Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardware. The original firmware from the manufacturer is extended with new functions and programs which may be selected by the user
标签: firmware-extension modification identical devices
上传时间: 2014-12-08
上传用户:qw12
自己写的robocup-2d程序,从UVA改编 This method is the first complete simple team and defines the actions taken by all the players on the field (excluding the goalie). It is based on the high-level actions taken by the simple team FC Portugal that it released in 2000.
上传时间: 2014-01-27
上传用户:上善若水
There are three ways of specifying an immediate dump Immediate dumps can be specified using the ALTER SESSION command ALTER SESSION SET EVENTS immediate trace name dump level level Immediate dumps can be specified in ORADEBUG ORADEBUG DUMP dump level
标签: specifying Immediate immediate specified
上传时间: 2014-01-17
上传用户:mpquest
The Software Engineering Institute’s (SEI) Capability Maturity Model (CMM) provides a well-known benchmark of software process maturity. The CMM has become a popular vehicle for assessing the maturity of an organization’s software process in many domains. This white paper describes how the Rational Unified Process can support an organization that is trying to achieve CMM Level-2, Repeatable, and Level-3, Defined, software process maturity levels.
标签: Engineering Capability well-known Institute
上传时间: 2017-02-27
上传用户:zhichenglu
FDMP the body of the kernel, the Information-Technology Promotion Agency (IPA) adopted by the unexplored themes of Creativity software is one of the "multi-processor system-level development environment for the development of the system" as part of the development Susumu Honda也氏Was responsible.
标签: the Information-Technology Promotion adopted
上传时间: 2013-12-25
上传用户:dengzb84
Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html part 2 of 3: user mode LIB
标签: EKernel Murphy murphy RTOS
上传时间: 2013-12-23
上传用户:小鹏
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop
标签: programming language Java technology
上传时间: 2014-01-03
上传用户:huangld
Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While original Windows Mobile ring vibration constant vibrating during all ring, this driver help to apply any user vibrating pattern.
标签: customization vibration incoming Windows
上传时间: 2017-03-07
上传用户:498732662
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2017-03-08
上传用户:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2014-01-10
上传用户:yyq123456789