搜索结果
找到约 112 项符合
SCHEME 的查询结果
按分类筛选
- 全部分类
- 其他 (14)
- 其他书籍 (12)
- 单片机编程 (11)
- 通讯/手机编程 (9)
- 通讯编程文档 (8)
- 数据结构 (8)
- 技术资料 (7)
- 行业发展研究 (4)
- 数值算法/人工智能 (4)
- 文章/文档 (4)
- 书籍 (4)
- Internet/网络编程 (3)
- 加密解密 (3)
- 电源技术 (2)
- 压缩解压 (2)
- 编译器/解释器 (2)
- matlab例程 (2)
- 电子书籍 (2)
- Linux/Unix编程 (2)
- 无线通信 (1)
- VHDL/FPGA/Verilog (1)
- 中间件编程 (1)
- 文件格式 (1)
- Java编程 (1)
- 3G开发 (1)
- GPS编程 (1)
- 人工智能/神经网络 (1)
- 论文 (1)
其他书籍 MIT.Press,.The.Scheme.Programming.Language.(2003),.3Ed.LiB.pdf
MIT.Press,.The.Scheme.Programming.Language.(2003),.3Ed.LiB.pdf
压缩解压 This scheme is initiated by Ziv and Lempel [1]. A slightly modified version is described by Storer a
This scheme is initiated by Ziv and Lempel [1]. A slightly modified version is described by Storer and Szymanski [2]. An implementation using a binary tree is proposed by Bell [3]. The algorithm is quite simple: Keep a ring buffer, which initially contains "space" characters only. Read several lette ...
其他 builds an alternate memory allocation scheme into ToyFDTD1. Contributed by John Schneider, it guaran
builds an alternate memory allocation scheme into ToyFDTD1. Contributed by John Schneider, it guarantees that the data arrays are contiguous, which the ToyFDTD1 scheme does not. Released 6 December, 1999.
通讯编程文档 it is used to generate random number to simulate the conmmunication scheme, very useful
it is used to generate random number to simulate the conmmunication scheme, very useful
其他书籍 scheme, r5rs标准
scheme, r5rs标准,scheme的国际标准文档
中文,不知道有没有人喜欢英文的
其他书籍 A New Identity-based Proxy Signature Scheme from Bilinear Pairings
A New Identity-based Proxy Signature Scheme from Bilinear Pairings
行业发展研究 A new blind adaptive multiuser detection scheme based on a hybrid of Kalman filter and subspace est
A new blind adaptive multiuser detection scheme based on a hybrid of Kalman filter and
subspace estimation is proposed. It is shown that the detector can be expressed as an anchored
signal in the signal subspace and the coefficients can be estimated by the Kalman filter using only
the signature wave ...
VHDL/FPGA/Verilog Hard-decision decoding scheme Codeword length (n) : 31 symbols. Message length (k) : 19 symbols.
Hard-decision decoding scheme
Codeword length (n) : 31 symbols.
Message length (k) : 19 symbols.
Error correction capability (t) : 6 symbols
One symbol represents 5 bit.
Uses GF(2^5) with primitive polynomial p(x) = X^5 X^2 + 1
Generator polynomial, g(x) = a^15 a^21*X + a^6*X^2 + a^15*X^3 + a^ ...
通讯/手机编程 蓝牙跳频系统的simulink仿真程序(This is a MATLAB simulation (SIMULINK) for the hop selection scheme in Bluetooth
蓝牙跳频系统的simulink仿真程序(This is a MATLAB simulation (SIMULINK) for the hop selection scheme in Bluetooth. Since nearly the same scheme is used for 79 and 23-hop system. Only the 79-hop system in simulated in the CONNECTION state.)
其他 uising different ICI self-cancellation scheme to see its performance
uising different ICI self-cancellation scheme to see its performance