搜索结果
找到约 12 项符合
Unlike 的查询结果
uCOS This function checks the mailbox to see if a message is available. Unlike OSMboxPend(), OSMboxAccep
This function checks the mailbox to see if a message is available. Unlike OSMboxPend(),
OSMboxAccept() does not suspend the calling task if a message is not available.
Linux/Unix编程 The buffers allow receiving of data while a page in the main memory is being reprogrammed. Unlike c
The buffers allow receiving of data while a
page in the main memory is being reprogrammed. Unlike conventional Flash
数据库系统 Run following Matlab commands to make sure the installation worked correctly. Unlike query function
Run following Matlab commands to make sure the installation worked correctly.
Unlike query function, filterdb does not load all waveforms to memory but returns filtered database object. This is useful when the resulting set of the query is too big to fit in memory. Consequent calls to read function ...
Linux/Unix编程 In recent years, the UNIX operating system has seen a huge boost in its popularity, especially with
In recent years, the UNIX operating system has seen a huge boost in its popularity, especially with the
emergence of Linux. For programmers and users of UNIX, this comes as no surprise: UNIX was designed to
provide an environment that s powerful yet easy to use.
One of the main strengths of UNIX is ...
单片机开发 8051 Web Server project See Makefile for build notes Written for Keil C51 V5.1 compiler, notes:
8051 Web Server project
See Makefile for build notes
Written for Keil C51 V5.1 compiler, notes:
It uses big endian order, which is the same as the
network byte order, unlike x86 systems.
Use OPTIMIZE(2)or higher so that automatic variables get shared
// between functions, to stay within the 256 byt ...
数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...
VC书籍 Each exploration in this book is a mixture of text and interactive exercises. The exercises are unl
Each exploration in this book is a mixture of text and interactive exercises. The exercises are
unlike anything you鈥檝e seen in other books. Instead of multiple choice, fill-in-the-blank, or
simple Q&A exercises, lessons are interactive explorations of key C++ features.
操作系统开发 A user-space device driver can do many of the things that kernel drivers can t, such as perform a lo
A user-space device driver can do many of the things that kernel drivers can t, such as perform a long-running computation, block while waiting for an event, or read files from the file system. Unlike kernel drivers, a user-space device driver can use other device drivers--that is, access the networ ...
数学计算 Features a unique program to estimate the power spectral density. The spectrum containing all signif
Features a unique program to estimate the power spectral density. The spectrum containing all significant details is calculated from a time series model. Model type as well as model order are determined automatically from the data, using statistical criteria. Robust estimation algorithms and order s ...
书籍 EDGE+for+Mobile+Internet
The General Packet Radio Service (GPRS) allows an end user to send and
receive data in packet transfer mode within a public land mobile network
(PLMN) without using a permanent connection between the mobile station
(MS) and the external network during data transfer. This way, GPRS opti-
mizes the us ...