do many of the things that kernel drivers can t, such as perform a lo

    A user-space device driver can do many of the things that kernel drivers can t, such as perform a long-running computation, block while waiting for an event, or read files from the file system. Unlike kernel drivers, a user-space device driver can use other device drivers--that is, access the network, talk to a serial port, get interactive input from the user, pop up GUI windows, or read from disks. User-space drivers implemented using FUSD can be much easier to debug it is impossible for them to crash the machine, are easily traceable using tools such as gdb, and can be killed and restarted without rebooting even if they become corrupted. FUSD drivers don t have to be in C--Perl, Python, or any other language that knows how to read from and write to a file descriptor can work with FUSD. User-space drivers can be swapped out, whereas kernel drivers lock physical memory.

    标签: user-space can drivers perform

    上传时间: 2014-01-01

    上传用户:saharawalker

  • VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li

    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.

    标签: implementation twofish cipher VHDL

    上传时间: 2017-06-25

    上传用户:王小奇

  • Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each rec

    Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each recipe also includes explanations of how and why the approach works, so you can adapt the techniques to similar situations. One of the biggest challenges facing developers today is sorting through the wide variety of tools available form various source and figuring out how to them effectively. The recipes in Java Extreme Programming Cookbook showcase how to use the most important features of these XP tools. Many of these tools are geared towards unit testing, while others are invaluable for continuous integration with these practical examples, you ll be able to choose the most effective tools to accomplish your goals, then implement them in a cohesive development environment quickly.

    标签: cut-and-paste Programming collection Cookbook

    上传时间: 2017-06-29

    上传用户:cmc_68289287

  • Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and n

    Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and network administration tasks. This section explains how to enable and disable the perl scripting service, and how to use Cisco E-DI Perl API for daily tasks. When a perl script is implemented by an administrator or a user, the script automatically inherits the user s security privileges and the user s operational context (either server or network). Each invocation of a

    标签: automates scripting the supports

    上传时间: 2017-07-06

    上传用户:a673761058

  • Simulink implementation of induction motor. It explains about the induction motor equation and also

    Simulink implementation of induction motor. It explains about the induction motor equation and also how to use with simulink.

    标签: induction motor implementation Simulink

    上传时间: 2017-07-08

    上传用户:英雄