搜索:Unlike
找到约 13 项符合「Unlike」的查询结果
结果 13
https://www.eeworm.com/dl/649/385050.html
uCOS
This function checks the mailbox to see if a message is available. Unlike OSMboxPend(), OSMboxAccep
This function checks the mailbox to see if a message is available. Unlike OSMboxPend(),
OSMboxAccept() does not suspend the calling task if a message is not available.
https://www.eeworm.com/dl/619/428208.html
Linux/Unix编程
The buffers allow receiving of data while a page in the main memory is being reprogrammed. Unlike c
The buffers allow receiving of data while a
page in the main memory is being reprogrammed. Unlike conventional Flash
https://www.eeworm.com/dl/523/467570.html
数据库系统
Run following Matlab commands to make sure the installation worked correctly. Unlike query function
Run following Matlab commands to make sure the installation worked correctly.
Unlike query function, filterdb does not load all waveforms to memory but returns filtered database object. This is useful when the resulting set of the query is too big to fit in memory. Consequent cal ...
https://www.eeworm.com/dl/686/439919.html
VC书籍
Each exploration in this book is a mixture of text and interactive exercises. The exercises are unl
Each exploration in this book is a mixture of text and interactive exercises. The exercises are
unlike anything you鈥檝e seen in other books. Instead of multiple choice, fill-in-the-blank, or
simple Q&A exercises, lessons are interactive explorations of key C++ features.
https://www.eeworm.com/dl/648/275410.html
单片机开发
8051 Web Server project See Makefile for build notes Written for Keil C51 V5.1 compiler, notes:
8051 Web Server project
See Makefile for build notes
Written for Keil C51 V5.1 compiler, notes:
It uses big endian order, which is the same as the
network byte order, unlike x86 systems.
Use OPTIMIZE(2)or higher so that automatic variables get shared
// between functions, to sta ...
https://www.eeworm.com/dl/641/429179.html
数学计算
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche e ...
https://www.eeworm.com/dl/641/491239.html
数学计算
Features a unique program to estimate the power spectral density. The spectrum containing all signif
Features a unique program to estimate the power spectral density. The spectrum containing all significant details is calculated from a time series model. Model type as well as model order are determined automatically from the data, using statistical criteria. Robust estimation al ...
https://www.eeworm.com/dl/521889.html
书籍
EDGE+for+Mobile+Internet
The General Packet Radio Service (GPRS) allows an end user to send and
receive data in packet transfer mode within a public land mobile network
(PLMN) without using a permanent connection between the mobile station
(MS) and the external network during data transfer. This way, GPR ...
https://www.eeworm.com/dl/522473.html
书籍
Power Electronics And Motor Drives Advances
I am presenting this novel book on advances and trends in power electronics and motor
drives to the professional community with the expectation that it will be given the same
wide and enthusiastic acceptance by practicing engineers, R&D professionals, univer-
sity professors, and ...
https://www.eeworm.com/dl/619/275310.html
Linux/Unix编程
In recent years, the UNIX operating system has seen a huge boost in its popularity, especially with
In recent years, the UNIX operating system has seen a huge boost in its popularity, especially with the
emergence of Linux. For programmers and users of UNIX, this comes as no surprise: UNIX was designed to
provide an environment that s powerful yet easy to use.
One of the main s ...